---------- Forwarded message ----------
From: "Network World Daily News Alert" <
nww_newsletters@newsletters.networkworld.com>
Date: May 13, 2013 7:19 AM
Subject: Smartphones driving violent crime across US
To: <
aquarianm@gmail.com>
Cc:
Network World Daily News AM | | On Feb. 27th in the middle of the afternoon, a 16-year-old girl was walking through San Francisco's Mission district when she was ordered at gun point to hand over her cellphone. The robbery was one of 10 serious crimes in the city that day, and they all involved cellphones. Three were stolen at gun point, three at knife point and four through brute force. | | Issue highlights 1. Cell phone theft: Tips on how to avoid becoming a victim 2. Understanding Software Defined Networking 3. Why Microsoft won't charge for Windows 'Blue' & this time 4. Yahoo acquires Loki Studios as part of acquisition spree 5. Networks in 2020: More traffic, less energy 6. US government is 'biggest buyer' of zero-day vulnerabilities, claims report 7. Microsoft sends gamblin' Pete Rose to the plate in swing at Google Docs 8. Academic institutions urged to take steps to prevent DNS amplification attacks 9. A look at flexible displays through the years 10. Boston dumps Microsoft Exchange for Google Apps | WHITE PAPER: SiSense Ltd. The size, speed and scalability of different business analytics technologies vary greatly. The advantages and disadvantages of RDBMS, In-Memory and In-Chip technologies are detailed in this report. Read Now! | San Francisco Police Officer Dennis Toomer provides advice on how you can avoid becoming a victim of cell phone theft READ MORE | If you aren't intimately familiar with Software Defined Networking, don't fret. Only 10% of 450 IT practitioners at a recent Network World event raised their hands when asked if they understand SDN. But if the emerging technology lives up to its promise to redefine networking as we know it, there is no time like the present to dig in and learn more. READ MORE | Sometime soon, Microsoft will tell Windows 8 users whether they will have to pay for the upgrade code-named "Blue," and if so, how much. Analysts don't expect it to charge anything for the update. READ MORE | WHITE PAPER: APC by Schneider Electric This paper describes this class of threats, suggests approaches to deploying monitoring devices, and provides best practices in leveraging the collected data to reduce downtime. Learn More. | Yahoo has acquired a mobile gaming company, Loki Studios, taking its total acquisitions this month to four. READ MORE | Networks could use far less energy by 2020 even though they'll be carrying much more traffic, an industry group says. READ MORE | When it comes to exploiting zero-days for cyberweapons and cyber-spying, China's not the only "devil" . . . READ MORE | WHITE PAPER: HP, Microsoft & Intel Many transaction processing systems have reached their capacity limits, so the time is right to consider the potential for running tier 1 mission-critical workloads on opens standards. This white paper highlights the key components of a properly structured and highly optmized SQL Server OLTP reference architecture. Read Now! | Microsoft today took another shot at rival Google, calling its rival's online application suite, Google Docs, "too big a gamble." READ MORE | Colleges and universities are being encouraged to scrutinize their systems to keep them from being hijacked in DDoS (distributed denial-of-service) attacks. READ MORE | READ MORE | Faced with the choice of saving serious money or buying a load of FUD, the City of Boston has become the latest enterprise customer to dump Microsoft Exchange in favor of Google Apps. And the city's 20,000 employees won't be the last to make this move until Microsoft either closes the cost chasm or comes up with a scarier story. READ MORE | WHITE PAPER: Tripwire Many professionals in information security espouse the belief—and commitment to—"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Learn More | | | | | | | | |
No comments:
Post a Comment