Saturday, October 12, 2013

Inside CIOs' giant paychecks. Plus: Check out MIT's 'Kinect of the Future'

MIT's 'Kinect of the future' looks through walls with X-ray like vision [VIDEO]

Gartner: The Top 10 IT altering predictions for 2014

ITworld Today
October 12, 2013
Share this email

Inside CIO paychecks

Bonuses, stock awards and executive perks boost pay for CIOs and senior IT leaders.

READ MORE
 

Issue highlights

1. MIT's 'Kinect of the future' looks through walls with X-ray like vision [VIDEO]

2. Gartner: The Top 10 IT altering predictions for 2014

3. Fade to Black(Berry): 8 years covering the rise and fall of RIM

4. Lockdown: How to secure your PC without going crazy

5. BOOK GIVEAWAY: The Official Ubuntu Server Book, 3rd Ed.

6. Secrets of the iOS 7 keyboard

7. 3 essential techniques to protect your online privacy

8. Hackathons for the rest of us

9. 10 signs the dot-com tech bubble has returned

Webcast: Lumension Security

Developing Best Practices for Patch and Remediation

In today's complex networking environment using patch and vulnerability management as the principal component of your risk mitigation strategy, and taking prudent measures to establish a best practices approach, can help reduce costs and risks in the long term. Learn more!

MIT's 'Kinect of the future' looks through walls with X-ray like vision [VIDEO]

Massachusetts Institute of Technology researchers have developed a device that can see through walls and pinpoint a person with incredible accuracy. READ MORE

Gartner: The Top 10 IT altering predictions for 2014

Mobile devices, Software Defined Networks, 3D printing all set to disrupt IT. READ MORE

Fade to Black(Berry): 8 years covering the rise and fall of RIM

Al Sacco started covering Research In Motion (RIM), now BlackBerry in 2005. This is his farewell post to a company that provided him a lot of fodder over the years. READ MORE

Lockdown: How to secure your PC without going crazy

Digital privacy is within your grasp with this practical beginner's guide to encryption. READ MORE

White Paper: Efficient IP

Five Key Ways to Increase Network Security

By providing security through key protocols embedded in the IP protocol—DNS, DHCP and IP Address Management, collectively known as DDI—enterprises can not only improve security but reduce the effort required within IT to administer it. Here are five ways to employ DDI to strengthen and protect your infrastructure. View Now

BOOK GIVEAWAY: The Official Ubuntu Server Book, 3rd Ed.

We've got 5 copies to give to some lucky ITworld readers. Enter now for your chance to win! READ MORE

Secrets of the iOS 7 keyboard

Uncover hidden characters and handy shortcuts with this guide to the new keyboard on your iPhone and iPad. READ MORE

3 essential techniques to protect your online privacy

Two-factor authentication, encrypted remote storage, virtual private networks: These are your weapons in the fight for Internet security. READ MORE

Hackathons for the rest of us

Forget softball games. Hackathons promote togetherness among techies while benefiting the enterprise, and no one gets pitcher's elbow. READ MORE

10 signs the dot-com tech bubble has returned

Oval Offices, Dot Zombies, jerks with perks -- is it simply déjà vu, or are we hurtling toward another Silicon Valley crash? READ MORE

White Paper: HP

Magic Quadrant for Security Information and Event Management

The security information and event management (SIEM) market is defined by the customer's need to analyze security event data in real time for internal and external threat management, and to collect, store, analyze and report on log data for incident response, forensics and regulatory compliance. Learn More

SPECIAL REPORT:

Tools and strategies to keep the BYOD chaos under control
One key to a successful BYOD program is mobile device management (MDM), where carefully chosen tools and policies let companies maintain control. However, there s a lot of movement in the market and a number of MDM approaches to consider which makes your job more challenging. To get you started, we assembled advice from IT leaders who have successfully deployed an MDM solution.

BOOK GIVEAWAY:

We're giving away 5 copies of each of these two new books to give to some lucky readers. Enter today for your chance to win!

The Official Ubuntu Server Book, 3rd Ed.
Written by leading members of the Ubuntu community, The Official Ubuntu Server Book, Third Edition, covers all you need to know to make the most of Ubuntu Server, whether you're a beginner or a battle-hardened senior systems administrator.

The Practice of Network Security Monitoring
Learn how to deploy, build, and run a network security monitoring (NSM) operation using open source software and vendor-neutral tools.

DON'T MISS...

The 10 programming languages most likely to drive developers insane

11 foods you'll be eating in 2050

15 geeky places to visit before you die

I'll cry if I want to: Ten tech titans and their temper tantrums

7 ways to beat fingerprint biometrics

Follow ITworld

Share this email

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.