Monday, July 28, 2014

10 amazing (and bizarre) drone discoveries

Network World After Dark - Newsletter - networkworld.com
  Defending Facebook, OkCupid says it also runs user-behavior tests | Stanford researchers show off blueprint for self-healing lithium battery

 
  Network World After Dark

Forward this to a Friend >>>


10 amazing (and bizarre) drone discoveries
From search-and-rescue missions to accidental discoveries of fossils and crimes, drones have been behind some fascinating discoveries. Read More
 


WHITE PAPER: HP

Protecting Your Mid-Size Business from Security Threats
Security breaches in large enterprises make the headlines, but 55% of small and mid-size businesses have also experienced a data breach. And 60% of small businesses fail within six months of falling victim to a cyber attack. Learn More

WHITE PAPER: CommVault

2014 Magic Quadrant for Enterprise Backup Software
Enterprise backup is among the oldest, most-performed tasks for IT professionals. Gartner provides analysis and evaluation of the leading providers that offer a range of traditional to innovative recovery capabilities. Learn More

Defending Facebook, OkCupid says it also runs user-behavior tests
Facebook earlier this summer sparked criticism over a study in which it manipulated the feeds of some of its users, but the dating site OkCupid says what Facebook did is normal, and that in fact it has run its own user-behavior tests.In 2012, Facebook altered the amount of positive and negative content in users' feeds, to see the impact of the posts on their mood. The feeds of less than 700,000 users out of Facebook's 1.32 billion total were altered. The ethics of the study were called into question, with one U.S. senator calling on the U.S. Federal Trade Commission to investigate whether the study violated Facebook's policies and FTC laws around "unfair or deceptive acts or practices."To read this article in full or to leave a comment, please click here Read More
 

Stanford researchers show off blueprint for self-healing lithium battery
A paper published today by Stanford University researchers outlines a way to make lithium batteries a lot safer, opening the door to a host of new applications in everything from smartphones to electric cars.The paper, which ran in the journal Nature Nanotechnology, details the use of a carbon nanotube layer to isolate a lithium battery's anode, protecting it from the rigors of heavy use.Lithium-ion batteries are one of the most efficient ways to pack a lot of power into a small space, and they're consequently in heavy use – one of them is probably powering your smartphone as you read this. The Tesla Model S also uses a lithium ion cell for power. But lithium-ion batteries use several other materials as anodes, even though a lithium anode would be substantially more efficient.To read this article in full or to leave a comment, please click here Read More
 

Hortonworks, Pivotal team to better manage Hadoop
In the hot market for big-data products and services, sometimes even competitors must work together for the common good.Prominent Hadoop software and service companies Hortonworks and Pivotal have partnered to further develop software called Ambari, which would make it easier for enterprises to manage Hadoop distributions."At the end of the day, customers want to deploy Hadoop cleanly into their environment," said Shaun Connolly, Hortonworks vice president of corporate strategy. "Getting vendors like Hortonworks and Pivotal to work together is important for the market to continue to mature."To read this article in full or to leave a comment, please click here Read More
 

BYOA: Bring Your Own Authentication
Most people who uses IT or Internet application would agree that the current user name/password mode of authentication is cumbersome, ineffective, and obsolete.  According to ESG research, 55% of information security professionals working at enterprise organizations (i.e. more than 1,000 employees) believe that user/name password authentication should be completely eliminated or relegated to non-business critical applications only (note:  I am an ESG employee).Recognizing the foibles of user names and passwords, ESG research indicates that 57% of enterprise organizations use multi-factor authentication technologies.  Unfortunately, multi-factor authentication technology has been too expensive and complex to roll-out across enterprises or offer to on-line consumers.To read this article in full or to leave a comment, please click here Read More
 

New products of the week 07.28.2014
  Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow. Product name: ActiveBatch Extension For System Center Configuration ManagerTo read this article in full or to leave a comment, please click here Read More
 

The desktop-a-week review: Awesome
  I started out my "run a new Desktop Environment every week" adventure roughly one month ago with Enlightenment (which is really quite excellent).Then I transitioned to the Awesome Window Manager. One week passed. Then two weeks. It's now taken me three full weeks to wrap my head around Awesome. And, truth be told, I'm still not sure what I think of using Awesome as my day-to-day environment.For those unfamiliar, Awesome is – at least at first glance – a simple, tiling window manager, similar in many ways to dwm (which it is a fork of). The name "Awesome" was inspired, I kid you not, by Neil Patrick Harris...specifically the character he played on How I Met Your Mother.To read this article in full or to leave a comment, please click here Read More
 

FTC urges mobile carriers to help send cramming charges packing
Looking to throttle the multi-million dollar industry known as mobile cramming, the Federal Trade Commission today issued a report outlining five key steps carriers and legitimate third party providers should do to stop the fraud. FTC The FTC report focused on "carrier billing," the placement of charges for goods and services of third-party merchants on a mobile phone bill. "Mobile Cramming: An FTC Staff Report" includes recommendations aimed at mobile carriers, merchants who offer goods and services charged directly to mobile phone bills, and billing intermediaries known as aggregators who facilitate the placement of such charges on mobile phone bills.To read this article in full or to leave a comment, please click here Read More
 

Windows 9 in November? Don't believe it
With Windows 8 being pretty much abandoned, interest is now shifting to Windows 9 and any rumors about it will be sucked up as quickly as an iPhone 6 rumor. The latest, though, is just a little hard to swallow.International Business Times recently ran a story based on the Russian leaker Wzor's postings that Windows 9 will not ship in Q2 of next year, as promised, but in the fall of this year, around October. But I'm not buying it because lately, Wzor has been blowing it big time.Wzor made the prediction in January of this year in a tweet, where the group said "hey men ~ Win 9 released in April 2015? No! No! No! ..WIN RTM-0 RELEASED SIGN-OFF DEALINE IN 21 OCTOBER 2014 :)"To read this article in full or to leave a comment, please click here Read More
 

The only way legalizing cellphone unlocking will make a real difference
  As President Obama prepares to sign a bill to once again legalize unlocking cellphones, there's only one way it will make any real difference. Read More
 

No surprise in the numbers: Tablets are 'wants,' smartphones are 'needs'
Last week, IDC reported a 1.5% quarter-over-quarter drop in tablet shipments and predicted slower tablet annual growth in 2014. This came on the heels of Apple CEO Tim Cook's acknowledgement that "iPad sales met our expectations but we realized they didn't meet many of yours [Wall Street analysts]"earlier that week. IDC Research Director Jean Philippe Bouchard said "the market is still being impacted by the rise of large-screen smartphones and longer than anticipated ownership cycles."The tablet's Achilles heel defines it – it is a content consumption device. Keyboard input is burdensome. Typing more than an email is tedious, and crunching a large spreadsheet impossible. Voice recognition today can't compete with a keyboard. Compounding its Achilles heel is a progressively cross-platform world in which the content delivered to tablets isn't exclusive.To read this article in full or to leave a comment, please click here Read More
 

 

SLIDESHOWS

Worst data breaches of 2014…So far

We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. 16 weirdest places you'll find Linux

2. 16 terrible computer pranks that could get you fired

3. Superclass: 14 of the world's best living programmers

4. 17 obscure Windows tools and tricks too powerful to overlook

5. 20 cool things you can do with a Raspberry Pi

6. 10 disturbing attacks at Black Hat USA 2014

7. 10 Linux distros to watch in 2014

8. Whatever happened to the IPv4 address crisis?

9. 20 top Android and iOS productivity apps for 2014

10. Top 10 security tools in Kali Linux 1.0.6


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: