Search This Blog

Wednesday, August 13, 2014

Texas, Florida, North Carolina lead IT job growth in first half of 2014

Fifteen new vulnerabilities reported during router hacking contest | Microsoft to support fewer IE versions

Network World Network/Systems Management

Forward this to a Friend >>>


Texas, Florida, North Carolina lead IT job growth in first half of 2014, study finds
U.S. technology professionals searching for jobs may want to look in states not normally considered IT hot spots. Read More


WHITE PAPER: CDW

The Capacity Boost You Can Expect from WAN Optimization
WAN optimization techniques tweak bandwidth for better network performance and more. Read Now

WHITE PAPER: BMC Software

10 Steps to Reducing Mainframe MLC Costs
Monthly license charges (MLC) are rising by 7% or more each year, and account for 30% of total mainframe costs. Yet managing MLC costs is an inexact science. Learn More

Fifteen new vulnerabilities reported during router hacking contest
Five popular router models were hacked during the SOHOpelessly Broken competition at DefCon 22. Read More

Microsoft to support fewer IE versions
Microsoft has started a 17-month campaign to upgrade customers to the newest version of Internet Explorer that their operating systems will support, which should make it simpler for the company to keep the browser secure because it will have fewer versions to deal with. Read More

IBM opening two state-of-the-art disaster recovery/resiliency centers
IBM is about to cut the ribbon officially opening two new state-of-the-art data centers intended to provide disaster recovery and resiliency services, one in the Raleigh, N.C. area and other in Mumbai, India. Read More


WHITE PAPER: BMC Software

Five Levers to Lower Mainframe MLC Costs
This paper discusses five levers you can use to lower your mainframe MLC costs by up to 20 percent or more. Explore best practices and real-world examples of dramatic savings through a mainframe MLC optimization strategy based on higher visibility, predictability, and automation. Learn More

Big Data scientists get 100 recruiter emails a day
A lot of people—myself included—have long been talking about how big data changes everything. But big data's biggest disruption may be in the high-tech labor market. Read More

Former exec says HP 'bungled' the Autonomy acquisition, alleges cover-up
Autonomy's former chief financial officer has claimed that Hewlett-Packard is accusing him and other ex-employees of fraud in order to cover up its own failings in the disastrous 2011 acquisition. Read More

Splunk digs deeper with Stream app for network monitoring
Splunk's new App for Stream will give IT departments more insight into their infrastructures by collecting network traffic on response times, network performance and database queries. Read More


WHITE PAPER: Aerohive

The New Mobility: Astonishingly Simple and Powerful
Mobility has not only changed how we live, it is also dramatically changing the network infrastructures that we rely on. For the better. As organizations cope with a tidal wave of mobile users, mobile applications, and demand for pervasive access, it's becoming clearer that prior-generation approaches to providing mobility are breaking. Learn more

Google backs $300 million undersea Internet cable to Japan
Google is joining forces with five Asian telecommunications firms to build and operate an underwater cable system from the U.S. to Japan to support rising bandwidth usage and better link its data centers in other parts of the world. Read More

Malware is less concerned about virtual machines
Many malicious software programs used to make a quick exit on virtual machines, a tactic designed to avoid a security check. But that isn't the case anymore, according Symantec research. Read More

Study finds firmware plagued by poor encryption and backdoors
Firmware within the 'Internet of Things' could pose opportunities for hackers, researchers find. Read More

Amazon protects its virtual desktops with two-factor authentication
Amazon Web Services now lets enterprises use two-factor authentication to better protect hosted WorkSpaces virtual desktops. Read More


SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Netscout sues Gartner over Magic Quadrant rating

2. Why TCP/IP is on the way out

3. Amazon Fire Phone: Nice but nothing to get fired up about

4. Rackspace bows out commodity IaaS market in favor of 'managed cloud'

5. Cisco's new UCS fabric interconnect: no ACI?

6. Smartphone kill-switch bill passes California assembly

7. Emerging networking technology used by Apple, Cisco will frustrate firewalls

8. IBM/DARPA turn out brain-like 5-billion transistor superchip

9. 10 ways to get noticed at Black Hat

10. Top 20 colleges for computer science majors, based on earning potential


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: