High-tech

High-tech
Light

Tuesday, December 10, 2013

10 Linux distros to watch in 2014

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Dec 10, 2013 7:18 AM
Subject: 10 Linux distros to watch in 2014
To: <aquarianm@gmail.com>
Cc:

Data-stealing malware pretends to be Microsoft IIS server module

DARPA targets $4.8M to close backdoor security problems

Network World Daily News AM
December 10, 2013
Share this email

10 Linux distros to watch in 2014

What to expect in the world of Linux in the upcoming year.

READ MORE
 

Issue highlights

1. Data-stealing malware pretends to be Microsoft IIS server module

2. DARPA targets $4.8M to close backdoor security problems

3. HP hits restart on 'converged systems,' takes aim at vBlock

4. Google, Microsoft, others join in calling on NSA limits

5. Home appliance makers connect with open source 'Internet of things' project

6. What Is Wi-Fi's Role in the Internet of Things?

7. Not even Microsoft could kill the ZeroAccess botnet

8. Best tools for mobile device management

9. Stun-gun-equipped iPhone case looks to generate more than a buzz

10. Rambus, Micron settle patent, antitrust disputes

11. Cops asked wireless carriers for over 1.1 million customer cellphone records in 2012

RESOURCE COMPLIMENTS OF: LinkTek

Hidden Problem with Migrations to SharePoint

Did you know that migrating to SharePoint will cause links that point to the migrated files to become broken? This is an often unknown and hidden problem that can result in costly disruptions for you and your users. LinkFixer Advanced automatically fixes the broken links! Click now to download your FREE trial version!

Data-stealing malware pretends to be Microsoft IIS server module

Trustwave's SpiderLabs researchers have found a piece of malware that collects data entered into Web-based forms, pretending to be a module for Microsoft's Internet Information Services (IIS) web-hosting software. READ MORE

DARPA targets $4.8M to close backdoor security problems

The Defense Advanced Research Projects Agency has written a check for $4.8 million to Raytheon BBN Technologies and GrammaTech to build software that blocks backdoor security holes in commodity network devices. READ MORE

HP hits restart on 'converged systems,' takes aim at vBlock

Stop me if you've heard this one before: Hewlett-Packard released new "converged systems" on Monday that aim to get customers up and running quickly with virtualized applications and big-data analytics. READ MORE

WEBCAST: SAP

Business Transformation Through Technology Innovation

Cloud computing, rampant mobility, Big Data, and social business have created challenges never seen before. There is a need for a new application platform. In this webcast, find out about the forces shaping the 'third platform', and why the move to the third platform is the only way to meet customer needs. Learn more

Google, Microsoft, others join in calling on NSA limits

Eight of the largest U.S. Internet companies are formally urging the White House and Congress to rein in surveillance by the National Security Agency, a move at least one privacy advocate says will add pressure on Congress to further restrict NSA activity. READ MORE

Home appliance makers connect with open source 'Internet of things' project

Home appliances, cars and computers could soon be talking to one another thanks to an open source framework that has the backing of consumer electronics manufacturers in a new industry alliance. READ MORE

What Is Wi-Fi's Role in the Internet of Things?

The market for Wi-Fi may be on the verge of truly astounding growth - as in, the billions of radios required for the Internet of Things (IoT). Think Wi-Fi is just for client access and the occasional point-to-point or point-to-multipoint link? Think again. READ MORE

WHITE PAPER: IBM

Microsoft Dynamics AX solutions from IBM

IBM provides consulting, implementation and application management services for Microsoft Dynamics AX, a comprehensive ERP solution for midsize and larger organizations that empowers people to work effectively, manage change, and compete globally. Learn More.

Not even Microsoft could kill the ZeroAccess botnet

Late last week, Microsoft announced it had taken down much, but not all, of a major botnet that has been operating since 2011 throughout much of Europe. READ MORE

Best tools for mobile device management

Choosing between AirWatch, Apperian, BES 10, Divide, Fixmo and Good Technology depends on your priorities READ MORE

Stun-gun-equipped iPhone case looks to generate more than a buzz

At a glance, the Yellow Jacket looks like any other iPhone case, albeit a little bulkier – another of the numberless hollow exoskeletons for the most recognizable smartphone on the market. Flipping a small cover at the top of the Yellow Jacket down, however, reveals the sharp prongs of a 650,000-Volt stun gun – making the case protective in more ways than one. READ MORE

Rambus, Micron settle patent, antitrust disputes

Rambus and Micron Technology said Monday the companies had signed a broad patent cross-license agreement, giving Micron the right to use any Rambus patent for the manufacture of specified integrated circuit products, including memories. READ MORE

Cops asked wireless carriers for over 1.1 million customer cellphone records in 2012

Wireless carriers told Senator Edward Markey that they received 1.1 million requests for cell phone data information from law enforcement agencies in 2012. The number may appear to be less than the 1.3 million total requests for 2011, but don't get excited; giving you a comparable answer is not possible, since Sprint - the third largest carrier in the U.S. - chose to give a sneaky answer instead of... READ MORE

WHITE PAPER: HP and Intel® Xeon® processors

Bridging the IT Gap

To overcome today's IT management gap, your organization needs a fresh approach to infrastructure management. There are three key requirements for this new approach to IT management. In this paper, you'll find that three key requirements create the foundation for a management environment that is poised to meet the challenges of a new era in IT. Learn More

SLIDESHOWS

8 tricks to optimize Windows 8.1

Here are eight things we recommend doing to make Windows 8.1 more efficient.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 8 Ethernet predictions for 2014

2. The 21 most powerful enterprise networking companies

3. Microsoft ends Windows 7 retail sales

4. DARPA makes finding software vulnerabilities fun

5. Ubuntu 13.10: The good, the bad and the ugly

6. Cisco sees SDN, Internet of Things in its 2014 crystal ball

7. IT guy gets smacked for stealing $94,493 worth of electronic goodies

8. From Windows from Vista to 8.1, Microsoft Year-end Patch Tuesday hits 'em all

9. Google Compute Engine vs. Amazon Web Services cloud: The battle is on

10. Veeam: Backup, but for virtual machines

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment