Thursday, May 22, 2014

Tech CEOs are making HOW MUCH more than you?

Using math and crowdsourcing to camouflage 'eyesores' | Hands on: Microsoft Surface Pro 3 - Reliable tablet, limiting ecosystem

Network World After Dark

Forward this to a Friend >>>

Tech CEOs are making HOW MUCH more than you?
Fifteen tech leaders made more than $14 million in 2013. Read More

WHITE PAPER: PC Connection | Cisco | Intel®

It's Time to Refresh Your Data Center
In this Whitepaper, we'll take a close look at how Cisco® Unified Computing System (UCS®) with intelligent Intel® Xeon® processors is revolutionizing the way businesses store and access information. Learn More

WEBCAST: Dell SecureWorks

Counterstrategies for Combatting Social Engineering
Social Engineering is proving costlier than ever, especially phishing and spear phishing. With recent breaches, the imperative to counter social engineering effectively takes on a whole new level of urgency. In this webcast, the CISO for Dell SecureWorks discusses the realities of social engineering and what your organization must do to counter it. Learn more

Using math and crowdsourcing to camouflage 'eyesores'
Researchers at MIT are leading an effort to use algorithms and crowdsourcing to create customized camouflage that someday will conceal public eyesores such as electrical boxes and air conditioning units. Among the challenges to be overcome is creating camouflage that does the trick when viewed from different vantage points and in different light conditions. In a second you'll see some examples and... Read More

Hands on: Microsoft Surface Pro 3 - Reliable tablet, limiting ecosystem
Microsoft's new tablet has a remarkably crisp screen and its robust processor options make it good for creating content, but its limiting ecosystem cause concern for general usefulness. Follow reporter Nick Barber on Twitter @nickjb Read More

Is Cisco Back (as an enterprise security leader)?
It wasn't too long ago that Cisco was a dominant force in information security technology. The company was a market leader in firewalls, IDS/IPS, and email security and was actively pushing products for endpoint security and SIEM as well as security "blades" for Catalyst switches. Heck, Cisco even articulated a bold vision of "self-defending networks" with security policy, enforcement, and intelligence... Read More

How to Do Big Data in Healthcare
Many healthcare organizations like to talk about data analytics. However, here are eight pieces of expert advice to help you actually do it. Read More

Obama backs new surveillance legislation, but tech companies reject
A tech industry group that has Facebook and Google as participants has rejected the latest draft of a U.S. legislation that aims to put curbs on surveillance by the National Security Agency. Read More

Dark Wallet--Threat or No Threat?
The Fuss About Dark Wallet Read More

7 ways to use social media to get work done
Social media has a reputation--well deserved, we should note--for being a bit of a waste of time. Case in point: A 2012 survey from found that 64 percent of employees visited non-work related websites every day during working hours, and 61 percent of employees said they spent over an hour a week on personal web usage. The number one time waster? Facebook, visited by 41 percent of those users. (LinkedIn was second, at 37 percent, which probably explains a lot about why so many are killing time on Facebook.) Read More

Oops! Microsoft's Office 365 may not be a freebie for Thailand schools after all
A massive Office 365 deployment in Thailand schools that Microsoft initially described as free on Wednesday may not be so. Read More

Celebrating 25 years of Cisco Networkers
This year, Cisco recognizes the 25th anniversary of its Networkers user conference. To put this run in perspective, here's a timeline of Cisco-specific events interspersed with world, national, cultural and technology milestones that occurred over this period. Read More


Celebrating 25 years of Cisco Networkers

This year, Cisco recognizes the 25th anniversary of its Networkers user conference.


As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn


1. 12 most powerful Internet of Things companies

2. Cisco to acquire malware prevention company

3. TCO of Cisco ACI 3X better than VMware NSX

4. Linux: Best desktop distros for newbies

5. Tech's top-paid CEOs

6. 20 cool things you can do with a Raspberry Pi

7. New Internet Explorer zero-day details released after Microsoft fails to patch

8. IT pro gets prison time for sabotaging ex-employer's system

9. FIRST LOOK: Microsoft Surface Pro 3 tablet/PC

10. Rackspace not a good fit for Cisco, says Chambers

Do You Tweet?
Follow everything from on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact:

To contact Network World, please send an e-mail to

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to **

No comments: