Thursday, August 07, 2014

Smartphone kill-switch bill passes California assembly

  Oracle issues a virtual strongbox for enterprise encryption keys | Netscout sues Gartner over Magic Quadrant rating

  Network World After Dark

Forward this to a Friend >>>

Smartphone kill-switch bill passes California assembly
The bill is intended to reduce smartphone theft in the state Read More


Top Mobile Management Questions Answered
How can IT provide seamless and secure mobile communications and collaboration for all? Take a look at this on-demand Webcast where IDG asks an expert panel pressing questions surrounding mobile security and management. Prepare to have with your mobility questions answered! Learn more

Beyond the Enterprise App Store
Leverage proactive, secure and automated IT Service delivery to move beyond the traditional App Store and empower your users. Read the white paper to learn how Learn more

Oracle issues a virtual strongbox for enterprise encryption keys
Oracle Key Vault provides a central repository for storing enterprise encryption keys Read More

Netscout sues Gartner over Magic Quadrant rating
A lawsuit filed Tuesday in Connecticut Superior Court accuses tech analyst firm Gartner Research of demanding kickbacks in exchange for favorable placement in the company's famous Magic Quadrant report. NetScout, a Massachusetts-based manufacturer of network performance management products, says in court documents that companies that pay for Gartner's consulting services are ranked above those that do not, and that this is the reason for NetScout's inclusion in the "challengers" category of the most recent NPM Magic Quadrant, instead of among the "leaders." + ALSO ON NETWORK WORLD: Sprint moves on CEO, T-Mobile bid signal transition | 2014's Starting Salaries for College Tech Majors +To read this article in full or to leave a comment, please click here Read More

Carriers' remote control software continues to put some mobile devices at risk
  Security researchers have identified serious vulnerabilities in carrier-mandated remote management software installed on mobile devices Read More

Windows 9: Goodbye, Charms bar, hello virtual desktops?
The Windows 9 reports keep filing in and boy oh boy does this upcoming release sound the like modern OS Windows fans have been waiting for. Read More

Black Hat keynote: U.S. should buy up zero day attacks for 10 times going rate
Las Vegas -- The U.S. government should pay 10 times the going rate for zero-day software flaws in order to corner the market and then make those vulnerabilities public to render them less potent for attackers, Black hat 2014 attendees were told yesterday. Dan Geer That would reduce the overall threats against Internet traffic in general and cost less than the damage that actual exploits cause, says Dan Geer, who is the chief information security officer at In-Q-Tel, the venture capital arm of the Central Intelligence Agency.To read this article in full or to leave a comment, please click here Read More

What it means that smartphones are the fastest-growing IT sector
All hail the new King of IT: IDC's latest Black Book predicts worldwide IT spending growth will come mostly from smartphones. Read More

This battery may power your home one day
This battery may power your home one day Startup Primus Power is using flow battery technology to store electricity from wind and solar energy. From: Network World Views: 23 1 ratings Time: 03:26 More in Science & Technology Read More

Electric car breaks world record
A group of students from an Australian university broke a 26-year old world speed record with an electric vehicle. Read More

10 ways to get noticed at Black Hat
  Some of the more eccentric members of the security industry show up for Black Hat each year, making it tough to stand out in the enormous crowd that flocks to Las Vegas for the A-list conference. But each year vendors manage to come up with gimmicks and gizmos that attract the throngs to their booths to hear a spiel or give up their contact information so they can receive sales calls when they get home. Here are some noteworthy examples from Black Hat 2014.To read this article in full or to leave a comment, please click here Read More



Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.


As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn


1. Rackspace bows out of IaaS market

2. Why TCP/IP is on the way out

3. 2014's Starting Salaries for College Tech Majors

4. Wikipedia link censorship shows Bonnie & Clyde might have had 'right to be forgotten'

5. Microsoft's inconsistent Windows Phone 8.1 strategy stumbles forward

6. Top 20 colleges for computer science majors, based on earning potential

7. 10 disturbing attacks at Black Hat USA 2014

8. IE plays security catch-up, will block outdated Java plug-ins

9. Network-attached storage devices more vulnerable than routers, researcher finds

10. How to Survive 4 Cloud Horror Stories


Do You Tweet?
Follow everything from on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact:

To contact Network World, please send an e-mail to

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to **


No comments: