2016’s notable deaths in technology, science & inventions

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Compliance Alert

Dec 09, 2016
Featured Image

The Trump effect on cybersecurity: Tough to tell

Donald Trump’s effect on cybersecurity after he’s sworn in as president will likely be toward military uses of cyber weapons and stronger tools for law enforcement to crack encryption, but the impact is hard to predict due to the vagueness of his proposals so far. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

2016’s notable deaths in technology, science & inventions
Cisco Talos: Zeus spawn “Floki bot” malware gaining use, cyber-underworld notoriety
Cyberspies stole secrets from industrial giant ThyssenKrupp
November 2016: The month in hacks and breaches
7 ways to tighten enterprise social media security
Facebook, Google, World Wide Technology near top of Glassdoor's Best Places to Work 2017 list
Russian cyberspies likely behind DNC breach move on to German election
Apache Zeppelin open-source analytics startup reveals new name, fresh funding
(From our archives) High tech helps solve mystery of ancient calculator

White Paper: Jamf

Employee Choice Programs

Technology is integral to everything we do, especially at work. Consequently, employees have preferences for certain device brands and expect to be able to choose those devices at work. Read More

Thumbnail Image

2016’s notable deaths in technology, science & inventions

Paying respects to computing pioneers, corporate leaders (AT&T, Intel) and the most inventive of inventors who passed during 2016 Read More

Thumbnail Image

Cisco Talos: Zeus spawn “Floki bot” malware gaining use, cyber-underworld notoriety

“[Floki bot] is based on the same codebase that was used by the infamous Zeus trojan, the source code of which was leaked in 2011. Rather than simply copying the features that were present within the Zeus trojan ‘as-is’, Floki Bot claims to feature several new capabilities making it an attractive tool for criminals,” Talos wrote. Read More

Thumbnail Image

Cyberspies stole secrets from industrial giant ThyssenKrupp

Germany-based industrial conglomerate ThyssenKrupp was hit by a cyberespionage attack earlier this year that resulted in data being stolen from its industrial solutions and steel producing units. Read More

Thumbnail Image
INSIDER

November 2016: The month in hacks and breaches

Here's how the holiday season is heating up for hackers. Read More

Thumbnail Image

7 ways to tighten enterprise social media security

In this day and age when people share everything, there needs to be constraints in place to keep company secrets off Facebook. Read More

Thumbnail Image

Facebook, Google, World Wide Technology near top of Glassdoor's Best Places to Work 2017 list

Depending up on how loosely I define "enterprise technology vendor," I'd say about a third of the 2017 Glassdoor Best Places to Work in the U.S. list consists of companies that supply IT professionals and those they support. Read More

Thumbnail Image

Russian cyberspies likely behind DNC breach move on to German election

A group of suspected Russian cyberspies blamed for interring in the U.S. elections is also attempting to influence the upcoming vote in Germany, according to the country’s domestic intelligence agency. Read More

Thumbnail Image

Apache Zeppelin open-source analytics startup reveals new name, fresh funding

The team behind the Apache Zeppelin open-source notebook for big data analytics visualization has renamed itself ZEPL and announced $4.1M in Series A funding. Read More

(From our archives) High tech helps solve mystery of ancient calculator

Results of a high-tech research project to be released next week promise to finally unravel much of the remaining mystery of a 2,000-year-old astronomical calculator. Read More

White Paper: Jamf

macOS Security Checklist: Implementing the Center for Internet Security Benchmark for macOS

The Center for Internet Security (CIS) benchmark for macOS is widely regarded as a comprehensive checklist for organizations to follow to secure their Macs. This white paper from JAMF Software-the Apple Management Experts-will show you how to implement the independent organizations' recommendations. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

What’s in store for tech in 2017

20 years ago: Hot sci/tech images from 1996 Read More

Most-Read Stories

1. Just one autonomous car will use 4,000 GB of data/day
2. Say goodbye to MS-DOS command prompt
3. Cisco whacks its Secure Access Control System
4. Thieves using a $17 power amplifier to break into cars with remote keyless systems
5. 7 Linux predictions for 2017
6. Peeping into 73,000 unsecured security cameras thanks to default passwords
7. 19 free cloud storage options
8. Apache Zeppelin open-source analytics startup reveals new name, fresh funding
9. 10 reasons to divorce the cloud
10. How to survive the death of Flash
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Compliance Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.