High-tech

High-tech
Light

Monday, May 13, 2013

Smartphones driving violent crime across US

---------- Forwarded message ----------
From: "Network World Daily News Alert" <nww_newsletters@newsletters.networkworld.com>
Date: May 13, 2013 7:19 AM
Subject: Smartphones driving violent crime across US
To: <aquarianm@gmail.com>
Cc:

Cell phone theft: Tips on how to avoid becoming a victim

Understanding Software Defined Networking

Network World Daily News AM
May 13, 2013
Share this email

Smartphones driving violent crime across US

On Feb. 27th in the middle of the afternoon, a 16-year-old girl was walking through San Francisco's Mission district when she was ordered at gun point to hand over her cellphone. The robbery was one of 10 serious crimes in the city that day, and they all involved cellphones. Three were stolen at gun point, three at knife point and four through brute force.

READ MORE
 

Issue highlights

1. Cell phone theft: Tips on how to avoid becoming a victim

2. Understanding Software Defined Networking

3. Why Microsoft won't charge for Windows 'Blue' & this time

4. Yahoo acquires Loki Studios as part of acquisition spree

5. Networks in 2020: More traffic, less energy

6. US government is 'biggest buyer' of zero-day vulnerabilities, claims report

7. Microsoft sends gamblin' Pete Rose to the plate in swing at Google Docs

8. Academic institutions urged to take steps to prevent DNS amplification attacks

9. A look at flexible displays through the years

10. Boston dumps Microsoft Exchange for Google Apps

WHITE PAPER: SiSense Ltd.

Choosing the Right Tech for Your Business Analytics Project

The size, speed and scalability of different business analytics technologies vary greatly. The advantages and disadvantages of RDBMS, In-Memory and In-Chip technologies are detailed in this report. Read Now!

Cell phone theft: Tips on how to avoid becoming a victim

San Francisco Police Officer Dennis Toomer provides advice on how you can avoid becoming a victim of cell phone theft READ MORE

Understanding Software Defined Networking

If you aren't intimately familiar with Software Defined Networking, don't fret. Only 10% of 450 IT practitioners at a recent Network World event raised their hands when asked if they understand SDN. But if the emerging technology lives up to its promise to redefine networking as we know it, there is no time like the present to dig in and learn more. READ MORE

Why Microsoft won't charge for Windows 'Blue' & this time

Sometime soon, Microsoft will tell Windows 8 users whether they will have to pay for the upgrade code-named "Blue," and if so, how much. Analysts don't expect it to charge anything for the update. READ MORE

WHITE PAPER: APC by Schneider Electric

Monitoring Physical Threats in the Data Center

This paper describes this class of threats, suggests approaches to deploying monitoring devices, and provides best practices in leveraging the collected data to reduce downtime. Learn More.

Yahoo acquires Loki Studios as part of acquisition spree

Yahoo has acquired a mobile gaming company, Loki Studios, taking its total acquisitions this month to four. READ MORE

Networks in 2020: More traffic, less energy

Networks could use far less energy by 2020 even though they'll be carrying much more traffic, an industry group says. READ MORE

US government is 'biggest buyer' of zero-day vulnerabilities, claims report

When it comes to exploiting zero-days for cyberweapons and cyber-spying, China's not the only "devil" . . . READ MORE

WHITE PAPER: HP, Microsoft & Intel

Easing the Online Overload

Many transaction processing systems have reached their capacity limits, so the time is right to consider the potential for running tier 1 mission-critical workloads on opens standards. This white paper highlights the key components of a properly structured and highly optmized SQL Server OLTP reference architecture. Read Now!

Microsoft sends gamblin' Pete Rose to the plate in swing at Google Docs

Microsoft today took another shot at rival Google, calling its rival's online application suite, Google Docs, "too big a gamble." READ MORE

Academic institutions urged to take steps to prevent DNS amplification attacks

Colleges and universities are being encouraged to scrutinize their systems to keep them from being hijacked in DDoS (distributed denial-of-service) attacks. READ MORE

A look at flexible displays through the years

READ MORE

Boston dumps Microsoft Exchange for Google Apps

Faced with the choice of saving serious money or buying a load of FUD, the City of Boston has become the latest enterprise customer to dump Microsoft Exchange in favor of Google Apps. And the city's 20,000 employees won't be the last to make this move until Microsoft either closes the cost chasm or comes up with a scarier story. READ MORE

WHITE PAPER: Tripwire

10 Steps to Risk-based Security Management

Many professionals in information security espouse the belief—and commitment to—"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Learn More

SLIDESHOWS

Hottest products from Interop 2013

Interop 2013, one of the biggest networking shows each year, is here and the product announcements are plentiful.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 more of the world's coolest data centers

2. Nothing funny about how The Onion got hacked

3. Ubuntu desktop is just easy

10. Ubuntu Touch for smartphones could be ready by end of May

9. NSA's secret manual on Google searching and more comes to light

6. Last place you want to see a Windows error message: Las Vegas hotel elevator, 20th floor

5. iPad 5 rumor rollup for the week ending May 8

4. Hottest products from Interop 2013

7. 10 great technologies to secretly install on Mom's PC

8. Microsoft Patch Tuesday targets multitude of Internet Explorer faults

 

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment