Monday, October 06, 2014

CBS Interactive CIO Says Shadow IT Is an Opportunity

Network World IT Best Practices - Newsletter -
States worry about ability to hire IT security pros | How to Balance IT Onshoring and Offshoring

Network World IT Best Practices

CBS Interactive CIO Says Shadow IT Is an Opportunity
By looking at the shadow IT that lines-of-business deploy and asking business leaders how it improves their business, IT organizations can gain a better understanding of what they can bring to the table to help the business succeed. Read More


Global Growing Pains: Tapping into B2B Integration Services
A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities they're seeking in B2B integration partners. Learn More

WEBCAST: Alcatel-Lucent Enterprise

Integrating Mobility with Unified Access
Meeting mobility demands of 4500 students, faculty and staff at a university is no small task. Join this Webcast to hear the Director of Enterprise Infrastructure explain the steps Abilene Christian University took to deliver a new level of student-faculty interaction. Learn More

States worry about ability to hire IT security pros
States' efforts to improve cybersecurity are being hindered by lack of money and people. States don’t have enough funding to keep up with the increasing sophistication of the threats, and can’t match private sector salaries, says a new study.This just-released report by Deloitte and the National Association of State CIOs (NASCIO) about IT security in state government received responses from chief information security officers (CISOs) in 49 states. Of that number, nearly 60% believe there is a scarcity of qualified professionals willing to work in the public sector.To read this article in full or to leave a comment, please click here Read More

How to Balance IT Onshoring and Offshoring
Three CIOs share their strategies for striking a balance between onshore and offshore IT resources to meet business needs. Read More

Cisco, Oracle find dozens of their products affected by Shellshock
Cisco Systems and Oracle are hard at work identifying networking and other products in their portfolios that are affected by the critical Shellshock vulnerability.The Shellshock vulnerability and several related ones found over the past week stem from errors in how the Bash command-line interpreter for Unix and Linux systems parses strings passed to it by external scripts. The flaws allow attackers to trick certain processes running on vulnerable machines to pass malicious strings to Bash that would then get executed as commands on the underlying OS.To read this article in full or to leave a comment, please click here Read More

WHITE PAPER: Dell | Symantec

Strategies for Gaining Control and Securing Mobility
We are in the midst of a mobile revolution. Numbers of mobile devices are growing with some experts predicting that employees will be carrying three or more devices. Growth is not limited to just devices. As the number of enterprise apps rapidly expands, "an app for everything" is a slogan few would question. Learn More

Red Hat CEO Whitehurst on DevOps, apps, and infrastructure
Every so often I get the chance to chat with Red Hat CEO Jim Whitehurst. When we spoke earlier this month, the open source company's quarterly financial results had just come out, but one of the reasons I enjoy our conversations is that they somehow manage to focus on the big-picture trends affecting the technology industry, not the momentary forces of any particular company — include his company.See also: Red Hat CEO addresses big data's chicken-and-egg question This time, we delved into the increasing importance of developers in IT departments. "In Europe last week," Whitehurst told me, "I had conversations with CIOs and it was all about DevOps, agile, and continuous development like I've never heard before." For IT leaders, Whitehurst said, the key conversations are moving from infrastructure to "how do I develop apps more quickly?" That’s a huge sea change in CIO thinking.To read this article in full or to leave a comment, please click here Read More

Outgoing Commerce Department CIO pushed to shake up the federated model
When Simon Szykman was named CIO of the U.S. Department of Commerce, he inherited a federated IT organization that needed to improve its efficiency and effectiveness, so he applied his strategic vision and consensus-building skills in efforts to make progress in both areas. Read More

This is what's holding the public cloud back
My colleague Brian Eastwood has a fine piece over at sister-site this week about how Boston Children’s Hospital responded to DDOS and other attacks made on the institution. My big take away from it is that this is an example of why some institutions will likely never go all-in with the public cloud.+ MORE AT NETWORK WORLD: Today's security attacks are after more than just bank info +To read this article in full or to leave a comment, please click here Read More

: McAfee

Needle in a Datastack Report
The volume of security-related data today can make identifying a threat like looking for a needle in a haystack. Yet collecting more data also plays a transformational role in information security. Organizations need to learn how to harness and sift through this wealth of information to protect themselves from the threats they face every day. Learn more >>

Evernote everywhere? New collaboration tools hope to take over your workday
Evernote, with its new Work Chat messaging app and Context research tool, hopes to turn plain old chat into an enhanced communication medium. Whether these new features will woo workers away from established competition is a very open question. Read More

How the cloud is changing the security game
New market of vendors has sprouted up to secure the cloud Read More

How to avoid an Oracle ERP upgrade disaster
Users who have gone through the experience advised their peers during OpenWorld Read More


First Look: BlackBerry Passport

The Passport is uniquely focused on being a device for work first and personal stuff second - take a look at how it's turned out.


As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.


1. Will Windows 10 address the operating system's biggest weakness?

2. Why Windows 10 isn't named 9: Windows 95 legacy code?

3. Startups look to eliminate routers, switches

4. Cisco bulks up branch routers for cloud

5. How the cloud is changing the security game

6. First look: Windows 10

7. 10 Tips to Ensure Your IT Career Longevity

8. Apple's worldwide market share stalls as consumers await the iPhone 6

9. 3 … 2 … 1 … That's all for Lotus 1-2-3

10. Windows 10 in pictures: See the Technical Preview

Do You Tweet?
Follow everything from on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact:

To contact Network World, please send an e-mail to

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to **

No comments: