Search This Blog

Wednesday, November 19, 2014

9 new Twitter features and tweaks; the next great leap in supercomputing

  The next great leap in supercomputing coming by 2023 | Cisco open sources security
 
 
  Network World Network/Systems Management  

9 new Twitter features and tweaks coming in 2015
Twitter came out swinging last week at its first-ever analyst day with a series of plans to improve existing features and add new ones during the coming months. The company faces challenges, but it appears to have finally moved beyond testing and experimentation to deliberate implementation. Read More
 


RESOURCE COMPLIMENTS OF: Ipswitch

Automate Your IT Network with WhatsUp Gold
Is network monitoring a time consuming, error-prone issue for your organization? WhatsUp Gold takes the hassle out of monitoring and managing your IT network by helping you track trends and plan for changes with automatic actions and repairs. Eliminate repetitive manual tasks and spend less time troubleshooting with automatic updates and repairs. Want to try out this leading network monitoring software for yourself? Click here for a free trial so you can evaluate the power of this system in your business.

WEBCAST: Ciena Corporation
 
Security+ Guide to Network Security Fundamentals
Serious IT breaches happen too often. Is there a way to reduce or eliminate the impact on consumers? Attend this Live Webinar Dec. 2nd,1:00 PM ET / 10:00 AM PT to learn methods for protecting your information resources. Learn More

The next great leap in supercomputing coming by 2023
The U.S. has set 2023 as the target date for producing the next great leap in supercomputing, if its plans aren't thwarted by two presidential and four Congressional elections between now and then. It may seem odd to note the role of politics in a story about supercomputing. But as these systems get more complex -- and expensive -- they compete for science dollars from a Congress unafraid of cutting science funding. Read More
 

Cisco open sources security
Cisco this week announced the availability of an open source security framework designed to harness big data analytics to combat data loss. Cisco OpenSOC integrates elements of the Hadoop ecosystem, such as Storm, Kafka, and Elasticsearch, to provide a platform incorporating full-packet capture indexing, storage, data enrichment, stream processing, batch processing, real-time search, and telemetry aggregation. Read More
 

How does a Windows bug go undetected for 19 years?
By now you have likely heard of the 19-year-old Windows bug found by IBM late last week. If not, here's the tl;dr version of it: IBM found a vulnerability in VBScript, Microsoft's alternative to JavaScript which was introduced in Internet Explorer 3.0 and ran on Windows 95. Even today, the bug is impervious to the sandboxing features in Internet Explorer 11. Read More
 


WHITE PAPER: IBM

Forrester 2014 Dynamic Case Management Wave
Forrester has released its 2014 Dynamic Case Management Wave, and for the second consecutive time, IBM is a leader. View Now>>

IBM's new enterprise email aims to organize your day
IBM is going up against cloud-apps powerhouses Google and Microsoft with its next generation email client, called Verse, designed to enrich email with social media and analysis. Read More
 

Extreme extends SDN products, partners
Extreme Networks this week announced new products and technology partners for its Software Defined Architecture data center product line. Read More
 

Prominent developers pulling out of Debian as voting deadline nears
Four prominent members of the Debian community have stepped down or reduced their involvement in the project as a result of an increasingly bitter argument over the future of the widely influential Linux distribution. Read More
 


WHITE PAPER: HP

Top 5 Truths About Big Data Hype and Security Intelligence
Big Data Security Analytics (BDSA) is the subject of exuberant predictions. However, a Gartner analyst points out that no available BDSA solutions come close to these forecasts. Nevertheless, the principles of Big Data are the key to advanced security intelligence. This white paper discusses the key tenets of Big Data. Learn more >>

Apple's remaining co-founders, Woz and Wayne, reminisce about early company relics
Apple co-founder Steve Wozniak yesterday said he wasn't surprised at the growing interest in early artifacts from the company, including the Apple-1, the first personal computer he designed and created. Read More
 

 

INSIDER
12 security problems that EMV and tokenization won't solve
On Nov. 1 of next year, merchants that aren't ready to accept chip-based cards instead of the current magnetic-stripe cards will become liable for fraudulent transactions that today are covered by the credit card companies. Read More
 

 

UC Berkeley, MIT and Stanford split $45M in cybersecurity policy research grants
  The Hewlett Foundation has granted $15M apiece to the University of California at Berkeley, MIT and Stanford University to conduct cybersecurity policy research, bringing to $65 the total that the foundation has committed to such research over the next 5 years. Read More
 

Net Neutrality: It's regulation for the public good, not government takeover
My good friend Chuck Papageorgiou recently wrote a post on his blog he titled Net Neutrality – Policies or Politics. Despite the fact that yesterday was Chuck's birthday, I'm going to disagree strongly with my friend. Read More
 

 

SLIDESHOWS

Pi, translated: The evolution of Raspberry Pi

It's only been two years, but the Raspberry Pi has already come a long way.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

MOST-READ STORIES of 2014

1. 20-plus eye-popping Black Friday 2014 tech deals

2. The SWAMP: How to avoid the coming software armageddon

3. 10 hottest IT skills for 2015

4. Cool Yule Tools: Best techie gifts for 2014

5. The 10 mightiest supercomputers on the planet

6. Cloud computing's not-so-secret mission

7. 10 enterprise Internet of Things deployments with actual results

8. re:Cap of AWS re:Invent: 10 cool new Amazon cloud features

9. Mobile Pwn2Own: Windows Phone does well, iPhone 5S, Galaxy S5, Nexus 5, Fire Phone fall

10. Peeping into 73,000 unsecured security cameras thanks to default passwords


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: