Name: Michael Lin
Name: Eric Baldeschwieler
Red Hat CEO Jim Whitehurst is coming up on his five-year anniversary at the helm, following his arrival in December 2007. Under Whitehurst's leadership, Red Hat's revenue has grown from US$523 million in its fiscal 2008 to more than $1.1 billion in its fiscal 2012, without deviating from its core strategy of open-source infrastructure software.
Name: Michael Milligan
Name: Harry Sverdlove
Name: Catherine Goodison
Name: Amichai Shulman
In April of 1995, Steve Jobs, then head of NeXT Computer, was interviewed as part of the Computerworld Honors Program Oral History project. The wide-ranging interview was conducted by Daniel Morrow, executive director of the awards program.
By Computerworld (US) staff | 07 October, 2011 09:13
Barbara Koster, CIO of Prudential Financial, oversees 1,700 IT employees and formulates policies, establishes standards and architectures, and develops guidelines and management practices for the financial services giant. She also manages the company's global networks and data centers and other technology infrastructure.
By Lucas Mearian | 09 August, 2011 01:21
Running the internal IT operations of Cisco Systems is a big job not just because of the size of the company -- more than 70,000 employees worldwide and a market capitalisation in the range of $US100 billion -- but also because Cisco is continually developing new IT products across a broad range of technologies and is known for rapidly adopting those products for its own use. Cisco CIO Rebecca Jacoby spoke with IDG News Service on the sidelines of the NetWork conference last week and shared some insights into the legendary enterprise IT company's own enterprise IT.
By Stephen Lawson | 14 December, 2010 08:29
Internet activist, author and system administrator at Google, Tom Limoncelli, would like to see geeks getting more involved in social justice, organisations thinking more creatively about IT, and systems administrators embracing their soft skills.
By Dahna McConnachie | 09 January, 2009 07:35
MIT Deputy Dean JoAnne Yates is co-author of an upcoming article on information overload called "Ubiquitous E-mail: Individual Experiences and Organizational Consequences of BlackBerry Use"
By Matt Hamblen | 18 November, 2008 08:19
Silicon Valley is the epitome of California's youth worship, geek-style. It's the stage where wunderkinds emerge and are feted: Yahoo's Jerry Yang and David Filo, Netscape's Marc Andreessen, Google's Sergey Brin and Larry Page, Facebook's Mark Zuckerberg -- all in their 20s when they hit it big. Going farther back, let's not forget Steve Jobs and Steve Wozniak, who were 21 and 25, respectively, when they started Apple Computer.
By Eric Lai | 03 November, 2008 11:44
Social networking sites offer IT job seekers the resources to find peers with similar skills and learn more about employers. But candidates should be aware that the online outlets also provide employees a glimpse into the personal lives of potential hires. That can be good or it can be very bad, according to Rona Borre, president and CEO of Instant Technology, an IT recruiting and staff augmentation firm in the US. Borre recently talked with Denise Dubie about how new technologies can boost or torpedo job searches.
Bruce Marcus, the executive vice president and CIO of The McGraw-Hill Companies, answers questions about moving into leadership positions, dealing with a difficult boss and the impact of the economy on IT.
IT professionals with strong technical backgrounds can drum up some great ideas for start-up companies, but they often lack the business acumen to keep those companies afloat. To help these would-be captains of industry, Computerworld recently spoke with Ken Blanchard, the best-selling co-author of The One Minute Entrepreneur and The One Minute Manager to gain insight on the steps that technology entrepreneurs should take -- and avoid. Step one: Remember the basics.
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
- FTMicrosoft Business Intelligence DeveloperNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTIT Support EngineerNSW
- FTOBIEE BI/DW ConsultantNSW
- FTDeliverability SpecialistNSW
Distributed denial of service attacks (DDoS) attempt to make a machine or network resource unavailable to its intended users, with a wave of crippling attacks on enterprises since 2012. This whitepaper offers guidance to security and network architects in designing, deploying, and managing architecture to protect against increasingly sophisticated, application-layer DDoS attacks.
- TSMC benefits from demand for high-tech smartphone chips
- SAP reports strong growth in cloud amid slow overall revenue growth
- Windows XP's retirement turns into major security project for Chinese firm
- Strong PS4 sales create supply problems for Sony
- Telcos seek to strengthen NBN Co wholesale restrictions
- Kim Dotcom says he's set to get assets back
- NBN Co seeks ‘early resolution’ of TPG fibre threat
- Sedgman unearths greater value for cost with ITSM switch
- Teen arrested in Heartbleed attack against Canadian tax site
- A look at the world's most powerful X-ray laser
- IBM profit falls on weak hardware sales, transition costs
- In Pictures: Ubuntu 14.04 LTS
- Google revenue jumps 19 per cent but still disappoints
- AT&T wearables to hit the smartwatch runway soon
- Fortinet, McAfee, Trend Micro, Bitdefender battle in socially-engineered malware prevention test