Thursday, April 11, 2013

13 hot new open source projects

Hackers could start abusing electric car chargers to cripple the grid, researcher says

Two-factor authentication ready to roll out at Microsoft

Network World Daily News PM
April 11, 2013
Share this email

13 hot new open source projects

Browser-based toolkits, add-ons to old favorites, tools programmers will love -- here are the most promising projects emerging from the open source community today

READ MORE
 

Issue highlights

1. Hackers could start abusing electric car chargers to cripple the grid, researcher says

2. Two-factor authentication ready to roll out at Microsoft

3. INSIDER Why Diversity Matters in IT Hiring

4. 7 things you need to know about Bitcoin

5. iPhone 5S and new iPad Mini may be delayed until November

6. Widely used wireless IP cameras open to hijacking over the Internet, researchers say

7. Linux users don't buy software, but it's still worth selling

8. Microsoft Who? Top 4 Highlights of Microsoft Management Summit 2013

9. NAB show roundup: Cool gear for videophiles

10. How to Use BPM to Improve Customer Experience

11. 15 of the App Store's most bizarre offerings

WHITE PAPER: HP, Microsoft & Intel

HP reference configuration for Premium OLTP

This paper describes a hardware and software reference architecture for using HP hardware to deploy very large and highly transactional Microsoft® SQL Server 2008 R2 OLTP database systems in tier 1 enterprise application environments. Learn More!

Hackers could start abusing electric car chargers to cripple the grid, researcher says

Hackers could use vulnerable charging stations to prevent the charging of electric vehicles in a certain area, or possibly even use the vulnerabilities to cripple parts of the electricity grid, a security researcher said during the Hack in the Box conference in Amsterdam on Thursday. READ MORE

Two-factor authentication ready to roll out at Microsoft

When Microsoft acquired PhoneFactor last fall, the handwriting was on the wall for the future of two-factor authentication for the company's consumer cloud offerings. Now it appears that handwriting is about to become a reality. READ MORE

INSIDER

Why Diversity Matters in IT Hiring

Building a network of diverse IT talent--people who will be ready for your next job opening--is a year-round task with a big payoff, says a former divisional CIO at GE READ MORE

WHITE PAPER: ADTRAN

Traditional WLAN vs. Virtual WLAN Matrix

Is it time to bring the power and benefits of virtualization to your wireless network? Check out this side-by-side comparison of a traditional WLAN with physical hardware controllers and a virtual WLAN which runs in the Cloud on a hypervisor (VMware). Learn More

7 things you need to know about Bitcoin

Bitcoins are all the buzz. The virtual currency is riding a rollercoaster of speculation, rising exponentially in value and reaching a high of $260 this Wednesday before plummeting to $130. What's more, the largest bitcoin exchange in the world just survived a coordinated hack attack, and bitcoin-generating malware is spreading across Europe like wildfire via Skype. READ MORE

iPhone 5S and new iPad Mini may be delayed until November

I have some bad news for all you folks eager to get your hands on Apple's next generation lineup of iOS devices. According to KGI Securities analyst Ming-Chi Kuo - who has a pretty spot on track record when it comes to Apple rumors - technical and production challenges may force Apple to delay the release of the iPhone 5S, the new iPad Mini, and the rumored low-cost iPhone. While Kuo initially anticipated... READ MORE

Widely used wireless IP cameras open to hijacking over the Internet, researchers say

Thousands of wireless IP cameras connected to the Internet have serious security weaknesses that allow attackers to hijack them and alter their firmware, according to two researchers from security firm Qualys. READ MORE

WHITE PAPER: Kaspersky

Why Complexity is IT Security's Worst Enemy

This white paper looks at the real challenges faced by organizations, and what new IT security threats and issues have arisen as a result. Increasingly, anti-malware alone is not enough, so this white paper investigates what new IT security approach is required to effectively respond to the changing threat landscape and new ways of working. Learn more.

Linux users don't buy software, but it's still worth selling

A few days ago, Canonical posted a list of the top 10 paid software downloads from the Ubuntu Software Center, which makes now a pretty good time to talk about how sales of software are doing in the software store that is included in the world's most popular version of Linux. READ MORE

Microsoft Who? Top 4 Highlights of Microsoft Management Summit 2013

It's challenging to absorb everything Microsoft at the cadence they would like IT pros to keep pace with, but here are four areas to pay close attention to: READ MORE

NAB show roundup: Cool gear for videophiles

I've spent the past few days at the annual show for the National Association of Broadcasters, also known as NAB. The trade show, held in Las Vegas, features events and products geared toward television and radio stations, as well as filmmakers and other video creators. READ MORE

How to Use BPM to Improve Customer Experience

A Gartner analyst speaking at the firm's business process management summit explains how BPM technologies can be used to bring more success to your enterprise by improving customer experience. READ MORE

15 of the App Store's most bizarre offerings

READ MORE

WHITE PAPER: F5

Scale Your DNS Infrastructure to Protect Your Business

DNS continues to be a tempting target for attackers, and when they succeed in disrupting DNS, all external data center services are affected. This paper helps organizations confronting these growth and security challenges understand how a new, full-proxy architecture for DNS provides a complete solution for global, local, and cloud load balancing. Learn More.

SLIDESHOWS

Top 10 cloud tools

New tools help IT execs cut cloud costs, optimize resources, integrate and manage cloud instances.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Hackers turn a Canon EOS camera into a remote surveillance tool

2. Extreme, Brocade bring fabrics to the enterprise edge

3. Gartner: Long hard climb to high level of cloud computing security

10. Cisco, IBM on the defensive with OpenDaylight

9. Navy CIO: use the cloud, but be careful

6. The worst data breaches (so far)

5. Windows 8: How to solve the Start Button dilemma

4. Skepticism follows Cisco-IBM led OpenDaylight SDN consortium

7. OpenStack grows up: But is it grown up enough for enterprise IT?

8. Knocking down the myths of why enterprises need MPLS

 

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments: