Wednesday, July 10, 2013

First Look: Google Chrome 28 browser

Agency destroys $170K worth of IT gear over non-existent malware threat

20 computer terms every Mac user should know

Network World Daily News PM
July 10, 2013
Share this email

First Look: Google Chrome 28 browser

A new rich notification feature, a different kind of WebKit and a raft of security fixes made it into the latest stable version of Google's Chrome browser.

READ MORE
 

Issue highlights

1. Agency destroys $170K worth of IT gear over non-existent malware threat

2. 20 computer terms every Mac user should know

3. BYOD breeds distrust between workers and IT

4. Pirate Bay founder working on spy-proof text messaging app

5. 3 new SSDs to boost your laptop's speed

6. Google was down? You mean the search engine?

7. MSFT to developers: Fix Windows app security flaws in 180 days or be kicked from stores

8. Apple colluded with book publishers on e-book prices, judge rules

9. INSIDER How to keep your new IT hires from jumping ship

10. 7 hot gadgets to make your summer sizzle

WHITE PAPER: Tripwire

Five Tips for Outsmarting the Information Age Adversary

Today's attackers vigilantly wait for you to slip up before they strike your information systems and compromise your data. Learn five actions you can take to improve your information risk management and security strategy and stay one step ahead of the information age adversary. Read More

Agency destroys $170K worth of IT gear over non-existent malware threat

The U.S. Department of Commerce's Economic Development Administration (EDA) destroyed about $170,000 worth of IT equipment including computers, printers, keyboards and computer mice last year on the mistaken belief that the systems were irreparably compromised by malware. READ MORE

20 computer terms every Mac user should know

Throughout the life of Mac 101, we've talked a lot about Apple technologies and terms. But with the gentle persuasion of this column's readers,A I've come to realize that--all too often--terms and acronyms that many of us take for granted leave users new to technology scratching their heads. Let's rectify that now with a meander through some common tech terms. READ MORE

BYOD breeds distrust between workers and IT

Nearly a third of U.S. workers distrust company software on their mobile devices READ MORE

WHITE PAPER: IBM

A Smarter Approach to CRM: An IBM Perspective

Read this white paper, created in collaboration with Frost & Sullivan, to see how a customer relationship management (CRM) solution can help you respond on the customers' terms. Learn More.

Pirate Bay founder working on spy-proof text messaging app

Peter Sunde, the co-founder of BitTorrent search engine The Pirate Bay, is working on developing a secure mobile messaging app and service that's intended to be safe from government surveillance and be user friendly at the same time. READ MORE

3 new SSDs to boost your laptop's speed

Seagate, Samsung and OCZ have launched new consumer-class SSDs. We benchmarked all three to find which one has the best performance. READ MORE

Google was down? You mean the search engine?

One time I thought I saw a Cape Cod bridge go down but it turned out to be nothing more than an optical illusion, so I have to question the veracity of these reports asserting that Google - the search engine part of Google - was down for a spell this morning. READ MORE

WHITE PAPER: IBM

Businesses are ready for a new approach to IT

Today's businesses need simpler more efficient and flexible computing models. The IBM PureSystems family is comprised of platform systems and infrastructure systems that include built-in "patterns of expertise" to address complex business and operational tasks for smarter computing. Learn More

MSFT to developers: Fix Windows app security flaws in 180 days or be kicked from stores

App developers have no more than 180 days to fix security flaws or Microsoft will kick the vulnerable app from the Windows Store, Windows Phone Store, Office Store, and Azure Marketplace. Microsoft's new security policy for apps states: READ MORE

Apple colluded with book publishers on e-book prices, judge rules

Apple violated antitrust laws when it colluded with publishers to set prices of e-books, a U.S. district court judge has ruled. READ MORE

INSIDER

How to keep your new IT hires from jumping ship

With IT talent hard to find and expensive to replace, savvy companies use tech-specific onboarding programs to win the hearts and minds of IT employees. Insider (registration required) READ MORE

7 hot gadgets to make your summer sizzle

Ready for summer? We've tested a fresh batch of tech gear built for the great outdoors. Whether you're going camping, paddling upriver, exploring the backcountry or just lounging by the pool, these gadgets can enhance your alfresco adventures. READ MORE

WHITE PAPER: Condusiv Technologies

Managing the I/O Explosion Without Extra Hardware

In this Technology Spotlight, IDC highlights the unexpected I/O explosion brought about by virtualization and presents new technologies that deliver exceptional application performance without additional hardware by eliminating unnecessary I/O traffic at the source. Read more. Read Now!

SLIDESHOWS

6 rising open source stars

Names you'll want to know in the free software/open-source world.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 6 highest/lowest paid IT jobs

2. Best college tech majors for landing a top starting salary

3. How to solve Windows 8 crashes in less than a minute

4. Cisco impresses with first crack at next-gen firewall

5. 8 hot mobile startups to watch

6. 10 biggest home networking mistakes (and how to fix them)

7. Meet the next open-source stars

8. The worst cloud outages of 2013 (so far)

9. The biggest security snafus of 2013

10. A look at 22 Linux Foundation newbies

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments: