Search This Blog

Thursday, February 21, 2013

Where marketing execs are spending all those tech dollars

  Yahoo! home pages through the ages | 12 Networking Tips for Shy and Anti-Social IT Pros
 
  Network World After Dark

Forward this to a Friend >>>


Where marketing execs are spending all those tech dollars
When you think of technology spending at a company, you probably assume the IT department disperses nearly all the money, with a small percentage going to departmental tech like smartphones and cloud services. But according to Laura McLellan, Gartner's vice president of marketing strategies, 50 percent of IT spending outside of the IT budget goes through marketing departments -- on top of IT's expenditures on marketing technology. In fact, by 2016, 80 percent of marketing tech investments will come outside of IT, Gartner predicts. Read More


WEBCAST: CA Technologies

CA APM and CA APM Cloud Monitor
CA Technologies Application Performance Management (CA APM) provides advanced application and infrastructure monitoring to ensure optimal business service performance. Watch this flash demo to see how CA APM enables IT operations and line of business owners to reduce revenue risks and keep customers loyal. Learn More

WHITE PAPER: BlackBerry

What BlackBerry Customers Can Expect, Today and Tomorrow
Have questions about what BlackBerry® 10 can do for your organization both now and down the road? Find the near-term and forward-looking answers you need right here. Learn More

Yahoo! home pages through the ages
Looking back at how Yahoo's home page has changed over the years tells you a lot about the company - and the world around it. Read More

12 Networking Tips for Shy and Anti-Social IT Pros
Being an introvert isn't the end of the world or your career. However, to be successful in the IT field today, you've got to overcome shyness and learn that it's OK to ask for (and offer) help. Read More

NASA spots giant, fast-growing sunspot that could lead to big solar flares
NASA's sun-watching telescope, the Solar Dynamics Observatory, this week spotted and watched a giant sunspot -- over six Earth diameters across-- form in under 48 hours. Read More

MWC2013: Mobile hardware, application trends at upcoming Mobile World Congress
MWC2013: Mobile hardware, application trends at upcoming Mobile World Congress Nick Barber talks with IDC's mobile phone research manager Ramon Llamas about hardware and software trends at the upcoming Mobile World Congress in Barcelona. Our coverage begins Sunday, February 24, 2013. More tech news: www.networkworld.com From: networkworld Views: 54 5 ratings Time: 08:18 More in Science & Technology Read More

I, for one, am going to miss implosions
One of my great memories of living in Boston back in the 1980s was going downtown early one morning to watch the 30-story Travelers Insurance Building imploded in March of 1988, as shown here. But a Japanese construction company has developed a way to tear down a building without the noise, smell or dust caused by conventional demolition, according to this Reuters report (hat tip to colleague Jon... Read More

All-seeing Big Bro Domain Awareness System coming to all 34,000 NYPD cops
Do you recall the all-seeing Big Brother and terrorism prevention system that Microsoft and the New York Police Department launched in August 2012, otherwise called the Domain Awareness System? Read More

Notification of .edu server breach mistaken for phishing email
The administrators of 7,000 university websites are being required to change their .edu domain account passwords after a security breach ... one that was reported to them by Educause, the non-profit higher-education IT group that administers .edu, via an email that some complained bore the markings of a phishing attempt. First the breach. From a statement issued yesterday by Garth Jordan, vice president... Read More

EDUCAUSE/Internet2 call on college students to create security awareness videos, posters
Why do I have the feeling there might be more than one Harlem Shake-related video in this contest? EDUCAUSE and the Internet2 Higher Education Information Security Council (HEISC) are holding a contest in search of two-minutes-or-less information security awareness videos and posters developed by college students for college students. Read More

How to hack the certificate for a Cisco Identity Services Engine node
I just got back from a few weeks traveling around Europe, presenting at Cisco Live Europe, and meeting with customers and partners. It is obvious that this blog is very much needed for a lot of the deployments that we discussed, so as promised in the Load Balancing Blog, I am following up with a blog on how to "hack" the certificate for a Cisco Identity Services Engine (ISE) node, so that we may include... Read More

2013 job watch: Top 11 metro areas for tech jobs
Looking for a new IT job? Or a change of scenery? Across the U.S., companies are looking for IT pros with skills that can drive profits -- such as data analytics, software development and project management. But where is demand highest? Read More

Verizon's latest 4G mobile hotspot impresses
Shaw reviews Verizon's Jetpack 4G LTE Mobile Hotspot MiFi 5510L. Read More

Products of the week 2.18.13
Our roundup of intriguing new products from companies such as Sophos and WatchGuard Read More

 
 
 

SLIDESHOWS

13 of the biggest security myths busted

13 myths about information-technology security you'll hear but should you believe?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Notification of .edu server breach mistaken for phishing email

2. First look: Firefox 19

3. Dell: We can beat Cisco in enterprise and cloud security

4. The beginning of the end of BYOD as we know it

5. Petition to legalize cell-phone unlocking tops 100,000 signatures

6. Microsoft Azure overtakes Amazon's cloud in performance test

7. Cisco declares war on Microsoft unified communications system

8. The Samsung Galaxy S 4 shows up in New Zealand, and on an AT&T stat sheet

9. iPhone 6 rumor rollup for the week ending Feb. 15

10. U.S. students get cracking on Chinese malware code

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: