Computing conference to celebrate 50 years of Turing Award

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Compliance Alert

Feb 03, 2017
Featured Image

6 things software vendors need to know about HIPAA compliance

Dizzion provides suggestions for ways vendors can maintain HIPAA compliance while still focusing on their primary business objectives. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Computing conference to celebrate 50 years of Turing Award
25 Valentine's Day gifts inspired by tech, science and math
RSA 2017: The Internet of Things security threat
Apple's Mobility Partner Program comes out of hiding
(From our archives) Researchers make low-power Wi-Fi breakthrough
Internet Hall of Fame making a comeback in 2017
(From our archives) Router man: Creator of multiprotocol router reflects on development of device
SSL or IPsec: Which is best for IoT network security?
iPhone 8 Rumor Rollup: Paying a price for cool & an Apple-of-your-eye camera design

White Paper: Leidos

4 Challenges Facing Every Security Operations Center Manager

A comprehensive look at the top four challenges facing your security operations is the first step to mitigating them. Why not approach them as opportunities to strengthen your cybersecurity posture and better protect your assets! This white paper discusses the universal challenges facing every SOC: Resource allocation, Threat alert management, Vendor dependencies, Intelligence standardization Read More

Thumbnail Image

Computing conference to celebrate 50 years of Turing Award

The Association for Computing Machinery (ACM) has announced it will celebrate 50 years of the A.M. Turing Award -- dubbed the "Nobel Prize of Computing -- with a (tech) star-studded conference in San Francisco this summer. Read More

Thumbnail Image

25 Valentine's Day gifts inspired by tech, science and math

Valentine's Day gifts offer a techie alternative to the usual flowers, jewelry and candy. Read More

Thumbnail Image

RSA 2017: The Internet of Things security threat

RSA Conference 2017 will take on the threat posed by the internet of things, something that was demonstrated last fall by the DDoS attacks that took down Dyn data centers and many of the high-profile Websites it supports. Read More

Thumbnail Image

Apple's Mobility Partner Program comes out of hiding

You won’t find many public references by Apple to its Mobility Partner Program, an expanding effort by the company to unite with software developers/integrators to boost sales of iPhones and iPads to businesses. But the veil of secrecy surrounding the program is thinning. Read More

Thumbnail Image

(From our archives) Researchers make low-power Wi-Fi breakthrough

The biggest downside of Wi-Fi for most users might be that it can really drain your smartphone or tablet battery, but a research team at the University of Washington has come up with a way to make using the nearly ubiquitous wireless technology in a less taxing way. Read More

Internet Hall of Fame making a comeback in 2017

The Internet Hall of Fame, a virtual museum celebrating the living history of the Internet, is back seeking a new class of inductees in 2017 after going quiet for the past couple of years. Read More

Thumbnail Image

(From our archives) Router man: Creator of multiprotocol router reflects on development of device

William (Bill) Yeager, 66, creator of the multiprotocol router, reflects on the development of the device that fueled the growth of networking. Read More

Thumbnail Image

SSL or IPsec: Which is best for IoT network security?

Network-based encryption such as SSL and IPsec can help guard against security threats to IoT gateways and devices. For this writer, IPsec is the better option. Read More

Thumbnail Image

iPhone 8 Rumor Rollup: Paying a price for cool & an Apple-of-your-eye camera design

Apple credited iPhone 7 sales for its strong Q1 results, but it's time to look ahead toward the iPhone 8. Read More

White Paper: Leidos

5 Steps to Develop a Successful Insider Threat Detection Program

A comprehensive look into how organizations can develop and implement a successful insider threat detection program. This white paper outlines the five steps to success: Gain Leadership Support, Leverage the Latest Technology, Develop a Communications Plan, Execute a Training and Awareness Campaign, Establish a Governance Structure Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Top 10 technology colleges and universities

7 (more) security TED Talks you can’t miss Read More

Most-Read Stories

1. Cops use pacemaker data to charge homeowner with arson, insurance fraud
2. Game over for Solaris and SPARC?
3. Apple's Mobility Partner Program comes out of hiding
4. Serverless computing’s future is now – and why you should care
5. 19 free cloud storage options
6. AT&T wants to be the Linus Torvalds of network software
7. Now Cisco can even network your building systems
8. Google's crazy cool offices
9. 7 free tools every network needs
10. The $475 S key
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Compliance Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.