Infosec mourns over Howard Schmidt, who helped make the country a safer place

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Net & Systems Management Alert

Mar 06, 2017
Featured Image

H-1B reform bill unites political opposites

The spectrum of support makes it possible this bill could actually pass. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Infosec mourns over Howard Schmidt, who helped make the country a safer place
Cisco expands Docker partnership, rolls Contiv open source container networking software
The 10 essential Reddits for security pros
(2006) The network industry’s most colorful story ever
AWS says a typo caused the massive S3 failure this week
MWC protest asks about the fate of 4 million recalled Note7 batteries
(2016) Did Google kill a … donkey?
Trump broke his H-1B promise. Now what?
IoT and 5G are driving computing to the edge

White Paper: GlobalSCAPE

5 Rings of Data Integration Hell

Dante's "9 Circles of Hell" depicts a journey characterized by increasing levels of an individual's depravity, and presumably, increased levels of punishment. There are corollaries when it comes to addressing data integration issues in your environment that, when not properly addressed, create severe levels of "anguish" on a daily basis. Compounded, these issues can affect company efficiency, profitability, and tenure in your current position. Read More

Thumbnail Image

Infosec mourns over Howard Schmidt, who helped make the country a safer place

Howard Schmidt advised both President Brack Obama and George W. Bush on cybersecurity. He was a CSO at Microsoft and a CISO at eBay. He led several industry groups, and wrote books on cybersecurity. But when security professionals remember him, it is not so much for his technical accomplishments as for the impact he had on the people around him. He is remembered as a mentor, a communicator, and an educator Read More

Thumbnail Image

Cisco expands Docker partnership, rolls Contiv open source container networking software

Cisco is embracing application containers in a big way with a new expanded partnership with Docker and the 1.0 release of its open source container networking platform named Contiv. Read More

Thumbnail Image

The 10 essential Reddits for security pros

Here, we’ve gathered 10 of the best cybersecurity Reddits so you don’t have to waste any time and can get straight to what you are looking for. Read More

(2006) The network industry’s most colorful story ever

A quick study of the network industry could be enough to give you the blues. Read More

Thumbnail Image

AWS says a typo caused the massive S3 failure this week

Everyone makes mistakes. But working at Amazon Web Services means an incorrectly entered input can lead to a massive outage that cripples popular websites and services. Read More

Thumbnail Image

MWC protest asks about the fate of 4 million recalled Note7 batteries

The environmental group more broadly is raising questions about the enormous amount of energy used to make smartphones since 2007 and the significant contribution batteries make to electronic waste. Read More

Thumbnail Image

(2016) Did Google kill a … donkey?

A few days ago I needed to know whether Google had actually killed a particular product or merely put it on a back burner, so I typed into the company’s search-engine box: “Did Google kill …” Read More

Thumbnail Image

Trump broke his H-1B promise. Now what?

On the campaign trail, candidate Donald Trump was so determined to present himself as the solution to H-1B visa abuse that he promised to launch an investigation on day one of his administration. That hasn't happened. Read More

Thumbnail Image

IoT and 5G are driving computing to the edge

By 2020, Intel predicts that an average user will use 1.5GB of traffic a day, and daily video traffic will reach 1PB. More data will be generated by autonomous vehicles, mobile devices and internet of things devices. Read More

White Paper: GlobalSCAPE

Be Afraid of Your Shadow: What is 'Shadow IT' and How to Reduce It

Are you making it too easy for hackers to infiltrate your system? If your employees are using unsanctioned devices and applications, then the answer is yes! Unsanctioned devices and applications can leave your IT infrastructure and data far more vulnerable to being exploited by cybercriminals. Unfortunately, it's become easier than ever for employees to access rogue applications, much to the chagrin of busy IT staff. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

5 things to think about for industrial IoT readiness

11 low-tech, decidedly cool cars Read More

Most-Read Stories

1. 10 killer Raspberry Pi projects (Collection 1)
2. 13 reasons not to use Chrome
3. AWS says a typo caused the massive S3 failure this week
4. AMD's Ryzen processor forces hefty price cuts from Intel
5. Hotel chain bets big on digital transformation and is seeing great results
6. Avaya wants out of S.F. stadium suite, not too impressed with 49ers either
7. Hottest iPad & Surface alternatives from Mobile World Congress 2017
8. 5 lessons from Amazon’s S3 cloud blunder and how to prepare for the next one
9. Iraqi hacker takes credit for hijacking subdomain, defacing Trump site
10. 7 free tools every network needs
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Net & Systems Management Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.