Thursday, November 07, 2013

The hidden fangs of Windows 8.1 -- and how to avoid them

Report: CIA pays AT&T for international call data

802.11ad: Progress at Last

Network World Daily News PM
November 07, 2013
Share this email

The hidden fangs of Windows 8.1 -- and how to avoid them

Before you install Windows 8.1, make sure you understand the gotchas and how not to get bit

READ MORE
 

Issue highlights

1. Report: CIA pays AT&T for international call data

2. 802.11ad: Progress at Last

3. Who supports Cisco's ACI, and why?

4. 5 disturbing BYOD lessons from the FAA's in-flight electronics announcement

5. 5 things you need to know about new Payment Card Industry (PCI 3.0) standard

6. INSIDER Masters of disasters: IT survivors of Katrina, Sandy and other natural disasters share their DR tips and tricks

7. What Google killing IE9 support means for software development

8. Android KitKat could be a strong deterrent to cybercrime and spying

9. Windows 8.1: Update or upgrade?

10. What is Pivotal? EMC and VMware want it to be your platform for building big data apps

11. 'Operation Hangover' hackers exploit latest Windows zero-day

12. Cisco, Juniper, Arista: The data center networking stories just keep coming

13. Automated hacking tools swarm Web site login pages

14. Of punchcards, platters, and wooden mice: The PC's origin story

WHITE PAPER: CDW

Software Asset Management: Getting Started

Find out what steps to take that can lead your organization down the smooth path to SAM deployment. This SAM primer can help you and your organization mitigate software non-compliance issues and optimize software license management while containing costs. Read Now

Report: CIA pays AT&T for international call data

The carrier turns over information about international calls on its network under a voluntary contract, The New York Times says READ MORE

802.11ad: Progress at Last

Almost two years ago, I wrote in these pages of my fondness for 60-GHz. radio, and my belief that .11ad would eventually play a major role in wireless LANs and not just outdoor point-to-point links, HDMI cable replacement, and short-range docking solutions. READ MORE

Who supports Cisco's ACI, and why?

For decades now, Cisco has been the single biggest factor in driving network change. Over the years, the company has been aggressive with VoIP, PoE, MPLS, wireless LAN and most recently converged infrastructure, and has gained a significant early-move advantage. However, when it comes to software-defined networks, I think it's fair to say that Cisco has lagged in both technology and vision, and has... READ MORE

5 disturbing BYOD lessons from the FAA's in-flight electronics announcement

Last week, the Federal Aviation Administration (FAA) moved to let passengers use their smartphones and tablets during airline take-offs and landings. But a closer look reveals that the FAA has in fact unwittingly written a guide of what NOT to do when creating a Bring Your Own Device (BYOD) policy. READ MORE

WHITE PAPER: Kaspersky

Hyper-Mobility Meets Security in the Corporate Environment

Read this whitepaper to learn more about the key threats associated with leaving smartphones unprotected and how your business can combat against mobile threats. Learn more.

5 things you need to know about new Payment Card Industry (PCI 3.0) standard

There's a new version of the Payment Card Industry standard for network security -- PCI 3.0 – out today from the group overseeing its publication, the PCI Security Standards Council. READ MORE

INSIDER

Masters of disasters: IT survivors of Katrina, Sandy and other natural disasters share their DR tips and tricks

Natural and manmade disasters are facts of life. Smart IT managers prepare for the worst before trouble hits, so that the businesses and government institutions that rely on IT can resume normal operations as soon as possible. READ MORE

What Google killing IE9 support means for software development

Google's announcement that it won't support Internet Explorer 9 is a sign of a broader move toward rapid iteration in software development. READ MORE

Android KitKat could be a strong deterrent to cybercrime and spying

With each new Android release, Google adds more security features to harden Android. Two security features in Android 4.4 KitKat are particularly notable because they are Linux kernel developments. Security-enhanced Linux (SELinux) policies are fully enabled in KitKat, and dm-verity was added. Both features improve the integrity and trust of the Android operating system. READ MORE

WHITE PAPER: IBM Corporation

Case Study: Signature Mortgage reduces loan processing time

Learn how Signature Mortgage is now able to process loans faster and more efficiently. Learn More.

Windows 8.1: Update or upgrade?

Overall, that is my impression of Windows 8.1 - nice to have, not a must-have. READ MORE

What is Pivotal? EMC and VMware want it to be your platform for building big data apps

Pivotal is a company to watch. The spin-out being led by former VMware chief Paul Maritz has assembled technology from EMC and VMware as well as a variety of open source platforms. Pivotal wants to be the place where enterprises build big data analytics apps for cloud-like infrastructures. To do that, Pivotal offers a variety of application development tools, data management products, and analytics... READ MORE

'Operation Hangover' hackers exploit latest Windows zero-day

The unpatched vulnerability in Windows that Microsoft acknowledged on Tuesday has been used by a known Indian hacker group responsible for earlier "Operation Hangover" attacks, security company Symantec said. READ MORE

Cisco, Juniper, Arista: The data center networking stories just keep coming

Meet Daye DeCentah, IT executive. Let's call her "DC" for short. DC faces a lot of challenges at work. Most all of these problems revolve around her having to deliver more, while using less - less staff, less systems, less power, less space, and, ultimately, less money. DC is bombarded with possible solutions to her wealth of problems. All have their advantages. All present both savings and improvements.... READ MORE

Automated hacking tools swarm Web site login pages

You may think most visitors to a Web site login page are people, but the reality is the vast majority are automated tools used by criminals looking for weak passwords. READ MORE

Of punchcards, platters, and wooden mice: The PC's origin story

READ MORE

WHITE PAPER: IBM

Cloud, Big Data, Analytics & Diagnostics Chart Future of APM

This EMA white paper discusses the challenges of managing applications in highly dynamic application environments. Modern enterprise applications are engineered for agility and frequently deployed over scalable, elastic IT infrastructures. Read to learn about the benefits of virtualization, public/private cloud, and hybrid deployments. Read Now

SLIDESHOWS

19 Apple rumors that were just wrong

Some of the rumors about Apple over the years were just ridiculous.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco takes fight to SDNs with bold Insieme launch

2. First look: The Cisco/Insieme family

3. Cisco competitors say Nexus 9000 brings closed hardware to an open software game

4. Microsoft Azure gaining ground on Amazon Web Services

5. High-gain patch antennas boost Wi-Fi capacity for Georgia Tech

6. Biggest tech industry layoffs of 2013

7. Microsoft warns of zero-day attack, graphics vulnerability exploited through Word

8. Insieme FAQ: a few key facts

9. Google walks away from Microsoft's IE9

10. Chinese professor builds Li-Fi system with retail parts

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments: