Monday, March 02, 2015

10 products you could only find at RadioShack

Net neutrality rules passed, but we don't know how it works yet | Apple's most obvious product placement in movies and TV

Network World Voices of Networking

10 products you could only find at RadioShack
At least at one point, RadioShack was the only place you could find these tech products. Read More

: LogMeIn

eBook: 67 Tips for Building Live Chat Success
Expert tips to help agents and administrators alike provide superior service via live chat. Filled with practical tips, tweets and actionable items, these best practices will help businesses take chat to the next level. Read More.

In this Issue


Infographic: Mobile is Transforming Customer Engagement
This infographic provides a glimpse of the global research we gathered in our Effective Mobile Engagement report and highlights the current state of mobile engagement and how mobile habits are changing for both shopping and support interactions. Learn More

Net neutrality rules passed, but we don't know how it works yet
FCC sharply divided on party lines. Chairman Wheeler broke the tie. Read More

Apple's most obvious product placement in movies and TV
From 1990s action movies like Mission Impossible to TV shows like House of Cards and Modern Family, Apple products occasionally find their way into the central plot. Read More

Review: Google's Nexus 9 is an awesome tablet, with some caveats
I used Google's Nexus 9 tablet as my primary device and found that it was one of the best in its size range. But there are a few other things you should know about it. Read More

Lenovo's Superfish nightmare may be the tip of the iceberg
The Superfish problem didn't happen in a vacuum. And it's not limited to just certain Lenovo notebooks sold between October 2014 and January 2015. This is because the chain of fools goes back to a root source at Komodia, now a poster child for what amounts to zero-days for the rest of us. Their ploy is pretty simple: 1.) Insert and spoof root certificates, 2.) Profit! And Superfish isn't the only problem, as ArsTechnica reported, via Marc Rogers of CloudFlare. You can find the total miserable story by following Marc's link to the CERT Vulnerability notice. Drink your coffee before clicking, please, because your day just got a lot worse.To read this article in full or to leave a comment, please click here Read More

Apple, Linux, not Windows, most vulnerable operating systems in 2014; IE wins worst app
A whopping average of 19 security vulnerabilities were reported every day in 2014. The number of vulnerabilities discovered each year in operating systems, applications and hardware has skyrocketed in a nasty trend, according to analysis by GFI Software.Operating systems with most security vulnerabilities in 2014The top spot for vulnerabilities in operating systems no longer goes to Microsoft Windows; in fact Windows isn’t even listed in the top three. Instead, the most vulnerable OS was Apple Mac OS X, followed by Apple iOS and then Linux kernel. As you can see in the list below, Mac OS X had 147 vulnerabilities, with 64 being rated as high severity bugs. There were 127 in iOS, 32 of those rated as high. Linux kernel had a rough year, with 119 security vulnerabilities and 24 being rated as high severity. The flip-side is that none of the security holes in Windows versions were rated as low severity.To read this article in full or to leave a comment, please click here Read More


5 Ways to Wow the Connected Customer
The future success and sustenance of your organization will depend on your ability to understand your customers' needs, develop a strategy that effectively meets them, and be nimble in your response to a constantly changing customer landscape. Learn More

IDG Contributor Network: What Wi-Fi looks like
Hackaday member CNLohr has created some stunning images of a Wi-Fi network using a remarkably simple technique. He documented his experiments on his Hackaday project page.He achieved the results by capturing wireless signal strength using a Wi-Fi chipset hooked up to a single multi-color LED. The LED rapidly changes color depending on signal strength. He then captures long-exposure photographs of the LED, as his buddy, holding the piece of kit, moves around a space. The result is a multi-colored graphic with variations representing signal strength.Pinging the chipsetTo read this article in full or to leave a comment, please click here Read More

Apple Watch may be more water resistant than we thought
One of the longstanding questions surrounding the Apple Watch is how water resistant the device is going to be.As a quick aside, "waterproof" denotes a product that can be completely submerged under water for extended periods of time and still function as intended. So while a device filled to the brim with complex electronics, like the Apple Watch, isn't likely to be waterproof, having a degree of water resistance is extremely important.To that end, Apple CEO Tim Cook was recently in Germany where he reportedly spoke to some Apple employees and remarked that he wears his Apple Watch all the time, "even in the shower." The report comes courtesy of iGen.Fr which relayed the news earlier this week.To read this article in full or to leave a comment, please click here Read More

NSA Chief sides with FBI in encryption battle but says backdoor sounds 'shady'
Yesterday at the cybersecurity conference “New America : Big Ideas and New Voices,” Admiral Mike Rogers, the head of the NSA and U.S. Cyber Command, explained that when he attends such cybersecurity conferences he is saying, “Look, there are no restrictions on questions. You can ask me anything.” And bright minds in the audience took him up on that. Yet Reuters reported that other than claiming “we fully comply with the law,” Rogers refused to comment on Kaspersky Lab’s report about the U.S. government using implants on hard drives for surveillance.To read this article in full or to leave a comment, please click here Read More

The downside to mass data storage in the cloud
The cloud can be an enormously cost-effective way to increase storage and computing musculature, and also, sadly, a way to further add misery to those seeking privacy—or who just want to be left alone. It's rare to see organizations stand up and shout, "we'll not give your data to anyone!" or "the life of all stored data, except opt-in assets you want us to store, is always 90 days!" or "yes, we can determine in absolute certainty that your data has been erased to protect you and your identity."The cloud, in some warrens, has become a storage ground for the various factories of "big data," whose ideals are generally to sell things to consumers and businesses. Correlating facts is huge. Ask Target, whose insight into discovering pregnancies helped them capture a nicely profitable market in the pregnancy and new mother world. Smart, you say. There is a downside to this.To read this article in full or to leave a comment, please click here Read More

More companies are going 'Back to the Future' with .com domain names
One of my favorite movies from my teen years was the 1985 film, "Back to the Future." If you haven't seen it, it's about a teenager named Marty McFly who is accidentally sent back in time and skews the space-time continuum, which threatens his very existence. To get "back to the future," McFly must go through a series of difficult tasks to restore things to normal – where he needs to be to survive.I see an interesting analogy today with companies experiencing a similar "Back to the Future" moment when trying something different on the internet and then deciding to switch to what is known and trusted.Last year, I wrote this post and started keeping tabs on the ever-growing list of companies that tried an alternative generic top-level domain (gTLD), skewing their internet "space-time continuum" in the process before eventually switching back to a .com domain to get things back to normal. One might have argued that these companies were simply the exception and not the norm, but this trend isn't showing any signs of slowing down. Since my last post on this topic in December, a number of additional companies had their own Marty McFly moment and made the switch to .com after having tried an alternative domain. Here are some examples:To read this article in full or to leave a comment, please click here Read More


Infographic: The Future of the Internet of Things
The Internet of Things is rapidly transitioning from "What" and "Why" to "When" and "How." Xively has created an infographic on the future of the IoT that combines industry research with our own customer experience to create a visual representation of where the market is today. How will the IoT transform your business? Learn More

IDG Contributor Network: New, faster wireless network to be built
As recently as a week ago, in a February 17th, 2015, Financial Times newspaper article, investor analysts were speculating as to just what U.S. satellite TV company Dish was going to do with its massive hoard of unused, cached mobile-suitable spectrum that it's been accumulating over the years.Well, we might have just learned the answer. Artemis Networks, a wireless startup, has reached a deal to lease some of that spectrum, for a while, in San Francisco. It wants to use it to experiment with its unusual pCell technology.To read this article in full or to leave a comment, please click here Read More

Microsoft says use Skype as it kills support for Facebook, Google chat in Outlook
Microsoft started sending out emails to announce that in the "next couple of weeks" it will discontinue support for Facebook and Google chat in launched the ability to chat "with friends stuck on Gmail" back in May 2013. In the email announcement, Microsoft blamed Google – and included a link – to Google's "decision" to drop Extensible Messaging and Presence Protocol (XMPP) support. XMPP was originally named Jabber.To read this article in full or to leave a comment, please click here Read More

Antivirus software is falling behind the bad guys
Antivirus software likes to make a point of popping up a small window in the system tray to show you when they have updated their detection definitions. So your software is up to date and ready to catch all the latest malware, right?In a test described in its State of Infections Report Q4 2014, Damballa analyzed tens of thousands of sample files that enterprise organizations sent in for review. The files that its Failsafe scanning system detected as malicious were also scanned by the four most commonly deployed antivirus products, although Damballa declined to name names.To read this article in full or to leave a comment, please click here Read More

Microsoft brings machine learning to Azure
At the Strata + Hadoop World conference in San Jose last week, Microsoft announced new and enhanced Microsoft data services for Azure. This includes a preview of Azure HDInsight running on Linux, the general availability of Storm on HDInsight, the general availability of Azure Machine Learning, and the availability of Informatica technology on Azure."We're embracing open technologies, so people can use the tools, languages and platforms of their choice to pull the maximum value from their data. Simply put, we want to bring big data to the mainstream," wrote T.K. "Ranga" Rengarajan, corporate vice president for Microsoft's Data Platform, and Joseph Sirosh, corporate vice president for Machine Learning, in the blog post announcing the services.To read this article in full or to leave a comment, please click here Read More

Review: Nvidia's Android-powered Shield tablet is actually great for gaming
Over the past few years, I have become increasingly reliant on Android-powered tablets for a large majority of my daily activities: general browsing, social media and email, and even for the majority of my entertainment (music and movie watching).But gaming…gaming is the one area in which Android has just never really embedded itself in my home. Sure, I play some Android games here and there, but I still own dedicated, non-Android powered consoles. Part of the reason is the lack of big, Triple-A quality games available for Android; there are some, but not as many as competing gaming platforms. The other part is the lack of great gaming hardware.To read this article in full or to leave a comment, please click here Read More

Avaya takes a unique approach to ease the pain of SDN migrations
In the movie, Star Trek V: The Final Frontier, Spock's older brother, Sybok, had telepathic abilities and he could feel people's pain by touching them. In the movie he would say, "share your pain with me and gain strength from sharing." Sybok was a deeply religious Vulcan and, in the movie, sought out to find "Sha Ka Ree," the Vulcan equivalent of Eden, where everything began. Nirvana, if you will.In the networking industry, software defined networks (SDN) are supposed to bring the networking equivalent of Sha Ka Ree. However, I don't need to be a Vulcan telepath to understand customers' pain when it comes to SDNs. Almost every network professional I talk to today has an interest in SDN. However, the majority of businesses feel that deploying a software defined network is too complicated.To read this article in full or to leave a comment, please click here Read More

IDG Contributor Network: Smartphones charge in a minute with bio-battery
Better batteries? In the words of one Reddit user: "OMG, not this again."But wait, there's more, as the expression goes. There's a reason that new battery technology piques our interest whenever we hear about it. Batteries are the last insurmountable hindrance to the seductive idea of total nomadism and blissful un-tethered freedom.Murphy's LawBatteries are one technology that haven't really seen a Moore's law-esque periodic doubling of capacity. Moore's law says that the number of transistors in an integrated circuit doubles about every two years.To read this article in full or to leave a comment, please click here Read More


Top 10 DNS attacks likely to infiltrate your network

DNS-based attacks are on the rise because many organizations don't realize DNS is a threat vector and therefore don't protect it.


As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.


1. How Google avoids downtime

2. Report: HP to buy Aruba for wireless tech

3. CIA: A world without Google Maps or satellites?

4. 15 of the best Google Chrome experiments ever

5. Hackers exploit router flaws in unusual pharming attack

6. Microsoft SharePoint coming up short for most enterprises, study finds

7. FCC passes net neutrality rules, reclassifies broadband as utility

8. Review: Google's Nexus 9 is an awesome tablet, with some caveats

9. 10 Reasons why the Raspberry Pi 2 Model B is a killer product

10. CuBox-i4Pro: A whole lotta Linux or Android for not a whole lotta cash

Do You Tweet?
Follow everything from on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact:

To contact Network World, please send an e-mail to

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to **

No comments: