The internet is forever. Memes, Tweets, blog posts, PR wins and gaffes -- once published, these things won't ever go away. Nowhere is this fact more important than on employer review sites, where candidates and employees turn to share their thoughts, feelings and personal experiences interacting with a company, says Dan Schawbel, research director at Future Workplace.The research, "The Future of Recruiting," from Future Workplace and HR and social media recruiting technology solutions company CareerArc, surveyed 1,054 total respondents, including 616 employers and 438 job seekers, and showed that 61 percent of job seekers visit a company's online properties first before applying; a 17 percent increase from 2015.To read this article in full or to leave a comment, please click here
As you read through the list of new features in System Center 2016 Virtual Machine Manager (VMM), you will be hard-pressed to find any new features not directly related to Windows Server 2016 Hyper-V. As I worked with VMM 2016, I couldn’t help but get the feeling that VMM 2016 was good ol’ VMM 2012 R2 with bolted-on support for features introduced in Windows Server 2016.To read this article in full or to leave a comment, please click here(Insider Story)
Top 30 free apps for Windows 10Image by IDGWith Windows 10 adoption ramping up, many folks are looking for ways to further improve the Win10 experience. So why not make the most of your transition by reconsidering your old app habits and getting Win10 tools that will help you work smarter, faster, and more productively?To read this article in full or to leave a comment, please click here
It would sure make things simple if there was one easy and obvious way to get a job or start a successful business in IT security. But it would also cut off a lot of potential career paths. We spoke to a host of different IT security pros and found that indeed there wasn't just one route to that coveted job.To read this article in full or to leave a comment, please click here(Insider Story)
While shadow IT was always a challenge for enterprise IT teams, it rapidly started to accelerate with the growth of the smartphone, and then cloud computing with the incredible expansion of public cloud infrastructure and software as a service offerings that made it as easy as providing a credit card to access a cloud service. Today, shadow IT has spread beyond smartphones, tablets, and cloud services and is rapidly extending into the domain of the enterprise developer.The trend could create profound risks for enterprise security teams if these shadow, or citizen, developers, aren’t reined.To read this article in full or to leave a comment, please click here
Windows 10 privacy is a contentious issue. This is in part because Windows 10 is integrated with cloud-based features like Cortana, and it has features influenced by mobile such as determining your location. Then there's Microsoft's more questionable goals, like scooping up diagnostic data and gathering information for better ad-targeting.In previous versions of Windows 10, managing privacy was, to put it mildly, an insane process. Settings were strewn all over the operating system and the web.Privacy isn't much better in the recently released Creators Update, but Microsoft has consolidated its web-based privacy information related to a user's Microsoft Account. In addition, privacy settings on the PC are a little more helpful.To read this article in full or to leave a comment, please click here
IT security consultants tend to be busy people. Given the widespread shortage of professionals with skills in many different aspects of cyber security, organizations frequently need help from outside experts.To read this article in full or to leave a comment, please click here(Insider Story)
In the early 1600s, one of my favorite historical figures, Italian astronomer Galileo Galilei, championed the works of one Nicolaus Copernicus and postulated that the universe was heliocentric. The term was named after Helios, the Greek god of the sun, indicating that everything revolved around him.In the IT world, the cloud has become the center of the universe. And since Zeus is the Greek god of the sky, which includes thunder and cloud, it makes sense that CIOs should adopt a Zeus-centric faith.To read this article in full or to leave a comment, please click here
When Scott Crowder joined BMC as its vice president of infrastructure and operations in 2011, he felt like he had stepped back in time. While he knew BMC’s products to be world class, the data center and other technologies running this world-class operation seemed more like they belonged in a museum.+ Also on Network World: Accelerating digital transformation using the Medici Effect +
Thus started a transformational journey that began in earnest with Crowder’s appointment as BMC's CIO in 2014. He had already begun the transformation of the data center in his first role, but upon taking the reins as CIO, he knew he had the opportunity to reshape the IT landscape from the ground up.To read this article in full or to leave a comment, please click here
For such a seemingly obvious idea, Gartner ignited quite a firestorm with its proposition that, to remain relevant, IT must be broken into two distinct realms: one focused on keeping the lights on, or, in Gartner parlance, Mode 1, and one devoted to the cool stuff that business people want, or Mode 2.To read this article in full or to leave a comment, please click here(Insider Story)
Software-defined Wide Area Network (SD-WAN) technology promises enterprises true transport independence and flexibility. SD-WAN adopters can turn to any transport protocol -- 3G, 4G LTE, MPLS, Internet or Wi-Fi -- to provide the best cost and performance benefits for specific applications.To read this article in full or to leave a comment, please click here(Insider Story)
New York’s Montgomery County, located at the foot of the Adirondacks, consists of 10 towns, one city and 50,000 residents. To protect the data that pertains to its citizens and operations, Montgomery County added DatAdvantage from Varonis to its arsenal of security wares. The data security platform is designed to show organizations where sensitive data exists, who is accessing it, and how to keep it safe.To read this article in full or to leave a comment, please click here(Insider Story)
What's to like? Image by Vicki Lyons, Prakash Kota, Julie Ulrich and David LeDouxEvery year we ask IT pros to share their favorite enterprise products, and every year we learn what it takes to win them over — including gear that saves time and money, bolsters security, and streamlines digital transformations. Read on to learn what 31 tech pros like best, in their own words.To read this article in full or to leave a comment, please click here
New products of the weekImage by A10Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.To read this article in full or to leave a comment, please click here
Microsoft said it has already patched vulnerabilities revealed in Friday’s high-profile leak of suspected U.S. National Security Agency spying tools, meaning customers should be protected if they’ve kept their software up-to-date.Friday’s leak caused concern in the security community. The spying tools include about 20 exploits designed to hack into old versions of Windows, such as Windows XP and Windows Server 2008.To read this article in full or to leave a comment, please click here
This tire pressure guage from Fovsal features a lighted nozzle and display screen for ultimate visibility in low light, and doubles as a vehicle emergency tool with LED flashlight, car window breaker, seat belt cutter, and red safety light. It averages 4.5 out of 5 stars on Amazon, where its typical list price of $20 has been reduced 50% to just $9.98. See it now on Amazon.To read this article in full or to leave a comment, please click here
If you operate a small or medium-size U.S. business, you can expect to pay more for broadband services in the near future because the U.S. Federal Communications Commission plans to deregulate providers of business data lines, critics of the proposal say.Users of ATMs, shoppers in stores that use credit card scanners, and mobile phone customers could also see prices go up after the FCC deregulates the so-called business data services (BDS) market. Schools and hospitals also depend on BDS for their broadband service, and prices could rise as much as 25 percent in areas where the FCC removes price caps, critics warn.The FCC is scheduled to vote Thursday on a proposal from Republican Chairman Ajit Pai that would deregulate large parts of the BDS market, which generates an estimated US$45 billion a year for AT&T, Verizon, and other telecom carriers. Incumbent telecom carriers welcome the plan, saying there's plenty of competition in the BDS market, sometimes called special access.To read this article in full or to leave a comment, please click here
Security operations is changing, driven by a wave of diverse data types, analytics tools, and new operational requirements. These changes are initiating an evolution from monolithic security technologies to a more comprehensive event-driven software architecture (along the lines of SOA 2.0) where disparate security technologies connect via enterprise-class middleware for things like data exchange, message queueing, and risk-driven trigger conditions. ESG refers to this as a Security Operations and Analytics platform architecture or SOAPA. When speaking, or writing about SOAPA, I often compare this evolution to an analogous IT trend in the 1990s. Way back then, large organizations abandoned stand-alone departmental applications in favor or a more integrated software architecture, ERP. This transition resulted in a new generation of business applications acting as a foundation for greater automation, efficiency, and profitability.To read this article in full or to leave a comment, please click here
This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. If you want to get a sense for how rapidly the SD-WAN market is evolving, go back and read some of the articles from, say, two years ago. Some of the talk was about startup companies entering the market, while other items describe how traditional WAN hardware vendors were pivoting to get into the lucrative new market of building network functions in software.Predictions of the eventual market size varied back then, but everyone knew it would be big. Doyle Research thought it might get to $3.2 billion by 2018. IDC projected a $6 billion market by 2020. I wouldn’t be surprised if those estimates from a few years ago turn out to be too conservative.To read this article in full or to leave a comment, please click here
5G technology, despite some fairly breathless hype, is still in the embryonic stages of development, but the pace is quickening. The major U.S. carriers are racing to buy up critical spectrum that will be necessary for the realization of 5G’s potential, which could include support for speeds up to 1Gbps and support for the ever-expanding Internet of Things.AT&T has made two major purchases with that end in mind – January saw the company announce the acquisition, for an undisclosed sum, of bankrupt wireless backhaul provider FiberTower, and just this week AT&T said that it would spend about $1.6 billion in an all-stock deal to acquire Straight Path Communications (Note: A Reuters report overnight cited sources as saying Verizon might try to top AT&T’s bid).To read this article in full or to leave a comment, please click here