Thursday, October 31, 2013

How IETF plans to protect web from NSA snooping

  Best Tech-o-lanterns, 2013 | Why IBM is phasing out SmartCloud Enterprise in favor of SoftLayer

 
  Network World After Dark

Forward this to a Friend >>>


How IETF plans to protect web from NSA snooping
Speaking at the UN's recent Internet Governance Forum in Bali, Indonesia, IETF chair Jari Arkko laid out a plan to protect the U.S. Internet from the NSA's surveillance efforts. Read More
 


WEBCAST: Oracle

Innovation in Financial Services
Date: November 20th, 2013 Time: 1 PM This presentation will review the role IT should play in innovation. How financial services organizations are finding ways to rebalance their IT portfolio. Learn More

In this Issue


WHITE PAPER: CDW

The Power of PaaS
At a time when budgets are especially tight, organizations may find it hard to justify investments in the latest programming tools and testing platforms. Platform as a service (PaaS) solutions provide a viable option Read Now

Best Tech-o-lanterns, 2013
We've updated our collection of cool, scary and fun pumpkin carvings from around the web, with social media and other topics trending hot. Read More
 

Why IBM is phasing out SmartCloud Enterprise in favor of SoftLayer
News broke today that IBM will be phasing out SmartCloud Enterprise and migrating customers over to SoftLayer, which is an IaaS company Big Blue purchased over the summer. [: IBM to nix SmartCloud Enterprise, migrate customers to SoftLayer ] Read More
 

FAA sets electronics free on flights – mostly
After years of debate the Federal Aviation Administration today said airline passengers can by the end of the year use portable electronic devices during all phases of a commercial airline flight. Read More
 

Making sense of the Internet of Things
This week, Cisco hosted the inaugural Internet of Things World Forum in Barcelona, Spain. The event had a little under 800 attendees, which I thought was a great turnout for a first year event. There was a very diverse set of vendors at the event, ranging from traditional IT companies like Cisco, Oracle and SAP to a number of companies that IT people have likely never heard of, such as Grundfos, QnetiQ... Read More
 

Monster bosses: Be very afraid
Even the best bosses can occasionally take on some of the traits of these monsters. Read More
 

5 IT Outsourcing Tips in the Wake of Infosys's Visa Fraud Settlement
  Following the Infosys visa fraud $34 million settlement, IT outsourcing customers should take these five steps to protect themselves. Here's a look at what outsourcing customers need to do. Read More
 

Microsoft Kinect turns sign language into spoken language in real time
Microsoft has had its unsung products before, but the Kinect may prove its best worst product. By that I mean it's a great piece of hardware that the company can't seem to sell to anyone but gamers. There has been an SDK on the market for some time to make Windows-based Kinect apps, but we rarely hear of any great success stories, and that's a shame. The latest bit of genius comes from the folks at... Read More
 

Advanced Firewalls, part 2
The firewall has served as a primary barrier between a company's IT assets and the outside world for many years. In our last video, we examined some of the major advancements that have been incorporated into advanced firewalls over the last few years, including more granular application and user-level controls. These controls allow firewalls to more effectively restrict unnecessary or risky application... Read More
 

Experts weigh in with wish lists for Android 4.4 KitKat security
With Android 4.4 KitKat, Google has an opportunity to show that when it comes to security, the next version of the mobile operating system is ready for business. While we don't know whether Google will take up the challenge, security experts provided Wednesday their wish lists of enterprise-pleasing features. Read More
 

Fake social media ID duped security-aware IT guys
Security experts used fake Facebook and LinkedIn profiles pretending to represent a smart, attractive young woman to penetrate the defenses of a U.S. government agency with a high level of cybersecurity awareness, as part of an exercise that shows how effective social engineering attacks can be, even against technically sophisticated organizations. Read More
 

Dunkin' Brands Uses Analytics to Predict Global Threats
The coffee-and-doughnuts chain operates in 60 countries, so it uses a threat-assessment tool to keep employees safe during international conflicts. Read More
 

Red Hat launches new initiative to drive OpenStack into the enterprise
Open source technology provider Red Hat today announced a new initiative designed to boost the adoption of OpenStack in the enterprise. Read More
 

Silent Circle, Lavabit unite for 'Dark Mail' encrypted email project
Two privacy-focused email providers have launched the Dark Mail Alliance, a project to engineer an email system with robust defenses against spying. Read More
 

ObserveIT is like a surveillance camera for your IT systems
Companies use surveillance cameras to record what is happening in physical locations. Now take that concept and apply it to IT systems. ObserveIT records the user interface actions that occur when someone is accessing your systems or applications. The result is a detailed audit trail that shows precisely who did what in both video and transcript format. Read More
 

Lenovo hopes long battery and Ashton Kutcher will help sell tablets
  Lenovo hopes long battery and Ashton Kutcher will help sell tablets Lenovo is claiming that its new Yoga tablets will offer 18 hours of battery life when browsing the web, which would be the longest when compared to other tablets. From: Network World Videos Views: 3 0 ratings Time: 01:56 More in Science & Technology Read More
 

 

SLIDESHOWS

10 most powerful network management companies

Our look at the biggest players in the network management, um, world.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Raspberry Pi as a Network Monitoring Node

2. Cisco to release free standard software to boost Web videconferencing

3. Prosecutor in Aaron Swartz case targeted by 'swatting'

4. Monster bosses: Be very afraid

5. Report: NSA breaks into Yahoo, Google data center links

6. Mozilla releases 10 patches, five critical, for Firefox

7. Coast Guard spills the beans on Google's mystery barges

8. Fake social media ID duped security-aware IT guys

9. Gartner: 'Five styles of advanced defense' can protect enterprise from targeted attacks

10. Microsoft cybersecurity report warns users about the evils of clinging to XP


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


Survey: Doing business in a digital world - Chance to win a 32GB Nexus 7 tablet

The world's gone digital, and IT needs to step up. It's not enough to have a great website anymore. To be successful, digital must be a fully integrated part of the business, informed by IT as well as marketing and other constituencies. How are you doing? Are apps, websites, social, maybe even the cryptic "Internet of things" part of a comprehensive strategy?

In this InformationWeek survey, we'll investigate how thoroughly companies are embracing the changes brought by the web, mobile devices, cloud computing and social networking. The results of this survey will appear in an upcoming issue of InformationWeek, as well as in an in-depth InformationWeek report.

This survey will take under 10 minutes to complete. Upon completion, you will be eligible to enter a drawing for a 32GB Google Nexus 7 tablet, valued at $269. This survey sweepstakes is not sponsored, endorsed, or administered by Google®.

Your responses will remain confidential and will only be reported in aggregate.

To take the survey, simply click here:

http://informationweek.digitalbusiness.sgizmo.com/s3/?iwid=nl

We look forward to sharing the results of this survey with you soon in print and online at www.informationweek.com and http://reports.informationweek.com.

Heather Vallis
Managing Editor, Research
InformationWeek
heather.vallis@ubm.com

Contest rules: http://informationweek.digitalbusinessrules.sgizmo.com/s3/
___________________________________________________________________________________________

TO UNSUBSCRIBE
This email was sent to networking.world@gmail.com

You are receiving this email because you provided UBM TechWeb with your email address.
To opt-out of any future Research offers from InformationWeek, please respond here.
https://www.techwebonlineevents.com/ars/optout1.do?mode=optout&forward=optoutpage&P=IK&F=716&T=RS

PRIVACY NOTICE
UBM TechWeb takes your privacy seriously.
To learn more, please read our Privacy Policy.
http://legal.us.ubm.com/privacy-notice-highlights/

FOR FURTHER COMMUNICATION, PLEASE CONTACT:
Customer Service
UBM TechWeb
600 Community Drive
Manhasset, NY 11030

Halloween Bonus newsletter: Graveyards, pumpkins & horror stories

Best Tech-o-lanterns, 2013 | Geekiest Halloween Costumes from Around the Web

Network World Special Alert

Forward this to a Friend >>>


5 IT security horror stories (and 5 solutions)
When it comes to security, your employees may be your weakest link. While policies and training can go a long way toward helping your employees keep devices and data safe, sometimes technology is the answer. Read More



Best Tech-o-lanterns, 2013
We've updated our collection of cool, scary and fun pumpkin carvings from around the web, with social media and other topics trending hot. Read More

Geekiest Halloween Costumes from Around the Web
With Halloween only a few weeks away, it's time to start planning a really cool Halloween costume rather than running out on Oct. 30 and picking up some toilet paper or putting a sheet over your head. We've scoured the Web to find a bunch of techie, geeky or nerdy costume ideas that others have tried before to get you inspired. Read More

2013 tech industry graveyard
Google, Microsoft and Yahoo among those reading products their last rites Read More

Google's Graveyard: 13 products Google killed off in 2013
Google giveth (including Google Death) and Google taketh away. This year, the company has sent a host of well-known and more obscure offerings to their demise. But don't worry, the company still has dozens of new and old products in its portfolio. Here's a look back at the ones killed off this year. Read More

Microsoft's Graveyard: 16 products that Microsoft has killed
Some were killed off, others folded into new products. Either way, no product lives forever. Read More

World's craziest Halloween coffins
From KISS caskets to lions and airplanes, a plethora of burial boxes populate the world Read More

Best Halloween musical light shows
Techies wire up spooky home light shows to scare/entertain the neighborhood. Read More

Zombies Are Scary for Halloween, Scarier for Mobile IT
If you're talking about movies or Halloween costumes, zombies are scary fun. However, when the term for the undead refers to company-owned or BYOD mobile phones, CIOs are looking at the potential for frightening amounts of buried expenses. Read More

Top Mac-o-lanterns from around the Web
A snapshot of Apple devotion expressed via carved vegetation. Read More

Top Linux-o-lanterns from around the Web
A glimpse at open source fandom depicted in Halloween pumpkin carvings. Read More

Happy Halloween! Marissa Mayer reportedly just bought a funeral home
Here's one way to celebrate the ghostly holiday: Buy a funeral home. Read More

Tech-or-treat: What 13 tech companies might be handing out this Halloween
Here's what trick-or-treaters could expect to get if these technology companies turned on their porch lights this Halloween Read More

That's no poltergeist invading your privacy: Spooky spying hacks make homes seem haunted
Back in the day, 1990s and early 2000s, you didn't hear too much about remote administration tools (RAT), so victims of early RATs like Back Orifice, Netbus or Sub7 would often freak out when the CD-tray would open or close on its own, music files would play for no reason, emails would be snatched from thin air, or files, icons, the clock and task manager would disappear. Read More



SLIDESHOWS

10 most powerful network management companies

Our look at the biggest players in the network management, um, world.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 19 Apple rumors that were just wrong

2. The open-source graveyard: 7 projects that have gone belly-up

3. 5 best and 5 worst cities for IT salaries

4. Juniper unveils new fabric switch, architecture

5. 'Joe the IT guy' video exceeds not-so-lofty expectations

6. Microsoft urges Windows 8 upgrade for security sake

7. Windows 8.1 networking cheat sheet

8. The must-have iPad office apps, round 7

9. Microsoft may turn to Windows Defender for unprotected PCs

10. What's holding back the cloud industry?


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


Nokia's 2520 could beat Microsoft at its own tablet game

  Google Glass while driving is illegal in some states, but should it be? | Get excited, fellow nerds: Smartphones may soon be as customizable as PCs

 
  Network World Cool Tools

Forward this to a Friend >>>


Nokia's 2520 could beat Microsoft at its own tablet game
  Microsoft doesn't own Nokia yet, so the two are still competitors for now, although they deny it. One thing you can't deny: on paper, the Nokia 2520 tablet is a seriously impressive piece of hardware. Right now, there are two Windows RT vendors on the market: Microsoft and Nokia. HP and Dell aren't in the game, even with Business Insider claiming the two want to "hurt" Intel. After all, what better... Read More
 


WHITE PAPER: F5 Networks
 
Application Performance in a World of Cloud and Mobility
Cloud, mobility, and networking have shifted the dynamics of application performance. As a result, IT is under more pressure than ever to improve application performance. Learn how to ensure that employees and customers can access applications effectively without being forced to expend more resources on network upgrades. Read more >>

RESOURCE COMPLIMENTS OF: Enterprise Mobility Management Tech Seminar

Dallas Execs Network-Enterprise Mobility Management Seminar
Attend this content-rich, one-day event and determine the next steps to take as you hear from mobility experts, enterprise IT professionals and leading product and service providers. Thursday, November 14, 2013. 8:00 am-4:15 pm. W Dallas - Victory Hotel. Register now

Google Glass while driving is illegal in some states, but should it be?
After receiving a citation for wearing Google Glass while driving, California resident Cecilia Abadie took to her Google+ profile to debate the merits of the ticket and whether the law is contradictory. It's a discussion worth having. Read More
 

Get excited, fellow nerds: Smartphones may soon be as customizable as PCs
My first PC had a 286 processor with an EGA display and a 40mb MFM hard drive (and, let me tell you, those were some MEGA bytes). That glorious gray, metal box first sat on my desk somewhere around 1985. And, you know what, I was still using that machine -- with some significant modifications -- until 1997. That's 12 years of using, and enjoying, the same machine. Read More
 


WHITE PAPER: Mobiquity Inc.
 
The Five Big Lies Leaders Hear About "Going Mobile"
Mobile hasn't been around long, but it has already made a tremendous impact. With such a new technology, it's not surprising that a lot of misinformation is floating around. Don't be taken in. Get the truth by reading this paper. It lays out how to develop an effective mobile initiative, one you need to succeed. Learn More

Many iOS apps found open to hijacking on public Wi-Fi
An Israeli startup has discovered a vulnerability in many iOS apps that attackers could secretly exploit over a public Wi-Fi network to send their own data to an Apple iPhone or iPad. Read More
 

Apple iPhone 5s battery issue could result in reduced battery life
Apple is reaching out to owners of the iPhone 5s because of a manufacturing issue that could result in reduced battery life. Read More
 


WHITE PAPER: Netscout Systems Inc.

Real-Time Application-Centric Operations Visibility
This paper examines the move towards application/service performance within IT operations, and in particular the network-based delivery of those services. In addition a look at the roles, responsibilities and objectives that network- and application-based service-oriented visibility can and should play. Learn More

First look (and listen): Firefox 25
Firefox's new support for HTML5's web audio feature steals the show Read More
 

NAO robot can now speak 19 languages -- thanks to the cloud
Aldebaran's NAO humanoid robot now gets speech recognition abilities from a cloud-based voice recognition service from Nuance. Read More
 

zSpace, incredible 3D viewing
Read More
 

The coolest Air Force UFO videos
National Archives features UFO-related images, interviews Read More
 

 

SLIDESHOWS

10 most powerful network management companies

Our look at the biggest players in the network management, um, world.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 19 Apple rumors that were just wrong

2. The open-source graveyard: 7 projects that have gone belly-up

3. 5 best and 5 worst cities for IT salaries

4. Juniper unveils new fabric switch, architecture

5. 'Joe the IT guy' video exceeds not-so-lofty expectations

6. Microsoft urges Windows 8 upgrade for security sake

7. Windows 8.1 networking cheat sheet

8. The must-have iPad office apps, round 7

9. Microsoft may turn to Windows Defender for unprotected PCs

10. What's holding back the cloud industry?


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cool_tools_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


¡QUEREMOS HALLOWEEN, QUEREMOS HALLOWEEN!

¿Tienes problemas para ver este mensaje? Por favor léelo en tu navegador web.

31 de octubre de 2013

  Vuelo    |   Avión + Hotel   |    Hotel    | Transportación terrestre |   Vivabus   |   Seguros   | Servicios Adicionales
¡QUE NO SE ASUSTE TU BOLSILLO! Share this page
*Tarifa aplica en modalidad VivaLight. **Tarifa aplica en modalidad VivaBásico. No incluye grupo de abordaje o cargos por expedición de boleto. La tarifa incluye impuestos, TUA y cargos de seguridad. No aplicable con otras promociones. Compra el 31 de octubre para volar del 4 de noviembre al 12 de diciembre de 2013. Consulta términos y condiciones en www.vivaaerobus.com 

CONOCER MÁS >




+ Información + Información










Se aplican restricciones, para mayor información visita nuestro sitio web: www.vivaaerobus.com

En vivaaerobus.com respetamos tu privacidad, es por eso que no compartimos ninguna de las direcciones de correo electrónico registradas en este boletín electrónico.Para mayor información consulta las políticas de privacidad del sitio web.
Si no deseas seguir recibiendo correos promocionales de VivaAerobus, puedes cancelar tu suscripción.