Tuesday, December 03, 2013

Amazon's nightmare: Software hijacks drones mid-air

Network World After Dark - Newsletter - networkworld.com
  Eight tips for more secure mobile shopping | Wikipedia kicks off fundraiser … without wall-to-wall Jimmy Wales

  Network World After Dark

Forward this to a Friend >>>

Amazon's nightmare: Software hijacks drones mid-air
  Although Amazon's proposed drone-based product delivery service is still apparently years away, one hacker has already developed a sort of next-generation pirate ship that could hijack and redirect Amazon's delivery bots mid-air. Read More

WHITE PAPER: Netscout Systems Inc.

Good APM Practices Get Results
According to NetForecast's survey, enterprises with application performance management (APM) best practices benchmark scores above six on a ten-point scale experience 75% better results in critical areas. This research paper reveals the survey results as well as discusses the best practices for APM. Learn More.

WHITE PAPER: Mobiquity Inc.
The Five Big Lies Leaders Hear About "Going Mobile"
Mobile hasn't been around long, but it has already made a tremendous impact. With such a new technology, it's not surprising that a lot of misinformation is floating around. Don't be taken in. Get the truth by reading this paper. It lays out how to develop an effective mobile initiative, one you need to succeed. Learn More

Eight tips for more secure mobile shopping
Online shopping trends point to lots of people, particularly men, using their smartphones and tablets to buy holiday presents. Since some of that browsing and buying will occur at work, experts say companies would be wise to give employees the following eight tips to protect themselves and corporate data. Read More

Wikipedia kicks off fundraiser … without wall-to-wall Jimmy Wales
Even Wikipedia founder Jimmy Wales has admitted that he found it "annoying" that a picture of Jimmy Wales would appear on every page of the online encyclopedia during its weeks-long annual fundraising campaign. Read More

Gaming company caught building Bitcoin mining botnet from users' computers gets off light
Read More

300-pound crime-predicting mobile robot: Crime-preventing precog or 'R2D2's evil twin'?
Imagine a five-foot-tall, 300-pound mobile robot, which has a striking resemblance to R2D2, "that can see, hear, feel and smell" as it predicts and prevents crime. But not everyone thinks the surveillance-machine on wheels is cute; in fact, Marc Rotenberg, director of the Electronic Privacy and Information Center, told The New York Times that the Knightscope K5 Autonomous Data Machine "is like R2D2's... Read More

Steve Jobs initially wasn't a fan of white Apple products
  With the advent and popularity of the iPod, Apple's white iPod and accompanying headphones soon became iconic symbols. Interestingly enough, a new book profiling Apple design guru Jony Ive reveals that Jobs initially wasn't on board with Apple's designs moving in a white direction. What's more, Apple's headphone cords are not exactly white as a result. Read More

The CG Story - A must have for computer graphics fans
Read More

Experimental malware uses inaudible sound to defeat network air gaps
In a development likely to concern those who believe that a system that's not connected to a network is safe from surveillance, researchers have demonstrated that microphones and speakers built into laptops can be used to covertly transmit and receive data through inaudible audio signals Read More

How to shove 50 meters of optical fiber into a microchip
The Defense Advanced Research Projects Agency recently said its program to develop cutting edge photonics products has yielded two chips that can support long optical delays with low loss useful for a number of applications including wideband wireless systems, optical buffers for all-optical routing networks, and ultra-stable optical interferometers for sensing applications. Read More

What did Apple do in 2013? We evaluate what Apple achieved and ask if it fulfilled the prophesy
As the year draws to a close, it's our chance to reflect on what happened in the year just closing. Looking back to what we wrote at this time last year is enlightening. Just how many of our predictions made it into reality? Read More



Don't click on these links

Whether you receive a phishing email inviting you to click on a specific link or whether you stumble upon it while Web surfing, here are 10 types of links you should never click on.


As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn


1. 18 Hot IT Certifications for 2014

2. Don't click on these links

3. BlackBerry open letter to customers is long on cliches

4. VMware vSphere 5.5 bulks up with more muscle, high-availability

5. Sneaky software turns your PC into a Bitcoin-mining zombie

6. Microsoft's new volume-licensing scheme could simplify buying, managing products

7. Cisco has this SDN thing covered

8. Google Cloud Compute goes live

9. How to stay one step ahead of phishing attacks

10. Rumored Microsoft CEO plan is a very bad idea


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: