Tuesday, November 05, 2013

Google introduces Helpouts, a new way to get help over video

Biggest risks in IPv6 security today

Products of the week 11.04.13

Network World Daily News AM
November 05, 2013
Share this email

Google introduces Helpouts, a new way to get help over video

Google has launched a new tool that connects people with experts over live interactive video for free or paid advice, while adding a revenue stream for the company in the form of transaction fees from providers.

READ MORE
 

Issue highlights

1. Biggest risks in IPv6 security today

2. Products of the week 11.04.13

3. Windows Azure users can use hard drives to import and export data

4. IDC: BlackBerry needs to stop the bleeding and restore confidence

5. 11 sure signs you've been hacked

6. 12 must-have iPad apps for newbies

7. 'Selfish miner' attack could devastate Bitcoin, researchers say

8. Habitable planets way more common than you think

9. CryptoLocker creators try to extort even more money from victims with new service

10. IDC tabs 'Specialized Threat Analysis and Protection' as new security segment

11. Geek-themed Meme of the Week: Silence is Golden Edition

 

Biggest risks in IPv6 security today

Although IPv6 packets have started to flow, network engineers still tread lightly because of lingering security concerns. Here are the top six security risks in IPv6 network security today as voted by gogoNET members, a community of 95,000 network professionals. READ MORE

Products of the week 11.04.13

Our roundup of intriguing new products from companies such as Service Mesh and Red Lion READ MORE

Windows Azure users can use hard drives to import and export data

Microsoft is offering Windows Azure customers the facility of transferring their data offline to and from Azure storage accounts using hard disk drives. READ MORE

WHITE PAPER: CDW

Cloud Storage and Backup

The proliferation of cloud computing options has begun to change the way storage is thought about, procured and used. IT managers and departments need to think through how cloud options might fit into and complement their onsite data infrastructures. Read Now

IDC: BlackBerry needs to stop the bleeding and restore confidence

With the ousting of BlackBerry CEO Thorsten Heins and the company charting a new course, IDC research manager for mobile phones Ramon Llamas said the company needs to set priorities of stopping the bleeding and restoring confidence. READ MORE

11 sure signs you've been hacked

In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable. READ MORE

12 must-have iPad apps for newbies

With the iPad Air now available, a fresh look apps to try for work and fun READ MORE

WEBCAST: Silver Peak Systems, Inc.

Combat Disasters And Optimize Business Operations

Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication strategies and technologies. View now >>

'Selfish miner' attack could devastate Bitcoin, researchers say

Bitcoin is vulnerable to an attack that could have devastating effects on the virtual currency, but it can be fixed with a software update, according to researchers from Cornell University. READ MORE

Habitable planets way more common than you think

The idea that many as 20% of the Sun-like stars in our solar system have Earth-sized planets that could host life seems astounding. READ MORE

CryptoLocker creators try to extort even more money from victims with new service

The creators of CryptoLocker, a piece of malware that encrypts user data and holds it for ransom, are giving users who removed the malicious program from their computers a second chance to recover their files, but at a much higher cost. READ MORE

IDC tabs 'Specialized Threat Analysis and Protection' as new security segment

Products that can detect stealthy malware-based attacks aimed at cyber-espionage and data exfiltration should be considered a specialized area of the security market, according to research firm IDC, which has designated a new market category for them: "Specialized Threat Analysis and Protection." READ MORE

Geek-themed Meme of the Week: Silence is Golden Edition

No. 20 in our Geek-Themed Meme of the Week series, plucked from Reddit, expresses a thought that I have shared on more than one occasion. Want more? Check out the "Geek-themed Meme of the Week Archive": READ MORE

WHITE PAPER: CDW

Software Asset Management: Getting Started

Find out what steps to take that can lead your organization down the smooth path to SAM deployment. This SAM primer can help you and your organization mitigate software non-compliance issues and optimize software license management while containing costs. Read Now

SLIDESHOWS

19 Apple rumors that were just wrong

Some of the rumors about Apple over the years were just ridiculous.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Microsoft to can Skype API, third-party products will not work

2. Arista fires broadside at Cisco/Insieme with new switches

3. Car crash prevention technologies face huge challenges

4. First look: Google's new Nexus 5

5. Eye-opening 'Morris worm' turns 25 tomorrow

6. High-gain patch antennas boost Wi-Fi capacity for Georgia Tech

7. CAPTCHA crushed, new era of threats emerge

8. Free cloud storage service MegaCloud goes dark

9. Fake social media ID duped security-aware IT guys

10. Gartner: Cloud-based security as a service set to take off

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments: