Friday, February 28, 2014

Cloud security concerns are overblown, experts say

Is Your IT Shop a Scrambler or a Leader? | 13 of today's coolest network research projects

Network World Compliance

Forward this to a Friend >>>


Cloud security concerns are overblown, experts say
Security concerns should not deter enterprises from using public cloud technologies when it makes business sense. Read More


WHITE PAPER: IBM

Streamline Data Protection with Storage Manager
IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup and Restore, TSM is a far more comprehensive data-protection solution. Read Now

WHITE PAPER: Crittercism

The 2013 Mobile App Performance Management Report
Most enterprises are looking for ways to leverage their investments in web technology to handle mobile app performance, but between monitoring, OS variants, screen sizes and OEMs, this can be a costly and complex approach. This 2013 Mobile APM Report highlights best practices for meeting mobile app challenges and ensuring mobile app performance. Read more!

INSIDER
Is Your IT Shop a Scrambler or a Leader?
An IT veteran describes the four stages of the technology organization -- and what it takes to move up a notch Read More

13 of today's coolest network research projects
Here's a whirlwind look at some of the wildest and potentially most useful technology research projects from university and vendor labs related to computer networking. Read More

Hot, new products from RSA
Our roundup of new security products on hand at this week's show. Read More

Cloud Service Providers Fight Back, Challenge NSA
Facing a real business threat from the fallout from the NSA's intelligence gathering, tech sector luminaries are expanding their presence in Washington as they lobby for surveillance reforms. Read More


WHITE PAPER: Citrix Systems

The top 5 truths behind what the cloud is not
There's no doubt that cloud is a major paradigm shift for enterprise organizations from the way services are delivered, to the underlying solutions deployed to enable those services. This whitepaper clears the confusion around cloud to help you shape a successful strategy and implementation plan. Learn more

Mac users warned against using public Wi-Fi networks
Connecting to unsecured networks not advisable for Apple users until patch is released for vulnerability Read More

Free tools for Windows Server admins
Read More

Security researchers urge tech companies to explain their cryptographic choices
Fourteen prominent security and cryptography experts have signed an open letter to technology companies urging them to take steps to regain users' trust following reports over the past year that vendors collaborated with government agencies to undermine consumer security and facilitate mass surveillance. Read More

Huge turnout at RSA shows hackers are winning
In the battle between enterprises and malicious hackers, the bad guys are clearly winning, judging by the sheer number of people and exhibitors at the RSA security conference going on here this week. Read More


WHITE PAPER: Crittercism

Performance Management: The Mobile App Development Playbook
This comprehensive 16 page Forrester Research, Inc. report, authored by Jeffrey Hammond, Forrester VP and Principal Analyst, details a number of valuable, commonly collected metrics and describes the tools and frameworks that can help you collect them. Read now!

RSA security attack demo deep-fries Apple Mac components
How bad can cyberattacks get? How about burning the internal components of a machine, whether PC or Mac, to a crisp so there's no thought of it being recoverable? That's what security vendor CrowdStrike showed could be done to an Apple Mac OS X today at the RSA Conference. Read More

Are Apple iOS, OS X flaws really backdoors for spies?
Two recently-discovered flaws in Apple iOS and Mac OS X have security experts openly asking whether the software vulnerabilities represent backdoors inserted for purposes of cyber-espionage. There's no clear answer so far, but it just shows that anxiety about state-sponsored surveillance is running high. Read More

Blackphone plans more secure devices, bouyed by Snowden leaks
Blackphone, the Swiss start-up that's launching a smartphone with encrypted communications, is planning a series of devices around the same idea, one of the company's co-founders said on Monday. Read More

Check Point unveils security architecture for threat-intelligence sharing
Check Point Software Technologies today said it is extending its security architecture to be able to incorporate more threat-intelligence data that could be shared with other vendor partners, with the goal of providing more adaptive prevention. Read More


SLIDESHOWS

Free tools for Windows Server admins

There are endless software tools and utilities out there to help you in managing your network. Here are some of the best free ones.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. RSA security attack demo deep-fries Apple Mac components

2. Google Glass backlash escalates to violence

3. 10 cities that provide 1-Gig internet services

4. No hard feelings, Alan? Ford reportedly will dump Microsoft's Sync

5. 14 Tech Conventions You Should Attend in 2014

6. Ultimate cloud speed tests: Amazon vs. Google vs. Windows Azure

7. Are Apple iOS, OS X flaws really backdoors for spies?

8. 13 of today's coolest network research projects

9. Danger! Danger! iOS update may brick your iPhone 5S or iPad Air

10. Best new technology from Mobile World Congress 2014


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


Thursday, February 27, 2014

Ultimate cloud speed tests: Amazon vs. Google vs. Windows Azure

Network World After Dark - Newsletter - networkworld.com
  9 wireless battery chargers: No power? No problem! | FTC: Identity theft is the plague of the country

  Network World After Dark

Forward this to a Friend >>>


Ultimate cloud speed tests: Amazon vs. Google vs. Windows Azure
A diverse set of real-world Java benchmarks shows that Google is fastest, Azure is slowest, and Amazon is priciest Read More


WEBCAST: SAP

SAP IT Transformation Forum
On March 6, join us in an exclusive live event featuring Nolan Bushnell, a technology pioneer, entrepreneur, and scientist who's often cited as the father of the video game industry. This event will feature topics on laying the foundations for mobile, Big Data, and cloud applications that business teams require to stay competitive. Learn more

In this Issue


9 wireless battery chargers: No power? No problem!
    Tired of having to fumble for the USB port every time your mobile device runs out of power? With these wireless chargers, just put your device down and let it it power up. Read More

FTC: Identity theft is the plague of the country
The Federal Trade Commission today issued its annual look at what consumers in the United States are complaining about the most. Read More

INSIDER
Is Your IT Shop a Scrambler or a Leader?
An IT veteran describes the four stages of the technology organization -- and what it takes to move up a notch Read More

How Unemployed CIOs Can Survive the Dark Days
A long job hunt takes a personal and professional toll. CIOs have family and financial concerns while they reassess their careers and face a changing job market. But here's how CIOs can emerge stronger than ever. Read More

FBI expects to roll out malware-analysis system to help businesses identify attacks
    The director of the Federal Bureau of Investigation (FBI) said this week his agency plans to introduce a malware-analysis system later this year that will let businesses and the public, report newly identified malware attacks, upload malware samples and receive reports on them. Read More

Intel kills SSD overclocking, unleashes its fastest-ever consumer drive
Intel won't be releasing an SSD whose performance can be customized by overclocking after all. Instead, it announced plans today to overclock a new flagship drive and begin selling that in March. Read More

Video tutorial: What is Conficker?
Today's advanced malware threats are capable of changing behavior to block attempts to discover and remove them from systems. One of the most successful examples of malware deploying these techniques in recent years was Conficker. Conficker was an unusually successful piece of malware that first surfaced in November 2008. It exploited a vulnerability in Windows server operating systems and went on... Read More

iPads, smartphones on the front lines in Syria
War-torn country involved in high-tech conflict Read More

Life at an iPhone factory in China
Foxconn is transforming the area around its factory in Zhengzhou, China. Here's a visual tour of the scene. Read More
   

Cloud security concerns are overblown, experts say
Security concerns should not deter enterprises from using public cloud technologies when it makes business sense. Read More

UK man charged with hacking US Federal Reserve
A British man faces new charges in the U.S. for allegedly hacking into the U.S. Federal Reserve Bank's servers and stealing names, email addresses and other personal information of the bank's computer users. Read More

Boeing's new smartphone will self-destruct in 3…2…
Aerospace and defense company Boeing this week rolled out the Boeing Black – a heavily secured Android smartphone designed for use by the U.S. military and intelligence agencies, which – no kidding – will essentially self-destruct if tampered with. Read More

Intel vs. ARM: Two titans' tangled fate
Intel has barely made a dent in the mobile market, while ARM has been wildly successful. Does that spell doom for Intel -- or is ARM's triumph overblown? Read More

Danger! Danger! iOS update may brick your iPhone 5S or iPad Air
Read More

IBM's Rometty makes developers an offer: the Watson mobile app challenge
IBM CEO Ginni Rometty took to the Mobile World Congress stage Wednesday to announce a global competition to encourage developers to create mobile consumer and business apps powered by its Watson supercomputer platform. Read More

14 Tech Conventions You Should Attend in 2014
Taking the time each year to learn, grow and network should be part of your career plan, and tech conferences are a great way to do that. Here is a guide to the hottest tech events of 2014 (as well as a couple to look for in 2015). Read More

 

SLIDESHOWS

Free tools for Windows Server admins

There are endless software tools and utilities out there to help you in managing your network. Here are some of the best free ones.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. RSA security attack demo deep-fries Apple Mac components

2. Google Glass backlash escalates to violence

3. 10 cities that provide 1-Gig internet services

4. No hard feelings, Alan? Ford reportedly will dump Microsoft's Sync

5. 14 Tech Conventions You Should Attend in 2014

6. Ultimate cloud speed tests: Amazon vs. Google vs. Windows Azure

7. Are Apple iOS, OS X flaws really backdoors for spies?

8. 13 of today's coolest network research projects

9. Danger! Danger! iOS update may brick your iPhone 5S or iPad Air

10. Best new technology from Mobile World Congress 2014


 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


Battle of the fives: Samsung Galaxy S5 vs. Apple iPhone 5S vs. Google Nexus 5

  MWC 2014: Samsung targets fitness junkies with Galaxy Gear 2, Gear Fit | Why the iWatch won't measure glucose levels
 
 
  Network World Cool Tools

Forward this to a Friend >>>


Battle of the fives: Samsung Galaxy S5 vs. Apple iPhone 5S vs. Google Nexus 5
Samsung made the Galaxy S5 official on Monday at a Mobile World Congress presentation in Barcelona, touting a slimmed-down approach to the latest flagship's feature set and simplified design. Read More
 


WEBCAST: SAP

SAP IT Transformation Forum
On March 6, join us in an exclusive live event featuring Nolan Bushnell, a technology pioneer, entrepreneur, and scientist who's often cited as the father of the video game industry. This event will feature topics on laying the foundations for mobile, Big Data, and cloud applications that business teams require to stay competitive. Learn more

MWC 2014: Samsung targets fitness junkies with Galaxy Gear 2, Gear Fit
MWC 2014: Samsung targets fitness junkies with Galaxy Gear 2, Gear Fit The Gear Fit has a 1.84-inch, curved, 432 by 128 pixel display. Both the Gear 2 and Gear fit include heart rate monitors and S Health, an application suite f... From: Network World Videos Views: 139 3 ratings Time: 02:01 More in Science & Technology Read More
 

Why the iWatch won't measure glucose levels
It's widely believed that Apple sometime in 2014 or soon thereafter will introduce an iWatch, a wearable device capable of tracking all sorts of interesting biometric data. Read More
 

 

INSIDER
10 cities that provide 1-Gig internet services
Municipal broadband is becoming a contentious issue in the race to establish ubiquitous high-speed Internet throughout the United States. Read More

Are Apple iOS, OS X flaws really backdoors for spies?
Two recently-discovered flaws in Apple iOS and Mac OS X have security experts openly asking whether the software vulnerabilities represent backdoors inserted for purposes of cyber-espionage. There's no clear answer so far, but it just shows that anxiety about state-sponsored surveillance is running high. Read More
 

Samsung to let developers tap into Galaxy S5 fingerprint scanner
With its fingerprint scanner and heart-rate sensor, Samsung's Galaxy S5 has been a headline grabber since the almost phablet-sized smartphone launched at Mobile World Congress. Both the Galaxy S5 fingerprint scanner and even the "wallet" API may sound like Apple copycat moves, but there are significant differences. Read More
 

13 of today's coolest network research projects
Here's a whirlwind look at some of the wildest and potentially most useful technology research projects from university and vendor labs related to computer networking. Read More
 


MWC 2014: E-paper smartphone display designed to save battery life
Yota Devices will launch a new dual-screen smartphone later this year that has an e-paper display to save battery. Follow reporter Nick Barber on Twitter @nickjb Read More
 

MWC 2014: Dropped your phone in the toilet? Nanotechnology could save it
A microscopic coating from P2i coats the electronics inside smartphones to prevent the phones from short circuiting after getting wet. Read More
 

Vodafone Foundation puts a 2G cell in a backpack for disaster recovery
Did you ever have one of those days when cell coverage was so bad you wished you had a base station on your back? The Vodafone Foundation came out with just such a device this week, but not to keep irritable iPhone junkies happy. Read More
 

Why 2014 could be the year mobile payments explode on the iPhone
Richard Crone had been on the road a few days recently when his smartphone did something unexpected: It started sending him special-offer coupons for breakfast at Starbucks. Read More
 

Office for tablets: Microsoft's Godot
Apple launched the iPad four years ago, igniting a tablet frenzy that altered personal computing at home and at work, but Microsoft has yet to release an Office version for touchscreen devices. Read More
 

 

SLIDESHOWS

Free tools for Windows Server admins

There are endless software tools and utilities out there to help you in managing your network. Here are some of the best free ones.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. RSA security attack demo deep-fries Apple Mac components

2. Google Glass backlash escalates to violence

3. 10 cities that provide 1-Gig internet services

4. No hard feelings, Alan? Ford reportedly will dump Microsoft's Sync

5. 14 Tech Conventions You Should Attend in 2014

6. Ultimate cloud speed tests: Amazon vs. Google vs. Windows Azure

7. Are Apple iOS, OS X flaws really backdoors for spies?

8. 13 of today's coolest network research projects

9. Danger! Danger! iOS update may brick your iPhone 5S or iPad Air

10. Best new technology from Mobile World Congress 2014


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cool_tools_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **