Search This Blog

Monday, March 19, 2012

How to get a hot job in big data

Apple announces dividend and stock buyback plans | Techie business cards

Network World Daily News AM

Forward this to a Friend >>>


How to get a hot job in big data
The big data revolution is creating a new breed of business-IT jobs -- and threatening to destabilize dyed-in-the-wool IT careers Read More


RESOURCE COMPLIMENTS OF: Microsoft

Try Microsoft Office 365, free
Collaborate in the cloud with Office, Exchange, SharePoint, and Lync videoconferencing. Access, edit, and share documents. Starting at $8/user/month. Try it free.

WEBCAST: Motorola Mobility

Authentication, Certificates and VPNs
MOTODEV for Enterprise can help get you up to speed quickly on key topics such as how to enable secure access to a company intranet from outside the firewall. This webinar provides a clear explanation of terms and technologies and what they can do for your enterprise app development. View Now

Apple announces dividend and stock buyback plans
Following a frenzy of media speculation, Apple minutes ago announced what it intends to do with the enormous pile of cash it's been hoarding: Reward investors with a quarterly dividend and initiate a stock repurchase plan. Read More

Techie business cards
Some examples of how to get creative with an overlooked medium Read More

How GSA is securing its cloud apps
As the General Services Administration (GSA) migrates to a work-anywhere, work-anytime strategy, the real estate arm of the U.S. federal government is discovering that having an iron-clad security strategy is critical to its adoption of cloud-based applications. Read More


WEBCAST: Mitel

Real World Perspectives from Real World Practitioners
Join your peers as they discuss Unified Communications and their move to voice virtualization—the business drivers behind their decisions, the benefits they've received and the best practices they've learned along the way. It's a must-see event for joining voice and data on a single virtualized infrastructure. Learn More

Review: Android-based Wi-Fi stumblers (free registration required to view this Insider story)
Wi-Fi stumblers are handy when checking for channel usage, signal strength, security status, and detecting rogue access points, in situations where enterprise-level tools aren't necessary. We recently reviewed stumblers for your PC or laptop. Here's a look at a few Wi-Fi stumblers for your Android smartphone or tablet, which makes it even more convenient for quick and simple wireless checks. Read More

CIA wants to spy on you through your appliances
You know how sometimes you hunt for an item that you have misplaced? A really cool aspect of the 'Internet of Things' could allow you to ask, What did I do with my remote control? The computer could tell you precisely where it is. What did I do with my book? You might get an answer like, It's at Tom's house on his coffee table. Now think about the bigger picture and combine the Internet of Things with... Read More

Windows 8 raises concern for developers
The Ultimate Beer Ranger application written by Sonoma Partners for Ft. Collins, Colo., beer maker New Belgium Brewing points up a problem with Windows 8 that needs to be addressed before long: under what circumstances can such applications run on Windows on ARM devices? Read More


WHITE PAPER: SuccessFactors

Beyond Simple Total Cost of Ownership
When considering new applications, the question has always been "Build or Buy?" But increasingly today, it's "Buy or Rent?" In this paper, we analyze the implications and costs of purchasing and implementing cloud-based software (SaaS) vs. traditional on-premise software. Get your copy now, compliments of SuccessFactors. Learn More Now!

Blue Coat unifies security reporting in cloud service, appliances
Blue Coat Systems today said it's unified the real-time reporting in its cloud-based security service with that in its full line of ProxySG security appliances so that enterprises receive real-time information related to both. Read More

Soon after release, latest iPad model is jailbroken
Hackers claimed to have figured out a way to bypass Apple's technical restrictions and install unauthorized applications on the company's latest iPad upon its release last Friday. Read More

Researchers find cellphones may harm offspring, help people with mental illness
Yale School of Medicine researchers have found in studies using mice that exposure to radiation from cell phones during pregnancy can lead offspring to develop hyperactivity. Read More

Apple Factory Scrutiny Likely to Continue Despite Critic's Fabrications
Apple factories in China will continue to be scrutinized despite a monologist's admission that he fabricated some of his reports on worker conditions there. Read More

It's a Great Time to be Looking for an IT Security Job
24 percent of companies say they didn't have a computer security incident last year. Who are these people? Read More



SLIDESHOWS

Useful security threat data advisory tools
Check out these browser-based tools to keep up on the latest cyber security threats.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Judea Pearl, a big brain behind artificial intelligence, wins Turing Award
  2. China's rare earth stranglehold
  3. Cisco pays $5 billion for video company
  4. New iPad wins rave reviews
  5. Video game art: Smithsonian exhibit celebrates 40 years of creativity
  6. IBM battles dire mainframe myths
  7. Developer cooks up 30-day 'Butter Egg Challenge'
  8. Identity management in the cloud emerges as hot-button issue for CIOs
  9. 40% of U.S. government Web sites fail security test
  10. Kaspersky Lab spots malware signed with stolen digital certificate

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: