IT service providers get low marks on innovation

Nearly half (48 percent) of the customers of IT service providers aren't satisfied with the service they’re getting, according to Everest Group’s global survey of 132 enterprises. That figure includes 25 percent who are “highly unsatisfied.”To read this article in full or to leave a comment, please click here(Insider Story)

Internet@MySchool – a pilot project connecting Yemeni schools in Sanaa and Aden

As a country, Yemen is among the least with Internet connectivity in the Middle East. This is particularly troubling given the rise of Internet access across the globe. Furthermore, the youth in Yemen constitute the majority of the population yet are being left behind because of the lack of Internet access in schools due to poor economic conditions coupled with other priorities that supersede Internet access.

Fahmi Albaheth

Encryption critical for protecting mobile device data

If your mobile device contains any personal or private data, then it's crucial you protect it. In many cases, mobile devices contain sensitive information that, if breached, can cause significant problems for the users.For example, more people are storing copies of their driver’s license, employer data, insurance details, social security card, bank account information and passwords on their mobile device. Even personal pictures can be a major security concern. When applying for loans, instead of faxing, many people take pictures of important financial documents and email them to the requestor but do not delete the pictures from their phone.One very critical step you can take to secure this is to encrypt your mobile data.To read this article in full or to leave a comment, please click here

Encryption critical for protecting mobile device data

If your mobile device contains any personal or private data, then it's crucial you protect it. In many cases, mobile devices contain sensitive information that, if breached, can cause significant problems for the users.For example, more people are storing copies of their driver’s license, employer data, insurance details, social security card, bank account information and passwords on their mobile device. Even personal pictures can be a major security concern. When applying for loans, instead of faxing, many people take pictures of important financial documents and email them to the requestor but do not delete the pictures from their phone.One very critical step you can take to secure this is to encrypt your mobile data.To read this article in full or to leave a comment, please click here

BrandPost: Why Cross-Domain Capabilities Matter for Automation: Two Business Scenarios

The digital economy has IT up against the wall. Lines of business are focused on boosting innovation and enhancing the customer experience through digital transformation initiatives, but network complexity can be a significant obstacle for IT. According to one study, 75% of CIOs admit that the network is impacting their organization’s ability to achieve business goals, with an estimated 35% of all network downtime attributed to human error.This problem has understandably led IT to embrace automation in each technology domain, including the network, as a means of accelerating service delivery. But automating service delivery within each domain alone isn't enough. There must be seamless automation across the entire data center, or the ability to perform consistently and efficiently will suffer serious setbacks. It’s this growing need for agility and operational efficiency that ultimately validates the business case for introducing open, cross-domain automation capabilities.To read this article in full or to leave a comment, please click here

Announcing the New NSX Community at VMUG!

If you want to go fast, go alone.

If you want to go far, go together.

The premise behind this saying is the reason why VMware and VMUG are excited to announce the creation of the NSX community at VMUG.  The education, certification, and adoption of new technologies can be met with fear and uncertainty as legacy traditions get challenged.  By building a community, we can provide strength in numbers that can facilitate learning and help people develop a mindset of embracing the people, process, and tooling challenges that come with VMware NSX.

This new community will be dedicated to network and security virtualization.  It will serve as a robust resource for individuals who are motivated to learn more about VMware NSX and its tremendous impact on the data centers of today and tomorrow.  VMware NSX is at the core of next-generation enterprise solutions for IT automation, micro-segmentation, application availability, and cross-cloud architecture.  The community will offer an opportunity for Q&A with NSX experts and product managers, special community content, discussions with peers, and much more.

VMUG logo

The launch of the NSX community at VMUG comes ripe with inherent benefits, but in order to show our Continue reading

Apple said to drop Imagination’s IP in favor of own graphics chips

Apple will soon stop using intellectual property from Imagination Technologies Group for graphics processing units for its iPhone and other devices, as it is working on a separate, independent graphics design for its products, the chip technology company said Monday.But the U.K. company is not giving up without a fight as it doubts Apple can develop a brand new GPU without infringing Imagination’s intellectual property.Apple held an 8.5 percent share of the issued share capital of Imagination as of April 30 last year. The iPhone maker said in a filing in March last year that it had discussions with Imagination about a possible acquisition, though it did not have plans to make an offer at that time. Apple is Imagination's largest customer and it described the iPhone maker as "essential to the business of the Group" in its annual report for 2016.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Information security in an insecure world

If I could give only one piece advice for CTOs and IT teams, it would be this: Data security is not just an IT task—it comes down to people and processes. As a startup CTO, you’re often going to lead the charge when it comes to information security for your firm.  According to the Identity Theft Resource Center, U.S. companies and government agencies suffered a record 1,093 data breaches in 2016—a 40 percent increase over 2015. We’ve all seen the headlines and the high-profile victims, but attackers don’t discriminate when it comes to security breaches. Any company can become a victim, leading to losses of your data, your customers’ data, financial information, proprietary product information, and, ultimately, a loss of goodwill in the market. As more processes move online and into the cloud, companies increasingly feel this burden of staying secure.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Information security in an insecure world

If I could give only one piece advice for CTOs and IT teams, it would be this: Data security is not just an IT task—it comes down to people and processes. As a startup CTO, you’re often going to lead the charge when it comes to information security for your firm.  According to the Identity Theft Resource Center, U.S. companies and government agencies suffered a record 1,093 data breaches in 2016—a 40 percent increase over 2015. We’ve all seen the headlines and the high-profile victims, but attackers don’t discriminate when it comes to security breaches. Any company can become a victim, leading to losses of your data, your customers’ data, financial information, proprietary product information, and, ultimately, a loss of goodwill in the market. As more processes move online and into the cloud, companies increasingly feel this burden of staying secure.To read this article in full or to leave a comment, please click here

Securing the smart home

Editor’s Note: First in a series of articles on the best ways to deploy and secure smart home technologyLast fall, we saw the rise of the weaponized smart device as the Mirai botnet compromised webcams and other Internet-connected things. Then in February, VIZIO agreed to pay a $2.2 million fine to the FTC for collecting the viewing histories of 11 million smart TV users without their knowledge or consent.To read this article in full or to leave a comment, please click here(Insider Story)

10 hidden features in the new Windows 10 Creators Update

Microsoft’s big Windows 10 refresh, the Creators Update, is slated for release on April 11, bringing new features, enhancements and applications. The ones that have been getting the most attention revolve around the user interface (tweaks to the Start Menu), new capabilities for Cortana, and 3D design (the Paint 3D app).To read this article in full or to leave a comment, please click here(Insider Story)

New products of the week 4.3.17

New products of the weekImage by MicroStrategyOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.JumpStartImage by cloudjumperTo read this article in full or to leave a comment, please click here