Thursday, July 31, 2014

IT's vanishing women

Preston Gralla: How to move your domain and Outlook mail to Google Apps and Gmail | Get CW's new monthly digital magazine!
July 31, 2014 Share this email
INSIDER Alert
Your guide to the top content posted this week for Insider members
Computerworld

IT's vanishing women

The IT profession in many ways seems like a good fit for women, but the industry has a hard time attracting them and keeping those who do enter IT. (Insider; registration required)

READ MORE
Computerworld

Preston Gralla: How to move your domain and Outlook mail to Google Apps and Gmail

Do you have a domain with email that you want to move over to Gmail and Google Apps? I've got help. I recently made the move myself. Here's how to move the domain and email, complete with "gotchas" you should watch out for, based on my hands-on experience. READ MORE

Computerworld

Get CW's new monthly digital magazine!

Get the August edition of Computerworld's all-new digital magazine, featuring the challenges CIOs face when they decide to rely on analytics, not instinct, to make decisions. READ MORE

InfoWorld

Mobile management: Making sense of your options

Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful — and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information, but the variety of platforms, the fact many are employee-owned, and uneven security capabilities mean it's a real challenge — sometimes an impossible challenge — to manage them in the same way as the corporate PC. READ MORE

CSO

Brandpost: What to Do When You Are on the Receiving End of a Data Breach

Earlier in the week I shared my experience, which is probably (or at least hopefully) like most, with having credit card information stolen.   Since that time, there’s been a nice article written with some common sense ways for folks like us to proactively protect ourselves rather than relying on the measures financial institutions have in place (which are important as well): 1)      Monitor Your Bank Statements, At Least Monthly2)      Use Your Credit Card, Not Your Debit Card3)      Get Free Credit Monitoring4)      Bank Smarter (set up account alerts, never use the same password for less secure sites, use paper checks, etc.)5)      Don’t Depend on Companies to Inform You of a Breach It’s mostly common sense, but not to be overlooked. Not sure about sure paper check part is necessary, but maybe I am just lazy). If you have other recommendations, please comment on this post.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

CSO

Mobile security: A mother lode of new tools

Long, complex passwords that must be input on tiny screens, often while on the move: Such hassles make password-based security unworkable in a mobile world. But change is coming, thanks to an industrywide backlash that gave rise to a gold rush of new technologies. Eventually mobile security may no longer hinge on whether a password is long enough, but on how well the device knows the user. "There's been an explosion in the past year, with new things coming out every month," says Kayvan Alikhani, director of technology at RSA, the security division of EMC.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

Network World

How Aryaka's global private network speeds access to Internet apps

If you are trying to improve global access to your applications, you have probably considered one of several solutions: stringing together your own private network, purchasing WAN optimization appliances, or using a managed cloud-based service provider. Figuring out the benefits of each solution isn’t easy and it is hard to test for variations in Internet connectivity, specific applications and other conditions.But what if a vendor could show you exactly the benefit in a particular use case, so you could understand what they are delivering? That was the idea behind a request that we made of two vendors in the managed cloud space, Aryaka and Virtela. The former responded to our inquiry with a series of tests; Virtela declined to participate.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

Network World

Is your network blind to video traffic?

Ever since 2010, when Cisco predicted huge amounts of video traffic on worldwide networks, IT managers have been cautiously watching for it to occur. Cisco’s most current prediction is that 73% of all Internet traffic will be video by 2017. Whether we’ll reach that level remains to be seen, but we have observed significant increases and it is reasonable to assume that much of that traffic will creep into enterprise networks. Also, the amount of such traffic is likely to be higher than IT managers suspect because most monitoring tools only recognize certain forms of video. Since IT managers are likely looking for tools to manage video traffic, we decided to see what products are available and analyze where additional needs exist.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

CSO

11 signs you've been hacked -- and how to fight back

In today's threatscape, antivirus software provides little piece of mind, and antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. Despite modern heuristics, virtualized environments, system monitoring, and network traffic detection, hackers still reach us on a regular basis.  With compromise all but ensured, you need to know the signs of a hacked system, whether by a run-of-the-mill virus or an insiduous advanced persistent threat. InfoWorld's Roger A. Grimes points out the signs both obvious and subtle of an attack on your system and offers remedies for your network. In this downloadable PDF, you'll learn about:To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

Share this email

Get more Insider content from these brands:

CIO | CITEworld | Computerworld | CSO | InfoWorld | JavaWorld | Network World

You are currently subscribed to idge_insider_newsletter as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@idgenterprise.com

To contact us, please send an e-mail to online@idgenterprise.com

Copyright (C) 2014 IDG Enterprise
492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@idgenterprise.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.