Wednesday, June 19, 2013

Apple end-to-end encryption far from bulletproof

  Best security tools for under $3,000 | Papers please! Microsoft creates second-class citizens with Office iPhone app
 
  Network World After Dark

Forward this to a Friend >>>


Apple end-to-end encryption far from bulletproof
Apple won't provide experts with details of encryption architecture, so what it means by 'cannot decrypt"' data is unclear, expert says Read More


WHITE PAPER: Netscout Systems Inc.

Service-Oriented Performance Management Strategy
This white paper is to help IT organizations adopt a management methodology that enables them to improve the user experience by focusing on service delivery management. Learn More.

WEBCAST: IBM

Content Analytics Explained
Content Analytics Explained - Listen to Bob Foyle, Sr. Product Manager, IBM talk about Content Analytics and the Analytics Imperative. Learn More.

Best security tools for under $3,000
Check Point wins test of eight unified threat management (UTM) devices for small business Read More

Papers please! Microsoft creates second-class citizens with Office iPhone app
Microsoft erred when it decided that the new Office Mobile for iPhone would be available to Office 365 customers but not to those who purchased a traditional "perpetual" license to Office 2013, an analyst argued Read More

Start-up readies network-optimized Linux for data centers
Start-up Cumulus Networks this week has emerged with a Linux network operating system designed for programmable data centers like the ones Google and Facebook are building. Read More

Copper thefts measured in miles around Seattle
A couple of interesting developments in the Seattle are this week must have been keeping law enforcement busy. First, a number of outlets are reporting that prosecutors have charged two men with what is being called the largest metal theft in state history - 4.3 miles of copper wire from the underside of an elevated train line over an eight month period spanning 1010-2011. Read More

15 Ways to Protect Your Ecommerce Site From Hacking and Fraud
Hackers are stealing credit card and other sensitive information from ecommerce sites. To protect (and reassure) your customers, it's imperative to know how to protect your ebusiness and your sensitive customer data. Ecommerce and security experts share 15 tips on how you can prevent fraud and keep your site safe. Read More

Ubuntu Touch smartphone one step closer to shipping
Having a great, Linux-based, mobile platform is one thing. Bringing it to the masses, in the form of actual smartphones (and tablets, phablets and whatever other words we're using to describe "devices we can hold in our hand" nowadays), is quite another. Recent history is littered with the remains of Open Source (or, at least, predominantly Open Source) platforms that just never quite made it big.... Read More

Say 'cheese,' Earthlings! Spacecraft to snap home planet pic from deep space
NASA's Cassini spacecraft, now flying near Saturn, is turning its cameras back toward Earth today so it can grab a photo of its home planet from almost 900 million miles away Read More

Oracle, IBM to unwrap new Unix server processors at conference
Demand for mainframe and high-performance Unix servers is falling, but a new wave of SPARC and IBM Power chips for the servers will be unwrapped at the Hot Chips conference in late August. Read More

iPad 5 rumor rollup for the week ending June 18
As last week's Apple WWDC faded in the rear view mirror, the iOSphere hungered for more. And the hunger gave birth to hope, and hope to more rumors, including the one that predicts iPad 5 will be announced this week to foil and foul Samsung's scheduled London news. Read More

Microsoft's Kinect technology is a potential goldmine for mobile
The consumer PC market has undergone a major transformation over the last few years, due in no small part to the rapid influx of relatively powerful and easy-to-use ultra-mobile devices like smartphones and tablets. Read More

Quick look: The NSA security quagmire
Big mess: FBI now looking at Edward Snowden's disclosures about the National Security Agency's broad monitoring of phone call and Internet data from big companies such as Google and Facebook. Read More

 

SLIDESHOWS

Best security tools for under $3,000

Check Point wins test of eight unified threat management (UTM) devices for small business.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Verizon accused of intentionally slowing Netflix video streaming

7. Scientist out to break Amdahl's law

2. 10 vendors that could power Star Trek

3. Latest iPhone 6 concept design inspired by Apple iOS 7 debut

10. BYOD decision points: Who pays?

4. Cisco impresses with first crack at next-gen firewall

8. Apple's iOS 7 icons are ugly and a step backwards

5. The Microsoft break-up that never happened

9. Getting the most out of flash storage

6. Can Red Hat do for OpenStack what it did for Linux?

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: