Tuesday, December 23, 2014

10 predictions for IT in 2015

  Vulnerability in embedded Web server exposes millions of routers to hacking | U.S.-Cuba breakthrough is no slam dunk for Internet

 
  Network World Wide Area Networking  

10 predictions for IT in 2015
With the year coming to a close, a lot of people are making their predictions for 2015. So naturally I had to join the party. A whole lot of issues seem to be coming to a head and will need to be addressed in the next year, and I think it will happen all at once. So heed the words of Patridamus.1) Wearables continue to tankThis is yet another case of the industry looking for new growth opportunities and a chance to expand by driving something the public doesn't really want. People don't want another device to carry or remember to wear, they are often inaccurate, and the newness wears off quickly and they get tossed in the drawer.To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: Curvature

The State of IT Infrastructure & Operations
The challenge that IT decision-makers face is the pressure to reduce costs paired with the pressure to progress digital maturity. Curvature analyzes why businesses miss significant CapEx and OpEx cost savings and how to refocus IT strategy. View now

: Venafi

Gaps In SSH Security Create An Open Door For Attackers
As an IT security leader, are you on top of SSH security for your organization? It's key to next-generation trust protection. Find out what Forrester reveals as gaps in that security—gaps that could put your organization in peril. Learn More

Vulnerability in embedded Web server exposes millions of routers to hacking
Attackers can take control of millions of routers by sending a specially crafted request to RomPager, an embedded Web server running on them Read More
 

U.S.-Cuba breakthrough is no slam dunk for Internet
As the U.S. frees its service providers to invest, Cuba may not play ball Read More
 


WHITE PAPER: F5 Networks
 
Protecting Against Online Banking Fraud
The F5 Web Fraud Protection solution provides both the breadth and depth of coverage financial services organizations need to gain a full defense against asset loss due to fraud. Learn more about how these services give organizations a full defense to keep their business, their brand, and their users secure from the threat of fraud. Learn more >>

In Cisco tiff, Arista taps Gandhi
Compares its legal battle to that of legendary nonviolent civil disobeyer Read More
 

Qualcomm, Intel and Brocade join group pushing 2.5G, 5G Ethernet
The NBASE-T Alliance on Monday announced a dozen new members, including big names like Intel, Qualcomm and Brocade. Read More
 


WHITE PAPER: Code 42

SharePlan Works for the Workforce, Works for the Man
Get the executive brief and read about SharePlan—enterprise file sync and share technology that works for everyone. SharePlan supports workforce productivity and collaboration through an easy, consistent user experience while keeping files absolutely secure for the enterprise. Learn More

T-Mobile to pay $90M for unauthorized charges on customers' bills
T-Mobile US will pay at least $90 million to settle a Federal Communications Commission suit that alleged it looked the other way while third parties charged T-Mobile subscribers for services they didn't want.The settlement is the second largest ever for so-called "cramming," following one that the FCC reached with AT&T in October. It came just two days after the Consumer Financial Protection Bureau sued Sprint for the same practice.To read this article in full or to leave a comment, please click here Read More
 

1987: Jobs explains mouse to Playboy
Spotted this one on Reddit's section devoted to the "mildly interesting:" In a 1987 interview with Playboy -- which we read back then for the articles, if you recall -- Steve Jobs was asked what's up with this mouse contraption. PB: Most computers use key strokes to enter instructions, but Macintosh replaces many of them with something called a mouse––a little box that is rolled around on your desk and guides a pointer on your computer screen. It's a big change for people used to keyboards. Why the mouse?SJ: If I want to tell you there's a spot on your shirt, I'm not going to do it linguistically: "There's a spot on your shirt 14 centimeters down from the collar and three centimeters to the left of your button." If you have a spot––"There!" [He points]––I'll point to it. Pointing is a metaphor we all know. We've done a lot of studies and tests on that, and it's much faster to do all kinds of functions, such as cutting and pasting, with a mouse, so it's not only easier to use but more efficient.To read this article in full or to leave a comment, please click here Read More
 

 

SLIDESHOWS

The Onion's 10 greatest gags about Google

Here are 10 of what we believe are its better efforts.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. CentOS 7: The perfect gift for the Linux do-it-yourselfer

2. 6 aging protocols that could cripple the Internet

3. 10 predictions for IT in 2015

4. Sky's the limit for Cisco Intercloud

5. Worst security breaches of the year 2014: Sony tops the list

6. 6 simple tricks for protecting your passwords

7. Peeping into 73,000 unsecured security cameras thanks to default passwords

8. Cyberattack on German steel factory causes 'massive damage'

9. 10 IT roles to target when poaching talent

10. Full speed ahead for 802.11ac Gigabit Wi-Fi


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wide_area_networking_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: