| 10 things to know about the smartphone kill switch Apple already has one, Microsoft and Google say they'll build one, Minnesota will demand it from next year and it could soon be the law in California and maybe nationwide. The smartphone kill switch appears to be on its way to every handset sold in the U.S. so what's all the fuss about? Here's a look at the main points of the technology.What is it?For more than a year, law enforcement officials across the U.S. have been pressuring the telecom industry to do more to combat smartphone theft and the kill switch has been proposed as the answer. It's a piece of software installed in every new phone that can disable a stolen handset.To read this article in full or to leave a comment, please click here Read More WEBCAST: Instart Logic
Web Application Streaming: A Radically Faster Web Experience Web publishers are in a jam. Users demand dynamic and personalized applicationswith high-quality images. But they also expect the apps to load and run quickly on their mobile devices. What's the answer? Learn more WHITE PAPER: Limelight Networks
Step-by Step Guide to Optimizing the Digital Experience This practical guide to superior online performance takes a closer look at the complex concept of online performance: what it is, how to measure it, andmost criticallywhat it takes to make it better. Learn More Gartner to IT security pros: Get ready for 'digital business' National Harbor, Md. -- There's a "digital business" revolution coming and IT security professionals need to grasp the significance early on to be prepared to address whatever security needs arise. That was the message from Gartner analyst Jorge Lopez in the closing keynote at the Gartner Security and Risk Management Summit today. Digital business isn't simply represented by what will be a growth in the so-called "Internet of Things." IoT connectivity will be part of cars, trash cans, road sensors, medical devices, clothing, toys, parking meters, LED lighting and much more. Beyond this, the digital business revolution means what will happen with the information that can be gleaned from IoT and shared for business purposes.To read this article in full or to leave a comment, please click here Read More Oracle fortifies integration suite for mobile work If it weren't enough of a challenge for IT architects and system managers to glue enterprise systems together, they must also now worry about connecting their systems to mobile and Web applications as well.With this in mind, Oracle has updated its Oracle SOA Suite 12c system integration software it can also handle data from mobile and Web applications, by recognizing some of the most popular data formats and communication protocols used by these external applications."You can now expose any existing application through a mobile interface without rewriting the application," said Amit Zavery, Oracle's group vice president for its Fusion Middleware line of software.To read this article in full or to leave a comment, please click here Read More Google Cardboard: recycle or reuse? (Video) You haven't had this much fun with a piece of cardboard in a long time. IDG News Service goes hands on with Google's quirky I/O gift. Read More 8 Internet things that are not IoT Cisco's big market numbers may not include smartphones, tablets and PCs. Read More No more excuses, time to roll out IPv6, says registry boss As the dwindling number of IPv4 addresses starts to cause problems for organizations around the world, time has come to roll out IPv6 on a larger scale and leave behind dead-end technologies that delay the inevitable, according to the chief of the regional Internet registry in Asia-Pacific.The newer version of the IP (Internet Protocol) adds an almost inexhaustible number of addresses thanks to a 128-bit long address field, compared to the 32 bits used by version 4. Since every connected device on the Internet needs an IP address, there is increasing pressure to move to IPv6 as more non-computer devices come online in the so-called Internet of things.To read this article in full or to leave a comment, please click here Read More Carnegie Mellon system lets you get to the good parts of video, fast While Video has become ubiquitous thanks mostly to smartphones it doesn't mean you want to actually watch all of it. Carnegie Mellon University computer scientists say they have invented a video highlighting technique called LiveLight that can automatically pick out action in videos shot by smartphones, GoPro cameras or Google Glass users. +More on Network World: NASA's coolest 'way-out' future projects+ LiveLight constantly evaluates action in a video, looking for visual novelty and ignoring repetitive or eventless sequences, to create a summary that enables a viewer to get the gist of what happened. What it produces is a miniature video trailer. Although not yet comparable to a professionally edited video, it can help people quickly review a long video of an event, a security camera feed, or video from a police cruiser's windshield camera, according to Carnegie researchers.To read this article in full or to leave a comment, please click here Read More Hackers found controlling malware and botnets from the cloud Along with all that cloud traffic coming into your business may be some malware Read More Supreme Court goes 1 for 2 on big tech decisions Wednesday was a big day for technology cases in the Supreme Court. The Justices ruled on a pair of important cases that promise to have wide-ranging implications for the development and use of modern technology for years and decades to come. But the effects of the decisions aren't necessarily what either side in the cases has been arguing.One decision rightly affirmed that cellphones cannot be searched by police without a warrant. The other rejected Aerio's claim that its unique technological model circumvented copyright restrictions, without addressing the larger cloud storage issues everyone is worrying about. Let's look at the cellphone case first.To read this article in full or to leave a comment, please click here Read More 17 obscure Windows tools and tricks too powerful to overlook Windows is chock full of handy-dandy power tools, but most of them are hidden from everyday view. These are the ones you need to know about. Read More | |
| SLIDESHOWS 5 potential Facebook killers Outside of the obvious suspects LinkedIn, Twitter and Google+ who has the potential to unseat Facebook? Here are five possibilities. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn MOST-READ STORIES 1. 17 obscure Windows tools and tricks too powerful to overlook 2. First Look: Google's I/O announcements 3. Google trumps Microsoft's 1TB of storage with unlimited space 4. 100Mb/sec Ethernet coming to a car near you? 5. Early user of VMware NSX net virtualization tool 6. Gartner: Best practices for Amazon AWS security 7. Hungry ants knock out FiOS service
again 8. New iOS jailbreak could become sinister 9. Why One CIO Is Saying 'No' to BYOD 10. HP doubles enterprise switch capacity; calls revamped 5400R a Cisco Catalyst 4500 'killer' |
| Do You Tweet? Follow everything from NetworkWorld.com on Twitter @NetworkWorld. You are currently subscribed to networkworld_after_dark_alert as networking.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** | |
No comments:
Post a Comment