Search This Blog

Friday, June 19, 2015

Google-infused storage startup Cohesity reveals itself

Review: Single sign-on tools offer impressive new capabilities | Privacy groups to quit US talks on facial recognition standards

Network World Compliance

Google-infused storage startup Cohesity reveals itself
Mohit Aron has a tough act to follow: His previous startup, Nutanix, may be on the cusp of filing for an IPO that values the hyperconverged infrastructure company at $2.5 billion. But Aron is off to a good start with his new venture, Cohesity, which this week emerges from stealth mode with $70 million in venture funding, reference-able customers such as Tribune Media, and a focus on a potentially big market in converging the secondary storage that houses so much DevOps, data protection, analytics and other unstructured data. Read More


: Open Text

How Businesses Connect, Communicate, and Collaborate
Whether you're new to EDI, need to get EDI-compliant or simply want to educate your business colleagues, EDI Basics provides an easy-to-understand explanation of the fundamental concepts. View Now.

WHITE PAPER: LogMeIn

Collaboration 2.0 Death of the Web Conference
This new study from Ovum and join.me by LogMeIn is based on a survey of over 3,900 full time professionals worldwide regarding their collaboration and meeting-related behaviors and activities. Learn More

INSIDER
Review: Single sign-on tools offer impressive new capabilities
Since we last looked at single sign-on products in 2012, the field has gotten more crowded and more capable. A number of new vendors have come to ply their wares, and a number of old vendors have been acquired or altered their products.To read this article in full or to leave a comment, please click here(Insider Story) Read More

Privacy groups to quit US talks on facial recognition standards
The groups believe that the talks aren't likely to lead to adequate protections for consumers Read More


WHITE PAPER: NopSec, Inc.

Market Overview: Vulnerability Management
This new analyst report explores the key challenges to effective vulnerability risk management, how technology integration is improving the vulnerability management process, and the emerging solutions available to help organizations move beyond scanning. Learn More.

INSIDER
A guide to working with non-geeks
Are you a geek? If you are, this won't come as a news flash for you: You and the users you work with on the business side are pretty much nothing alike -- not in the way you communicate, not in the way you value various traits and not in the way you relate to work.To read this article in full or to leave a comment, please click here(Insider Story) Read More

iPhone 7 rumor rollup: Apple gets funny, iOS 9 drops hints
Humor alert! Humor alert! Yes, as it relates to Apple.And I’m not talking about the standard eye-rolling stuff of corporate dog-and-pony shows such as last week’s Apple Worldwide Developers’ Conference (WWDC) in San Francisco. Nope, here we have Apple enlisting the aid of former SNL comic Bill Hader, who shares a humorous behind-the-scenes peek at what could have been at WWDC… Alas, there were no iPhone 6S or iPhone 7 rumors in there, just a goat and some larger-than-life fingers. But the actual WWDC’s introduction of iOS 9 did spark speculation about the next flagship iPhones.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Kaspersky Lab, Inc.

Top 10 Tips for Educating Employees about Cybersecurity
Do you know the most common risk factor for corporate cybercrime? Employees. Download Kaspersky Lab's Top 10 Tips for Educating Employees about Cybersecurity to learn: • Why and how to develop an effective security policy • Examples of common threats to employees and your business • Tools to reduce risk and cybercrime Learn More

9 hot enterprise storage companies to watch
  Amidst all the venture investments this year in startups that generate gobs of data -- from those focused on everything from apps to drones to the Internet of Things to Big Data -- are a batch of newcomers aiming to help organizations store and access all that information. Yes, storage companies are pulling in big bucks in 2015, as they did in 2014, and a couple have even double-dipped this year and announced two rounds of funding.To read this article in full or to leave a comment, please click here Read More

INSIDER
Threat intel sharing: Security breakthrough or flavor of the month?
Threat intelligence sharing has become the "new black" in the world of enterprise security, a trendy buzzword that has become ubiquitous at industry conferences and in vendor marketing pitches. But what exactly is threat intelligence sharing and are we using it effectively to defend against cyberattacks?To read this article in full or to leave a comment, please click here(Insider Story) Read More

Amazon now an open book on search warrants and subpoenas
Amazon has published its first transparency report, years after some of its rivals Read More

INSIDER
Cloud fears fizzle, mission-critical deployments sizzle
As concerns fade, the need for agility drives IT to move mission-critical apps to the cloud. Read More


SLIDESHOWS

5 low-cost Wi-Fi stumblers and analyzers

Wi-Fi stumblers and analyzers are a must-have when troubleshooting Wi-Fi interference and performance issues, or when checking channel usage.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Google-infused storage startup Cohesity reveals itself

2. Day One with Windows 10: Things get ugly

3. Tired of sitting all day? Tech pros take a stand

4. AT&T looking at white boxes as CPE

5. 19 free cloud storage options

6. iPhone 7 rumor rollup: Apple gets funny, iOS 9 drops hints

7. First Look: How will Windows 10 play on tablets

8. Why you should read What is Code?

9. Rackspace creates career path for tech execs who don't want to manage people

10. Vote for the Xbox 360 games you want to play on your Xbox One

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **