High-tech

High-tech
Light

Thursday, August 1, 2013

Android tablet gives rare glimpse at North Korean tech

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Aug 1, 2013 3:43 PM
Subject: Android tablet gives rare glimpse at North Korean tech
To: <aquarianm@gmail.com>
Cc:

High-tech heroes and zeros: 2013's best and worst (so far)

Riverbed gives network managers more 'crack'

Network World Daily News PM
August 01, 2013
Share this email

Android tablet gives rare glimpse at North Korean tech

An Android tablet brought back from North Korea by a tourist has provided a glimpse at some of the restrictions placed on IT users in the famously secretive country.

READ MORE
 

Issue highlights

1. High-tech heroes and zeros: 2013's best and worst (so far)

2. Riverbed gives network managers more 'crack'

3. Black Hat: It's not 'tricky' for hackers to turn your phone into a SpyPhone

4. Never look for your lost phone in a trash compactor

5. Is Amazon really a low-margin cloud business?

6. NSA chief to Black Hat on surveillance: Don't believe press reports

7. Snarky Black Hat tweets demean NSA Chief's keynote

8. Gartner: SaaS contract language regarding security is lacking

9. INSIDER How to roll your own VPN

10. What's coming next in the tech immigration battle

11. 7 of the best tools for building killer mobile apps

High-tech heroes and zeros: 2013's best and worst (so far)

Which tech newsmakers have made the biggest splash so far this year, and which have gone splat? Cringe has a few ideas READ MORE

Riverbed gives network managers more 'crack'

Earlier this week, WAN optimization leader Riverbed announced an upgrade to RiOS, the operating system that powers its Steelhead appliances. This particular release, version 8.5, had some particularly unique features that I felt expanded the use of WAN Optimization appliances. READ MORE

Black Hat: It's not 'tricky' for hackers to turn your phone into a SpyPhone

At Black Hat USA, a security researcher explained how to inject malicious code into any app so it can secretly take photos, record conversations, and track locations. READ MORE

WHITE PAPER: F5 Networks

Post-TMG: Securing Internet Facing Microsoft Apps

Organizations currently using or considering Microsoft Forefront Threat Management Gateway (TMG) may face the dilemma of how, and what, administrators will use to secure Internet-facing Microsoft applications such as Exchange, SharePoint, and Lync with the departure of TMG. Read this paper to learn more about alternative solutions to Microsoft TMG. Read now>>

Never look for your lost phone in a trash compactor

From a gruesome story in the Chicago Tribune A 56-year-old Palatine man was crushed to death by a trash compactor as he searched for his missing cell phone, authorities said. READ MORE

Is Amazon really a low-margin cloud business?

A startup competitor to Amazon Web Service's cloud computing platform is accusing the company of engaging in a "fake price war" and inflating the prices of its services. READ MORE

NSA chief to Black Hat on surveillance: Don't believe press reports

The head of the NSA sought the help of security pros at Black Hat to advise on an intelligence-gathering system that collects the same data as recently publicized domestic spying programs but without the same perceived civil-liberties shortcomings. READ MORE

WHITE PAPER: Salesforce.com

Meet Customers Where They Are eBook

Choose the customer service technologies that are ideal for your company in order to enable customer service through online and offline touch points, establish smart listening, engage your community, and consistently respond to customer issues. Read now

Snarky Black Hat tweets demean NSA Chief's keynote

While the hecklers were making noise in-person, many turned to Twitter to criticize the NSA Chief's ironic "Defending Freedom & Civil Liberties" keynote at the Black Hat conference. READ MORE

Gartner: SaaS contract language regarding security is lacking

The large majority of people working in IT procurement are "significantly dissatisfied" with the way SaaS (software as a service) vendors define contract language related to security, a feeling likely to persist through 2015, according to a Gartner report. READ MORE

INSIDER

How to roll your own VPN

With free open source OpenVPN and a low-cost VPS, you can have a secure connection from any location READ MORE

What's coming next in the tech immigration battle

Congress will begin its summer break this week without any plan for high-skill immigration. Here's what to watch for when lawmakers return in September. READ MORE

7 of the best tools for building killer mobile apps

READ MORE

WHITE PAPER: Akamai Technologies, Inc.

Taking a New Approach to Web Security

As organizations continue to embrace the benefits of the Cloud, concerns around performance and security continue to rise. Download this Akamai whitepaper to understand the steps you can take to establish a secure and compliant environment without compromising your users' online experience. Learn More

SLIDESHOWS

10 reasons for IT job-hunters to be optimistic

IT employment numbers are rising, employers are forging ahead with hiring plans, and CIOs are confident about business operations and budget stability.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Android tablet gives rare glimpse at North Korean tech

2. You learn something new about Google every day

3. Head-spinning history of propeller beanie

4. iPad 5 rumor rollup for the week ending July 30

5. General Alexander heckled during Black Hat keynote address

6. How CCP handled the biggest multiplayer battle in gaming history

7. Starbucks dumps AT&T for Google in Wi-Fi swap

8. 10 apps to save you from yourself behind the wheel

9. 10 competitors Cisco couldn't kill off

10. EFF coalition calls for crowdsourcing effort to fight patent trolls

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment