Tuesday, September 9, 2014

6 hot new IT roles for 2015

Read my lips: Authentication through visual speech patterns could improve security

Home Depot confirms breach of its payment systems

ITworld Today
September 09, 2014

6 hot new IT roles for 2015

It's time to change the way you think about attracting and hiring skilled workers. Here are six new IT roles for 2015 and advice on how to find talent to fill them.

READ MORE
 

Issue highlights

1. Read my lips: Authentication through visual speech patterns could improve security

2. Home Depot confirms breach of its payment systems

3. Too late: Amazon slashes Fire Phone price by $200

4. Apple now emailing users when iCloud accessed via Web

5. Google looks for public input on right to be forgotten

6. SAP to release AR apps on Android Wear for smart glasses in the workplace

7. OpenSSL warns vendors against using vulnerability info for marketing

8. Chef muscles up with Microsoft, Amazon

9. BOOK GIVEAWAY: Understanding Big Data Scalability (eBook)

Resource compliments of: Cradlepoint

Networking Technologies to Maximize Your Peak-Selling Season

Black Friday kicks off the year's peak-selling season, which now lasts from Thanksgiving Day to Christmas Eve. The National Retail Federation predicts this year's peak-selling season will bring in $602.1 billion in retail sales. So how do you maximize your peak-selling season? Join our webinar, "4 Networking Technologies to Maximize Your Peak-Selling Season" on Thursday, September 11, 2014 at 8:30am PDT//11:30am EDT

Read my lips: Authentication through visual speech patterns could improve security

A new study shows that lip reading could be the basis for a more secure method of verifying our identites online. READ MORE

Home Depot confirms breach of its payment systems

Home Depot said Monday that its payment systems had been breached, potentially affecting any customers who shopped at its stores in the U.S. and Canada since April. READ MORE

Too late: Amazon slashes Fire Phone price by $200

Amazon on Monday slashed the price of its three-month-old Fire Phone to 99 cents, an obvious bid to boost slow sales. READ MORE

Apple now emailing users when iCloud accessed via Web

In the wake of last week's theft of celebrity photos, Apple has started beefing up security for its iCloud service. READ MORE

White Paper: Polycom

The Role of the User Experience in Video Conferencing

While video conferencing can offer significant, measurable benefits to companies and their employees, all video conferencing solutions are not alike. To ensure adoption, a successful deployment and implementation--and to maximize (ROI)--managers must choose their video conferencing tools wisely, matching the right technology to the right use cases. Learn more >>

Google looks for public input on right to be forgotten

Google is planning a series of seven public meetings across Europe to discuss people's right to be forgotten with the public's right to information. READ MORE

SAP to release AR apps on Android Wear for smart glasses in the workplace

SAP this week will begin selling two workplace-related augmented reality apps for use with Android Wear smart glasses. READ MORE

OpenSSL warns vendors against using vulnerability info for marketing

Security advisories for OpenSSL should not be used for competitive advantage, according to the development project behind the widely used cryptography component. READ MORE

Chef muscles up with Microsoft, Amazon

Chef, a popular open source software program for managing the configuration settings of servers, software and other IT components, now can reach deeper into the data center with the help of some intertwined services from Microsoft, VMware and Amazon Web Services (AWS). READ MORE

BOOK GIVEAWAY: Understanding Big Data Scalability (eBook)

Five will win. Enter the drawing today! READ MORE

White Paper: Polycom

Remote Collaboration Challenges and Strategies to Overcome

Download this survey to learn what 5,000 business professionals around the world say are their biggest collaboration challenges--and discover the strategies they deploy to overcome them. Learn more >>

DON'T MISS...

Why many programmers don't bother joining the ACM

Top 25 free tools for every Windows desktop

10 amazing (and bizarre) drone discoveries

Just their type: 10 keyboards beloved by programmers

11 colorful characters seen at Comic-Con International 2014

Follow ITworld

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment