Search This Blog

Friday, April 17, 2015

IBM opens up its threat data as part of new security intelligence sharing platform

  Techiest college commencement speakers of 2015 | Boston Marathon runners warned not to overshare on social media

 
  Network World Compliance  

IBM opens up its threat data as part of new security intelligence sharing platform
The IBM X-Force Exchange platform will allow companies to share and compare data from security incidents Read More
 


WEBCAST: ActiveState

Docker is not Enough
Join this Webcast to hear how to overcome Docker limitations by leveraging a necessary layer of orchestration that allows developers to maximize the potential of Docker. Learn More.

WHITE PAPER: IBM

IDC: Enterprise Social Software Forecast
In spite of everything that's changing with Enterprise Social Networks, some things are staying the same: IBM was ranked as the market leader for enterprise social software for the fifth year in a row. Learn More

Techiest college commencement speakers of 2015
  Commencement speakersColleges and universities across the country have begun touting their Class of 2015 commencement speakers, including some of the biggest names in the technology industry. The tech industry has been well represented over the years, with everyone from Steve Jobs (Stanford, 2005) to Bill Gates (Harvard, 2007) sharing words of wisdom. Here's a look at who will be speaking in 2015. (LOOK BACK at 2014's top techie commencement speakers)To read this article in full or to leave a comment, please click here Read More
 

Boston Marathon runners warned not to overshare on social media
The Boston Athletic Association (BAA) has warned participants in next Monday's Boston Marathon against posting high-res images of their bib numbers on social media sites like Facebook and Twitter, or risk having their results wiped out. Read More
 

 

INSIDER
Using a private cloud to keep the coffee on at Dunkin Donuts
When four regional Dunkin Donuts suppliers merged in 2012, they integrated their workers and processes, but they did not initially merge their IT systems and data. However, pulling in major partners that will work with a company as it moves through a major IT undertaking is no easy task.To read this article in full or to leave a comment, please click here(Insider Story) Read More
 

 

New cyberthreat information sharing bill may be more friendly to privacy
The new bill still allows companies to share some unnecessary personal information with government agencies, a critic says Read More
 


WHITE PAPER: IBM

IBM Connections Cloud Mobility
Combining the power of cloud computing with the freedom and functionality of mobile devices can give enterprises access to a wide range of key benefits, including increased reliability, real-time updates and access to applications that embrace and cultivate the spirit of collaboration and community. Learn More>>

Dropbox to pay security researchers for bugs
Dropbox has not set a maximum reward Read More
 

Moore's Law at 50: The past and future
When you're strapping on the latest smart watch or ogling an iPhone, you probably aren't thinking of Moore's Law, which for 50 years has been used as a blueprint to make computers smaller, cheaper and faster.Without Moore's Law it's quite possible that new types of computers like Microsoft's HoloLens, a holographic wearable with which users can interact with floating images, would not have been developed. For decades, Moore's Law has been a guiding star for the development of modern electronics, though in recent years its relevance has been subject to debate.Moore's Law isn't a scientific theory, but a set of observations and predictions made by Intel co-founder Gordon Moore in an article [click here to download] first published in Electronics Magazine on April 19, 1965, which were subsequently modified. His core prediction states that the density of transistors, or the number of transistors on a given die area, would double every two years, which leads to double the performance. Loosely translated, that means in 18 to 24 months you could buy a computer that is significantly faster than what you have today with the same amount of money.To read this article in full or to leave a comment, please click here Read More
 

VMware helps CIOs tunnel their way to more secure mobile apps
VMware's goal is to make it easier for administrators to control what apps and resources mobile users can access Read More
 

Microsoft Patch Tuesday: The patches just keep coming
  Microsoft's latest round of patches covers Internet Explorer, Windows, Office and other Microsoft products Read More
 


WHITE PAPER: IBM

Accelerate Business Operations with Cloud
IBM Software-as-a-Service solutions for business operations accelerate innovation and deliver secure, always up-to-date collaborative solutions. Learn More>>

We weren't kidding about Microsoft's startup shopping spree
As I wrote last week ("What's behind Microsoft's not-to-crazy startup spending spree?"), the Redmond company has been making acquisitions at an historic rate to start the calendar year. And today we hear that Microsoft has consumed yet another firm: Datazen, a Toronto maker of mobile business intelligence and data visualization technology for Windows, iOS and Android devices.  Datazen Datazen analytics for mobile devicesTo read this article in full or to leave a comment, please click here Read More
 

MIT alums celebrate 10th anniversary of bogus CompSci paper generator with cheeky new tool
Three MIT grads this week are celebrating the 10th anniversary of their clever SCIgen program, which randomly generates computer science papers realistic enough to get accepted by sketchy technical conferences and publishers, with a brand new tool designed to poke even more fun at such outfits.Just a bit late for April Fool's Day, the new SCIpher program from the MIT Computer Science and Artificial Intelligence Lab alums enables users to hide messages inside randomly-generated calls for papers from phony conferences whose names are so ridiculous that they sound legit. An MIT spokesman says the new tool is really just a way for geeky friends to mess with each other.To read this article in full or to leave a comment, please click here Read More
 

 

INSIDER
Drones in the enterprise: The future of data collection
To hear some tell it, the world will soon be abuzz with small drones that inspect bridges, monitor pipelines, survey crops and help assess damage for insurance claims.To read this article in full or to leave a comment, please click here(Insider Story) Read More

 

More real-world oddball tech job interview questions
OddballAfter online jobs/career marketplace Glassdoor issued its annual list of Oddball Real-World Job Interview Questions we followed up to see if they had additional ones more relevant to the enterprise Network and IT companies Network World writes about. Here's what they came up with: To read this article in full or to leave a comment, please click here Read More
 

 

SLIDESHOWS

First Look: Microsoft's new Spartan browser for Windows 10

Here's what sets Spartan apart from Internet Explorer.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Will containers kill the virtual machine?

2. Thieves using a $17 power amplifier to break into cars with remote keyless systems

3. Boston Marathon runners warned not to overshare on social media

4. Who's behind Linux now, and should you be afraid?

5. Nokia/Alcatel-Lucent just as John Chambers predicted

6. Microsoft's Spartan browser vs. the rest: How will it stack up?

7. elementary OS team releases 'Freya,' a Linux distro you'll want to see

8. Security pros name their must-have tools

9. Fave Raves: 34 tech pros share favorite IT products

10. Microsoft Patch Tuesday April 2015 closes 0-day holes: 4 of 11 patches rated critical


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: