Search This Blog

Monday, March 23, 2015

Top enterprise IT companies where people want to work

4 ways to beat the Big Data talent shortage | Pwn2Own hacker earned $916 a second for pounding Chrome, but all big browsers busted

Network World Network/Systems Management

Top enterprise IT companies where people want to work
Poachable, a Seattle startup that specializes in connecting passive job-seekers with companies looking to hire, says enterprise network and IT companies such as Microsoft, IBM and Cisco are among the most desirable places to work. But largely consumer-focused companies, like Google, Apple and Amazon, are even more attractive. Read More


RESOURCE COMPLIMENTS OF: Ipswitch, Inc

9 Noble Truths of Network, Server & Application Monitoring
The 9 Noble Truths of Network, Server & Application Monitoring, to hear from Network World's Jim Metzler on how IT teams can thrive while dealing with an increasingly large and complex environment and requirements to constantly "do more with less" and deliver near-zero downtime. View on-demand now!

WEBCAST: IBM

ING Transforms DevOps to Reduce Cost and Speed Delivery
ING, one of the largest banks in Europe needed to reduce the high cost of isolated, inefficient application development. They chose IBM PureApplication System to move their IT infrastructure to a cloud-based shared service model. In this Webcast, ING executive, Mark Willemse, shares the lessons ING learned from this strategic initiative. Learn more

INSIDER
4 ways to beat the Big Data talent shortage
There is no doubt that Big Data has become a growth market, and is becoming one of the few on-premises projects seeing increased spending, as companies move less data-sensitive functions to the cloud. (Insider Story) Read More

Pwn2Own hacker earned $916 a second for pounding Chrome, but all big browsers busted
Imagine earning $916 a second for period of two minutes; that's what one security researcher raked in during the Pwn2Own contest at the CanSecWest security conference in Canada. South Korean security researcher JungHoon Lee, aka lokihardt, walked away from Pwn2Own with $225,000 and the laptops he used to exploit the browsers. Read More

Bare-metal switches poised to take off in data centers
Bare-metal switches that can be programmed like Linux servers aren't just for big Web companies anymore. They may show up in a lot more average enterprises in the next few years.Cloud-based service providers like Facebook and Google have been building data-center networks out of generic hardware and homegrown software for years. Now vendors including HP and Dell are beginning to sell switches much like they do bare-metal servers. They may pre-load an operating system and provide ongoing support, but that OS is open and their customers will have much more freedom with this new kind of gear than they do with traditional switches from vendors like Cisco Systems.To read this article in full or to leave a comment, please click here Read More


WEBCAST: Level 3 Communications

Strategies for Securing Hybrid Workloads
During this Live Webinar on April 2 @ 1PM EST, experts from Cisco, Amazon Web Services and Level 3 will discuss how you can combine industry-leading encryption and networking technologies to seamlessly and securely unify your IT environment with the cloud. Learn More

FAA deems Amazon delivery drowns 'airworthy,' with heavy regulations
The Federal Aviation Administration announced that it issued an 'experimental airworthiness certificate' to Amazon, allowing it to legally use drones for 'research and development and crew training.' Read More

'Compliance fatigue' sets in
Compliance with information security regulations is supposed to be, as the most recent iteration of the PCI DSS (Payment Card Industry Data Security Standard) puts it, 'business as usual.' But many organizations feel like they are drowning in such a sea of regulations that constant compliance with them all doesn't give them much time to run their usual business. Read More

Cisco small business phones open to remote eavesdropping, calling
You don't need to be the NSA to tap calls on Cisco's SPA 300 and 500 IP phones: An authentication flaw allows potential attackers to do that by default. Read More


WEBCAST: Nasuni

What You Need to Know About Connected Storage
Watch this exclusive video webcast with Fred Pinkett, Senior Director of Product Marketing at Nasuni, and learn how to overcome the challenges of the traditional storage stack through "connected storage." Learn More

INSIDER
The H-1B visa debate: Pain and the politics
This week's hearing by the Senate Judiciary Committee concerning the H-1B visa program offered a compendium of thought, insight and friction. (Insider Story) Read More

EMC pools enterprise smarts to create data 'lakes'
EMC is drawing on its federation of companies to help customers build data lakes using EMC storage, VMware virtualization and Pivotal big-data smarts. Read More

Six features coming to Tableau's new BI analytics suite
Tableau Software will release a big update to its business intelligence software in the coming weeks, promising that customers will be able to spend more time on data analysis and less on data wrangling. Read More


SLIDESHOWS

Google Inbox: A guided tour

This guide compares and contrasts Gmail with Inbox to help you get started with what could become Google's next-generation email service.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Windows 10 will end OS reinstall headaches

2. EMC eying Arista, Brocade?

3. Cisco replaces UCS server head; software leaders also depart

4. A visual history of Microsoft's Internet Explorer

5. After hitting Raspberry Pi 2, Windows 10 will head to Qualcomm's board

6. Custom browsers that crush Chrome, Firefox, and IE

7. Is it time to adopt a military-style approach to cyber security

8. IT manager gets certificate for Microsoft domain, tries to report it but gets in trouble

9. To avoid NSA, Cisco gear gets delivered to strange addresses

10. What network technology is going to shake up your WAN?


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: