| Who's to blame for Snapchat's massive nude photo leak? | AT&T jabs Verizon for Redbox Instant failure, but misses on net neutrality |
|Network World Voices of Networking|
No, the Windows 10 preview's keylogger will not steal your bank information
WEBCAST: Alcatel-Lucent Enterprise
Integrating Mobility with Unified Access
Meeting mobility demands of 4500 students, faculty and staff at a university is no small task. Join this Webcast to hear the Director of Enterprise Infrastructure explain the steps Abilene Christian University took to deliver a new level of student-faculty interaction. Learn More
In this Issue
RESOURCE COMPLIMENTS OF: Brocade Communications Systems
The Trick to Future-Proofing Your Networking Career
Get a leg up on your peers with a free Brocade Network Functions Virtualization (NFV) Certification to future-proof your career and your network. This course will help you: Understand sophisticated, multitier networks within virtualized environments and stand out from your peers by becoming an expert within your IT organization Sign up today and get a promo code for the free Brocade Network Functions Virtualization Certification program (a $650 value), and a free 60-day trial of the Brocade Vyatta vRouter.
Who's to blame for Snapchat's massive nude photo leak?
AT&T jabs Verizon for Redbox Instant failure, but misses on net neutrality
HTC wants you to edit videos and take better selfies
How HTC's new RE camera and Eye smartphone will compete
After iOS 8's glitches, Apple might want to rethink its update strategy
WHITE PAPER: Dell Software
The Top 10 Things DBAs Should Know About Toad for IBM DB2
Toad for IBM DB2 is a powerful tool for the database administrator. But it's some of its newer and lesser known features that provide the great productivity benefits in the DBA's day-to-day work. Do you know the top 10 features of Toad for IBM DB2? Download this white paper and find out. View now
First Nadella: Women shouldn't ask for raises. Second Nadella: Yes they should
IDG Contributor Network: How satellite loops could store data or not
Gartner: The super-smart drone in the corner office
Top 10 Windows 10 Technical Preview feedback requests after 1 week
WEBCAST: Code 42
Your Data Has Left the Building; How Can You Protect It?
Data creation and storage has shifted to the edge where work is conducted on endpointslaptops, phones and tabletsand they're leaving your building every day. What can IT do to protect endpoint data that lives on the edge? Learn More
Eric Schmidt takes jab at Apple and Tim Cook over privacy
How the Hong Kong protests can impact the Internet of Things
The Internet is one step closer to universal HTTPs
IDG Contributor Network: Security flaw search engine Shodan adds reports
Adobe Digital Editions allegedly spying, scanning PCs, uploading logs to servers
Here are nine that we found to be really useful and easy to use when you're writing, editing and sharing documents.
JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
MOST-READ STORIES of 2014
Do You Tweet?
You are currently subscribed to networkworld_voices_of_networking as email@example.com.
To contact Network World, please send an e-mail to firstname.lastname@example.org.
Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly, send an e-mail to email@example.com. **