Search This Blog

Tuesday, March 06, 2012

'Big data' creating big career opportunities for IT pros

A deep dive into Windows 8 Consumer Preview | iPad HD - What Apple's calling its next-gen tablet

Network World Daily News AM

Forward this to a Friend >>>


'Big data' creating big career opportunities for IT pros
New job opportunities are emerging for IT professionals in the field of "big data," the term used to describe how corporations gather vast amounts of real-time data about their customers and analyze that data to drive decision making and increase profitability. Read More


RESOURCE COMPLIMENTS OF: Avaya

Avaya Mobile Collaboration
Read a complimentary Frost & Sullivan white paper: Prepare Your Enterprise for the Mobile Revolution. The world is becoming increasingly mobile. Learn how to keep costs in check, boost user productivity, deliver a consistent experience, and maintain a single, manageable corporate identity for all end-users.

RESOURCE COMPLIMENTS OF: Citrix

Ready for 2048-bit SSL? Not with F5.
The Iron Age is officially over. The Cloud Age is here. Don't let stronger security compromise performance. NetScaler gives your network a competitive edge with the industry best 2048-bit SSL transaction/sec performance. 2x faster SSL performance than F5. 50% lower SSL costs. Download the Citrix and Verisign White Paper and the NetScaler vs. F5 Performance Comparison now.

A deep dive into Windows 8 Consumer Preview
Windows 8 Consumer Preview offers a new look at Microsoft's upcoming interface for both computers and tablets. Is one device being shortchanged in favor of the other? Read More

iPad HD - What Apple's calling its next-gen tablet
Say goodbye to the iPad 3 and instead say hello to the iPad HD. A number of sources are now relaying that Apple's next-gen tablet will be dubbed the iPad HD, an overt reference to its expected 2048 x 1536 Retina Display. Read More

A $500,000 bet on Internet security
Longtime cloud security advocate Philippe Courtot believes he has identified the Achilles' heel of cloud security, and he wants to protect it. Read More

Slashdot founder Malda lands at Washington Post
When last we left Rob "CmdrTaco" Malda, he was recounting (along with his wife) the experience of having proposed marriage to her 10 years ago this past Valentine's Day ... in a memorably public manner: on the homepage of Slashdot, the tech news site that he founded. Read More


RESOURCE COMPLIMENTS OF: CloudPassage

CloudPassage
Companies like Foursquare, StrongMail, and ExoIS are taking charge of cloud server security using Halo from CloudPassage, which ensures easy, scalable, and automated security for dynamic cloud environments. Register today to Secure 25 Cloud Servers for Free with Halo Basic.

The story of the Picasso and a 1.5 ton robot
Spanish telecom firm Telefonica built a robot to digitally image and look for problems with Pablo Picasso's famous 'Guernica' painting Read More

One man's food-recall alert is another's raw meet
The U.S. Department of Agriculture recently set up state-by-state Twitter accounts through which followers "will receive alerts about recalls of meat, poultry and processed egg products. " Read More

Intel's Romley products could put crimp in competition
The upcoming launch of products powered by Intel's new Romley platform could make waves in the server sector, according to experts. Read More

Cloud consultants Cloud Sherpas, Global One merge
Cloud Sherpas and Global One, which advise clients in implementing cloud-based Software as a Service applications, have merged in what is a sign of the continually busy M&A activity in the SaaS market. Read More


WHITE PAPER: Dell

Mobility KnowledgeVault
How "mobile ready" is your infrastructure? This Mobility Knowledge Vault provides a wide variety of expert advice on how to strike a balance between end user ease-of-use and security. View now

Tips for developing a mobile device management strategy
As more employees bring personal devices to work, companies want to strike a balance between being agents of change and adaptation to mobile technology and safeguarding data. Rolling out mobile device management often means choosing unpopular rules. Read More

Google patches 14 Chrome bugs, pays record $47K in bounties and bonuses
Google yesterday patched 14 vulnerabilities in Chrome and handed out a record $47,500 in rewards to researchers, including $30,000 for "sustained, extraordinary" contributions to its bug-reporting program. Read More

Privacy not in Eric Schmidt's vision of the future
Google Chairman Eric Schmidt painted a messianic picture of our technological future on Monday, involving holographic telepresence, self-driving cars, automatic translation and the widespread deployment of 1Gbps Internet access over optical fiber, bringing transnational peace and communication to all. Read More

New Job Search Service Helps Job Seekers Penetrate Applicant Tracking Systems
Preptel's "ResumeterPro" service claims to increase job seekers' chances of landing job interviews and offers, first by helping job seekers get through applicant tracking systems, then by providing job seekers with competitive intelligence on other candidates applying for the same job. CIO.com investigates whether it's worth your money. Read More



SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. iPad 3 pricing to remain the same as the iPad 2
  2. Warning: you may be an e-hoarder
  3. Investment firm warns of delays, performance issues in Juniper products
  4. 15 high-tech wristwatches that would make Dick Tracy jealous
  5. Anonymous supporters victims of Zeus Trojan Horse
  6. Should you allow inbound e-mail over IPv6?
  7. Giving up your iPhone
  8. Siemens launches new VoIP/UC platform
  9. How to catch an Internet cyber thief
  10. The future of end user computing

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: