Search This Blog

Tuesday, February 05, 2013

Top Starting Salaries for College Technology Majors

15 tips for landing - and acing - a job interview

Hackers release iOS 6.1 jailbreak utility

Network World Daily News PM
February 05, 2013
Share this email

Top Starting Salaries for College Technology Majors

Inside the world of IT and technology the college major you choose will directly relate to what you earn after graduation. Take a look at where the money is in 2013 for new college graduates.

READ MORE
 

Issue highlights

1. 15 tips for landing - and acing - a job interview

2. Hackers release iOS 6.1 jailbreak utility

3. Anonymous posts personal data of 4,000 bankers online

4. Do you really need the Nexus 7000?

5. Lawmakers pledge to change hacking law during Swartz memorial

6. Big Data Startup Attracts Fortune 100 Clients, Venture Capital

7. Dell goes private, bought by Michael Dell and Silver Lake

8. Dell finalizes plan to go private with Silver Lake's help

9. Apparently we can wait: Obama's online privacy effort

10. Amazon lets users track their cloud-based databases with texts, email

11. MySQL 5.6 tackles NoSQL competitors

12. ACLU takes wireless carriers to task for poor Android security

WEBCAST: Apperian

Enterprise Mobile Strategy Made Easy

Explore the three essential ingredients of a successful mobile strategy, based on what really empowers mobile users; enterprise mobile apps. Considerations of what apps, where they come from and how they are installed and managed on user's devices are explored. View now.

15 tips for landing - and acing - a job interview

1. Write a great resume to open the door: Interviews are granted to those whose resumes demonstrate accomplishments, contributions and value. If you're not a great writer and you have trouble tooting your own horn, seek help from industry friends or consider a security-resume writer. READ MORE

Hackers release iOS 6.1 jailbreak utility

A program to jailbreak Apple devices running iOS 6 or above was released Monday, sparking over 100,000 downloads in the first 10 minutes of availability. The jailbreak modifies Apple's mobile firmware, letting users load applications from outside of the official AppStore, and access iOS files that Apple usually shields. READ MORE

RESOURCE COMPLIMENTS OF: BYOD & Mobile Device Management Tech Seminar

Final Day to Register! BYOD & Mobility Management

Attend and learn how to use your organization's appetite for risk as the foundation of your enterprise mobility management policy. BYOD & Mobility Management Tech Seminar. 2/12 - Westin Hotel, Long Beach, CA Click to continue

Anonymous posts personal data of 4,000 bankers online

Personal information on some 4,000 people in the banking industry, including bank officers, was posted online Sunday by the hacker collective Anonymous. READ MORE

WHITE PAPER: IBM Corporation

A Guide for a Successful ERP Strategy in the Midmarket

Combining an experienced service partner with an informed ERP strategy helps to maximize ROI. This helps midmarket organizations to contain costs, communicate effectively, and improve to grow into more successful organizations. Learn More.

Do you really need the Nexus 7000?

Since Cisco introduced the cutting-edge Nexus 7000 line in 2008, network engineers have constantly debated over the Nexus versus the Catalyst. Those who oversee Catalyst 6500-powered networks are happy with (and accustomed to) the widely used, lower-cost Catalyst switches. Nexus advocates favor the newer line's speed and virtualization capabilities. While each side has good reason to advocate for... READ MORE

WHITE PAPER: F5

Top Considerations When Choosing an ADC

Because of its strategic location in the data center network, the selection of an Application Delivery Controller requires careful consideration of both functional and financial factors. This paper explores important elements to evaluate, including network performance, availability and security. Learn More.

Lawmakers pledge to change hacking law during Swartz memorial

U.S. lawmakers pledged to rewrite an antihacking law as hundreds of people gathered in Washington, D.C., to mourn the death of Internet activist and innovator Aaron Swartz. READ MORE

Big Data Startup Attracts Fortune 100 Clients, Venture Capital

Everybody is talking about Big Data, but planning and implementing a Big Data project can be a daunting affair. Enter Think Big Analytics, a vendor-neutral services provider that aims to help large enterprises plan Big Data projects, train staff and then implement. READ MORE

Dell goes private, bought by Michael Dell and Silver Lake

Michael Dell has teamed up with investment firm Silver Lake to buy computer maker Dell, the company he founded as a 19-year-old in 1984, in a deal valued at about US$24.4 billion. READ MORE

Dell finalizes plan to go private with Silver Lake's help

In a move that's been much anticipated, Dell is going private. Michael Dell, along with investment firm Silver Lake, will acquire the company he founded by paying shareholders $13.65 per share in cash. The deal is valued at about US$24.4 billion. READ MORE

Apparently we can wait: Obama's online privacy effort

It has now been just about a year since the Obama administration put forth its online privacy blueprint. In spite of a title on the announcement that insisted "We Can't Wait," not much has happened since the blueprint was published. Meanwhile, things are heating up on the online privacy front in Europe, and the contrast between the United States and European viewpoints is and is not stark. READ MORE

Amazon lets users track their cloud-based databases with texts, email

Users of Amazon Web Services' Relational Database Service (RDS) can now keep track of their databases with new notifications via email and SMS. READ MORE

MySQL 5.6 tackles NoSQL competitors

With MySQL 5.6, released Tuesday, Oracle has updated the open-source database to make it more competitive with NoSQL data stores such as MariaDB or Cassandra. READ MORE

ACLU takes wireless carriers to task for poor Android security

The American Civil Liberties Union has called on wireless carriers to either take responsibility for Android security on the mobile devices they sell or let Google handle updates to protect the millions of people using the operating system. READ MORE

SLIDESHOWS

2013's 25 Geekiest 25th Anniversaries

A look back at the most memorable tech-related happenings of 1988.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Juniper routers open to attack

2. What's up with VMware?

3. Hackers release iOS 6.1 jailbreak utility

4. Cisco fills out SDN family with 40G switch, controller, cloud gear for data center

5. IBM kills Lotus name, but software and founders live on

6. Techiest Super Bowl 47 ads

7. 2013's 25 geekiest 25th anniversaries

8. iOS 6 untethered jailbreak released, Cydia app store flooded

9. Microsoft and Google push FCC's public Wi-Fi for free networks

10. Moving to cloud computing is harder, costlier than originally envisioned

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments: