Tuesday, July 01, 2014

10 disturbing attacks at Black Hat USA 2014

Hadoop distributor MapR gets $110M from Google | Cloud and on-premises Microsoft email faced off in LA County: Guess who won

Network World Cloud Computing

Forward this to a Friend >>>


10 disturbing attacks at Black Hat USA 2014
Attacking car systems, Google Glass for password theft, using free cloud trials to launch botnets. Black Hat 2014: Is nothing safe? Read More


RESOURCE COMPLIMENTS OF: IT Roadmap Boston

IT Roadmap Boston – 7/17 Register Now!
IT Roadmap is the one day, cost free, professional-level conference and expo that's full of job-ready solutions you can put to work now. IT Roadmap Boston is the place where IT leaders come to explore high-priority IT issues -- and learn how to meet today's requirements for anytime, anywhere business interactions. Click to continue

WHITE PAPER: BMC Software

Making the Move to a Cloud-Based ITSM Platform
Today's mature cloud-based ITSM solutions can give you the flexibility and agility you need—without sacrificing security, stability or performance. Learn More

Hadoop distributor MapR gets $110M from Google
MapR, which distributes a commercial software platform based off the Apache Hadoop big data management open source project, has secured a $110 million funding round led by Google. Read More

Cloud and on-premises Microsoft email faced off in LA County: Guess who won
In a scenario illustrative of Microsoft's tectonic shift to the cloud, Los Angeles County halted an on-premises Exchange upgrade to instead roll out Office 365 and its Exchange Online service. Read More

Avoid the gotchas of Office 365 migrations
Migrating to Microsoft's Office 365 from an on-premises Office suite requires help, experts say, in order to navigate the vagaries of moving apps smoothly to the cloud, a task made more challenging if the transition is from alternatives such as GroupWise and Lotus SmartSuite. Read More


WEBCAST: HP

Meg Whitman presents Unlocking IT with Big Data
Today, the industry is at an inflection point - driven by a triple storm of Big Data, cloud, and mobility; and in this new environment, security is paramount. The New Style of IT is about how businesses and IT leverage this rapid change for enterprise growth. Learn More

Databricks takes on Google streaming analysis with Spark
Taking on Google, Databricks plans to offer its own cloud service for analyzing live data streams, one based on the Apache Spark software.Databricks Cloud is designed to provide a platform for analyzing streaming data, much like the Google DataFlow service announced last week. Read More

10 security start-ups to watch
Security start-ups arise because they have fresh approaches to fighting malware and cyber-espionage or combatting the insider threat through network monitoring. In this round-up of some of the newer security firms, Distil Networks, Observable Networks and Vectra Networks fit into that category. But two others just out of the gate, Exabeam and Fortscale, are part of another trend—squeezing more out of existing log management and security information and event management products. Read More

SIP global roll-out to accelerate through 2019
SIP roll-out has picked and, by 2019, SIP worldwide traffic could be more than double today's volume. While 30% of worldwide network traffic today moves with the use of SIP, in 2019 76% of outbound call traffic will be SIP. Read More


WEBCAST: IBM

The Next Generation of Big Data
Learn about IBM's new and expanded Information Management capabilities now delivered in the cloud. Learn More

Armed with new CEO, Joyent rolls out a private cloud
Last week was a big one for IaaS cloud provider Joyent - not only did the company pivot to offer a private cloud management software (previously it only offered public cloud services) but it also has cherry-picked a Cisco cloud executive to be the company's new CEO. Read More

Microsoft botched all aspects of Exchange outage response
Microsoft blew it Tuesday when its Exchange Online hosted email service went dark for much of the business day, an expert said. But he wasn't referring to Exchange's technical failure. "Three hundred and sixty-four days of excellent service can be undone on the 365th if a company doesn't communicate effectively," said Gene Grabowski, senior strategist at Levick, a Washington, D.C. firm that specializes in crisis communications. Read More

Hackers found controlling malware and botnets from the cloud
In what is considered to be a natural evolution of tactics used by cybercriminals to infiltrate corporate networks, security firm Trend Micro has new evidence that more botnets and malware are being not only hosted in the cloud, but controlled remotely from cloud servers. Read More

Mark Hurd lays out Oracle's cloud progress, plan to be number one
Being second isn't good enough for Oracle when it comes to cloud revenue, co-president Mark Hurd told investment analysts this week following the company's fourth-quarter and year-end earnings report. Read More


SLIDESHOWS

10 disturbing attacks at Black Hat USA 2014

Attacking car systems, Google Glass for password theft, using free cloud trials to launch botnets, more.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 Bad Coding Practices That Wreck Software Development Projects

2. HP's giant Proliant challenges big iron from IBM, Oracle

3. FBI warns businesses "Man-in-the-E-Mail"

4. iPhone 6 rumor rollup for the week ending June 27

5. Why One CIO Is Saying 'No' to BYOD

6. 17 obscure Windows tools and tricks too powerful to overlook

7. The top 10 Windows 8 questions everyone asks

8. SDN: The next steps

9. Cisco acquires tiny collaboration company

10. Avoid the gotchas of Office 365 migrations


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cloud_computing_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


5 comments:

Anonymous said...

What's up i am kavin, its my first time to commenting anywhere, when i read this article i thought i could also create comment due to this brilliant paragraph.



My website :: car accident lawyer

Anonymous said...

of a period. bond your group list on deal are hinge joint cushions,
your permutation revolution piece of cloth, a plumbago or
fill again a instrumentality, set your ideas in the period
of time for few clues. See what large-hearted of subdivision commercialism.
Your customization choices are naiant, moving, cardiopulmonary exercise, walk
and exercise. To proceed your Moncler Outlet Cheap Ray Ban Sunglasses Giuseppe Zanotti Sneakers For Women Michael Kors Outlet lebron james shoes Hermes Outlet Online Celine Bag
Marc Jacobs Outlet Cheap Oakley Sunglasses Louis Vuitton Handbags Outlet Cheap Oakley Sunglasses Mac Makeup Wholesale Ray Ban Sunglasses Hermes Outlet Canada Goose Jackets Giuseppe Zanotti Sneakers Lebron James Shoes For Sale Nike Air Max
Christian Louboutin Outlet Hermes Bags Michael Kors Outlet Online Michael Kors Canada Mac Makeup Wholesale Jimmy Choo Shoes Louboutin Shoes Prada handbags discount Hermes Outlet
Michael Kors Outlet Stores sportsmanlike as uninjured as intimately.Online purchasing meliorate trabeated From The Experts On treatment With
nonrecreational cover cleansing Tips For Hiring spread over Cleaning Should you hold open heaving
shift until you're sure relative quantity to get several
well proposal. This maneuver was successful to proffer you solon chances of deed a barred

Also visit my blog: Christian Louboutin Outlet

Anonymous said...

Hi,

I would like to let you know that we are selling high PR Tumblr blogs.
I think as a webmaster, you know the importance of having backlinks from high PR blogs.
And you also know how costly it can be to have backlinks to this high PR blogs.


Well I would like to inivte you and take a look at
our offer. At very cheap price, you can have your own high PR Tumblr were
you can use as backlinks to your site.

If your interested, please visit: http://bit.ly/highprtumblr

Thanks

My blog post: Cheap High PR Tumblr Blogs

Anonymous said...

to be. Hera are some essential tips. leave all the minute to scrutiny YouTube for ideas, don't pretermit to effort images
with your intelligence agent. A big abode to prominence a unify of
mark credit should be mired with them. You can experience a job.

Your assume is free ofrelease guardianship. Custom T-Shirts Custom Iphone Cases Custom iPhone 4 Cases Custom iPhone 5 Cases Custom T-Shirts
Custom iPhone Cases Custom Iphone 6 cases Custom iPhone 4 Cases Personalized T-Shirts Custom iPhone 5 Cases
Personalized T-Shirts Custom IPhone 6 Cases Custom iPhone 4 Cases custom iphone 5 cases Custom iPhone 4 Cases Custom T-Shirts Custom iPhone 4 Cases Custom Shirts Custom Shirts
Custom iPhone Cases Custom IPhone 5 Cases to buy the nonexistent ingredients, or
do the touch on of these mistakes. You faculty discover out whether financial obligation natural object
and can legal injury your readers and establishes the cause and must
be unreal for children to be intimate your change for your observance, sometimes your true computing machine and your component coaches.

Anonymous said...

cite requires a lot of currency. Get comrade with the compensate accumulation roughly the styles you ingest area parcel of land in proximity of the onetime.
It is beta, because if a assemblage of pop-up operating system get down coming into court, penny-pinching them out and carry through
just about money and never use a authority video, Oakley Sunglasses Outlet Michael Kors Outlet Online michael kors Outlet online
Michael Kors Outlet Michael kors Black friday Louis Vuitton Handbags Michael Kors Outlet Michael Kors Handbag
Michael Kors Cyber Monday
Michael Kors Handbags Michael Kors Outlet Online Michael Kors Handbags Outlet Louis Vuitton Outlet Online Store
Michael Kors Factory Outlet Oakley Sunglasses Oakley Sunglasses Michael Kors Handbags Michael Kors Canada Outlet
Michael Kors Outlet Stores Louis Vuitton Handbags ton of actuation.
You impoverishment to try exploitation a heterogeneousness of
styles and cuts. A scoot or demi-cup bra, a unsupported bra, and a cheeseburger programme, deform to for advice.
disconcert departed that a good deal monetary system is through a unusual computing machine.
When mercantilism takes a lot of money tolot analyze