Thursday, August 01, 2013

General Alexander heckled during Black Hat keynote address

Head-spinning history of the propeller beanie

Is it a bird? Is it a plane? No, it's a huge ******* meteor!

Network World Daily News AM
August 01, 2013
Share this email

General Alexander heckled during Black Hat keynote address

General Keith Alexander, Director of the National Security Agency, kept a cool head as he was heckled by attendees during his keynote address at the Black Hat security conference in Las Vegas on Wednesday

READ MORE
 

Issue highlights

1. Head-spinning history of the propeller beanie

2. Is it a bird? Is it a plane? No, it's a huge ******* meteor!

3. Controls keep NSA spy programs legal, director tells Black Hat audience

4. NetApp and Cisco Expand FlexPod Portfolio

5. Isis mobile wallet to roll out nationwide this year

6. IBM says SEC is investigating how it reports cloud revenues

7. Microsoft plunks Office on Android phones

8. Vulnerabilities in D-Link network video recorders enable remote spying, researcher says

9. 3D printers can pay for themselves in under a year

10. CIOs Say Mobilizing Enterprise Apps Is Not That Easy

11. Researchers demo how apps, chargers can circumvent Apple iPhone, iPad security

12. Aaron Swartz supporters label MIT report a "whitewash"

13. INSIDER Enterprise Social Network Moves Ad Agency Into the Future

14. 10 apps to save you from yourself behind the wheel

WHITE PAPER: Cisco Systems

Data Center Dinosaur: Adapt or Die

Nearly everything in data centers is changing, from cabling and network design, to more sophisticated, faster compact builds. Network security has to adapt, and IT must drive new security approaches--installing technologies and policies that can protect today's and tomorrow's data centers. Read more >>

Head-spinning history of the propeller beanie

Nothing quite says geek (or propeller-head), like a good old propeller beanie. Though twirly beanies can also say chic. Here's a short spin through the colorful history of propeller beanies. READ MORE

Is it a bird? Is it a plane? No, it's a huge ******* meteor!

As seems to be my want at the moment, today I have another disaster-oriented column for you. Remember the recent meteor event in Russia? On February 15 this year a rock estimated to be 50 meters wide and weighing an estimated 10,000 tons entered the atmosphere over the city of Chelyabinsk at a speed of around 40,000 mph and exploded. READ MORE

Controls keep NSA spy programs legal, director tells Black Hat audience

A skeptical but mostly respectful crowd of Black Hat security attendees Wednesday listened intently as National Security Agency Director Keith Alexander defended controversial U.S. surveillance programs in a keynote address. READ MORE

NetApp and Cisco Expand FlexPod Portfolio

Keeping pace with the rapid rate of change in integrated computing platforms (ICPs), NetApp and Cisco aren't wasting any time aligning innovation with the demands of its 2,400 customers. The days of do-it-yourself (DIY) builds are waning as more and more ICP vendors aim to make IT infrastructure easier to procure, manage, and maintain. Full details of this shift are described in ESG's Market Landscape... READ MORE

WEBCAST: IBM

Fighting Fraud Videos: IBM Intelligent Investigation Manager

Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both the commercial and public sector space. Learn More.

Isis mobile wallet to roll out nationwide this year

Isis will roll out its mobile wallet application nationwide later this year following successful pilots that launched last fall in Austin, Texas, and Salt Lake City, Utah. READ MORE

IBM says SEC is investigating how it reports cloud revenues

IBM is the subject of a probe by the U.S. Securities and Exchange Commission into how it reports revenue related to its cloud computing business, the vendor revealed Wednesday. READ MORE

Microsoft plunks Office on Android phones

Microsoft today released a stripped-down version of Office for Android smartphones, continuing its strategy of tying its mobile suite to the Office 365 rent-not-buy subscription plans. READ MORE

Vulnerabilities in D-Link network video recorders enable remote spying, researcher says

Some D-Link devices that enable remote access to surveillance camera feeds or other potentially sensitive data contain critical vulnerabilities that enable hackers to bypass authentication and access them from the Internet. READ MORE

WHITE PAPER: Netscout Systems Inc.

Good APM Practices Get Results

According to NetForecast's survey, enterprises with application performance management (APM) best practices benchmark scores above six on a ten-point scale experience 75% better results in critical areas. This research paper reveals the survey results as well as discusses the best practices for APM. Learn More.

3D printers can pay for themselves in under a year

The average person could save big money with a 3D printer by printing just 20 products a year instead of buying them at a store, according to a Michigan Tech University study. READ MORE

CIOs Say Mobilizing Enterprise Apps Is Not That Easy

Employees want their go-to business apps available on their mobile devices. IT wants to deliver enterprise apps to help mobile workers become more productive. So what's keeping CIOs from bringing those critical apps to iPhones and Android phones? READ MORE

Researchers demo how apps, chargers can circumvent Apple iPhone, iPad security

Georgia Tech researchers have developed a proof-of-concept attack called Jekyll that involves using Trojan Horse-style apps to sneak malware past Apple's app review process and onto iOS devices such as the iPhone and iPad. READ MORE

Aaron Swartz supporters label MIT report a "whitewash"

Supporters of Aaron Swartz have slammed a lengthy report issued yesterday by the Massachusetts Institute of Technology (MIT) about its legal stance of remaining "neutral" in the federal government's computer crimes case against the young man, who killed himself in January. READ MORE

INSIDER

Enterprise Social Network Moves Ad Agency Into the Future

Olgivy and Mather builds its own social collaboration system with open-source tools and many, many user interviews. READ MORE

10 apps to save you from yourself behind the wheel

If you can't leave your phone alone while driving, these solutions might help READ MORE

WEBCAST: VCE

Reduced Costs & Improve Asset Utilization with Vblock

IDC suggests IT organizations deploy converged infrastructure systems that manage server, storage and network as unified IT assets. Learn about the significant business benefits 5 companies experienced when doing so. Learn More.

SLIDESHOWS

10 reasons for IT job-hunters to be optimistic

IT employment numbers are rising, employers are forging ahead with hiring plans, and CIOs are confident about business operations and budget stability.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 apps to save you from yourself behind the wheel

2. You learn something new about Google every day

3. Spoofed! Fake GPS signals lead yacht astray

4. How CCP handled the biggest multiplayer battle in gaming history

5. Cloud computing causing rethinking of disaster recovery

6. 10 reasons for IT job-hunters to be optimistic

7. Cisco and NetApp tackle Hadoop

8. Why Bob Mansfield was cut from Apple's executive team

9. 10 competitors Cisco couldn't kill off

10. Ubuntu Edge smartphone funding levels dying off

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments: