Top 11 oddball real-world tech job interview questions | IBM: Mobile app security stinks
Network World Mobile & Wireless
INSIDER
Mobile security: iOS vs. Android vs. BlackBerry vs. Windows Phone
Google's Android for Work and Samsung's Knox promise serious security, but how does they stack up against Apple's iOS and the rest? Read More
WHITE PAPER: Citrix Systems
10 Essentials for Secure EMM
This white paper highlights 10 key points encompassing security, user experience, IT operations and BYOD to help your organization realize the full benefits of mobility. Learn more
In this Issue
Top 11 oddball real-world tech job interview questions
IBM: Mobile app security stinks
Top enterprise IT companies where people want to work
New Gigabit Wi-Fi access points target SMBs
INSIDER 5 common Wi-Fi attacks and how to defend against them
Here are the components that will power your next smartphone
New products of the week 03.23.2015
INSIDER How to connect to enterprise Wi-Fi security on Android devices
Wireless router from Huawei hints at new ways to speed up LTE
INSIDER T-Mobile will win the attention of business customers, if not sales
Apple iOS 8 really catching on now
Meet the Tech Dude Who Doubles as the Weird Al of Drone Songs
WEBCAST: Dell Inc.
Level the Playing Field: Cloud Productivity for SMBs
Many of the 5.7 million companies in the U.S. with fewer than 500 are poised to leverage cloud computing for speed, agility and cost savings. In this webcast, you'll learn how The unique set of challenges they face -- staff, resources, security and skills -- can be addressed through the Microsoft Azure solution powered by Dell. View Now
Top 11 oddball real-world tech job interview questions
OddballAs if it isn’t already tough enough to land a job in tech, how would you like to be hit up with one of these strange interview questions? Some of the best, collected by online jobs/career marketplace Glassdoor. (10 More Oddball Job Interview Questions from 2014)To read this article in full or to leave a comment, please click here Read More
IBM: Mobile app security stinks
An IBM/Ponemon study released today found large companies, including many in the Fortune 500 aren't properly securing mobile apps they build for customers nor their corporate and BYOD mobile devices. Read More
Top enterprise IT companies where people want to work
Poachable, a Seattle startup that specializes in connecting passive job-seekers with companies looking to hire, says enterprise network and IT companies such as Microsoft, IBM and Cisco are among the most desirable places to work. But largely consumer-focused companies, like Google, Apple and Amazon, are even more attractive.Poachable, which describes itself as an anonymous talent marketplace in that recruiting companies don’t know the identities of candidates until the candidates want them to, has started crunching data based on 2,000 algorithm- and human-powered match suggestions it now makes each month. Poachable claims to have 25,000 passive job seekers in its system and 200 active employers using its service, and it is payments from those companies that generate the startup’s revenue.To read this article in full or to leave a comment, please click here Read More
New Gigabit Wi-Fi access points target SMBs
Cisco, D-Link, Edimax deliver impressive speeds, solid management tools Read More
WEBCAST: Viewfinity
Endpoint Defense Essentials
This Live Webinar on March 18th @ 2PM EST will provide a perspective on all aspects of defending endpoints from modern day attacks. Learn More
INSIDER
5 common Wi-Fi attacks and how to defend against them
In addition to using strong passwords, you need to prepare your network for these types of attacks. Here are some common vulnerabilities and how to protect against them. Read More
Here are the components that will power your next smartphone
Qualcomm, MediaTek, Samsung and LG are all working on exciting new products Read More
New products of the week 03.23.2015
Our roundup of intriguing new products from companies such as Dell and F5 Networks. Read More
INSIDER
How to connect to enterprise Wi-Fi security on Android devices
Connecting to wireless networks using the enterprise or 802.1X mode of Wi-Fi security is a bit different compared to using the personal or pre-shared key (PSK) mode. Here's what you need to know. Read More
WHITE PAPER: IBM
3 Guiding Principles to Improve Data Security and Compliance
Data security is a moving targetas data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Learn More
Wireless router from Huawei hints at new ways to speed up LTE
The company is using the 3.5GHz band to offer speeds at up to 220Mbps with LTE-Advanced Read More
INSIDER
T-Mobile will win the attention of business customers, if not sales
T-Mobile CEO John Legere gets laughs for his raunchy talk in public, but others are taking his announcement of simplified pricing with "Un-carrier for Business" seriously. Read More
Apple iOS 8 really catching on now
Apple revealed Wednesday that iOS 8, released to the public in September, can now be found on 77% of iOS devices accessing the Apple Store. That's up from 68% in January. Read More
Meet the Tech Dude Who Doubles as the Weird Al of Drone Songs
A mild-mannered tech and media support coordinator for Oregon State University Extension Service by day, Victor Villegas takes on the persona of The Drone Singer during his off hours. Yes, he fashions himself as the Weird Al Yankovic of drone songs.Following the FAA’s recent launch of a well-intentioned but dull campaign to encourage safe flying of personal or commercial drones (a.k.a., unmanned aerial vehicles or unmanned aircraft systems), the 46-year-old Villegas released to YouTube “If You Get a Drone for Christmas,” his first drone-related parody song designed to get the safety message across in a catchier way.To read this article in full or to leave a comment, please click here Read More
SLIDESHOWS
7 things we want to see in the Surface Pro 4
Perhaps a "Surface Pro 4" will debut at the same time or soon after Windows 10 launches. Here's what we'd like to see in the Surface Pro 4.
JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn
MOST-READ STORIES
1. To avoid NSA, Cisco gear gets delivered to strange addresses
2. Windows 10 will end OS reinstall headaches
3. Custom browsers that crush Chrome, Firefox, and IE
4. Top enterprise IT companies where people want to work
5. 10 reasons Amazon's drone delivery plan still won't fly
6. Bare-metal switches poised to take off in data centers
7. EMC eying Arista, Brocade?
8. First Look: Microsoft Office 'lite' for touchscreens
9. Top 11 oddball real-world tech job interview question
10. Pwn2Own hacker earned $916 a second for pounding Chrome, but all big browsers busted
Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.
You are currently subscribed to networkworld_wireless_alert as security.world@gmail.com.
Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy
When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Network World, please send an e-mail to customer_service@nww.com.
Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **