---------- Forwarded message ----------
From: "Network World Daily News Alert" <
nww_newsletters@newsletters.networkworld.com>
Date: Dec 5, 2013 2:08 PM
Subject: Discovered! Elusive "HotSpot 2.0" Wi-Fi Connections
To: <
aquarianm@gmail.com>
Cc:
Network World Daily News PM | | There are currently several million smartphones certified to run on a "HotSpot 2.0" Wi-Fi network. In November, about 400 of them finally got a chance to do so -- in Beijing, China. | | Issue highlights 1. 18 essential Hadoop tools for crunching big data 2. IBM blames ISPs for 'offensive' Internet ... back in 1994 3. Microsoft customer privacy vs. NSA snooping 4. Anti-Bot Working Group to fight DDoS attacks from cloud infrastructure 5. HP (quietly) snubs Amazon's cloud in latest release 6. JPMorgan to notify 500,000 due to data breach, but will not offer replacement cards 7. Data centers drove Ethernet sales in Q3, says IDC 8. INSIDER Five ways IT can prepare for wearable devices at work 9. Sen. Markey wants to know: Can your car be hacked? 10. 8 bad habits you can blame on programming | RESOURCE COMPLIMENTS OF: EMC EMC Data Protection enables businesses to accelerate IT Transformation through a Protection Storage Architecture that brings together backup, DR and archiving to increase scalability while driving down complexity and cost. Avoid accidental architectures that will slow your business down. Learn more. | Making the most of this powerful MapReduce platform means mastering a vibrant ecosystem of quickly evolving code READ MORE | 1994: It was a simpler time, when IBM sold an operating system called OS/2 version 3.0 (a.k.a. OS/2 Warp) and corporate lawyers could plausibly imagine people venturing onto the Internet and being shocked - shocked! - to find "objectionable" content there. READ MORE | In the midst of the NSA snooping scandal, Microsoft is talking up a three-pronged approach to keep customer data safe from the prying eyes of governments. READ MORE | WHITE PAPER: CDW Find out what steps to take that can lead your organization down the smooth path to SAM deployment. This SAM primer can help you and your organization mitigate software non-compliance issues and optimize software license management while containing costs. Read Now | Distributed denial-of-service attacks against financial firms and other industries have been mounting, so today the Cloud Security Alliance (CSA) announced it is establishing the Anti-Bot Working Group to help fight this threat. READ MORE | HP this week released the 13.5 version of its cloud platform, which is the software that serves as the basis for the company's public cloud offering. Toward the bottom of a note about new features, HP mentions something quite interesting: HP's cloud no longer inherently supports Amazon Web Service's cloud Elastic Compute Cloud (EC2). It may not sound like a big deal, but it marks a strategic shift... READ MORE | JPMorgan Chase & Co. has said they plan to issue breach notifications to nearly 500,000 customers, or two percent of the bank's 25 million UCard users, after hackers breached their network in July. However, because there's no evidence that funds were stolen, the bank will not issue replacement cards. READ MORE | WEBCAST: IBM Intelligent Investigation Manager optimizes fraud investigation and analysis and it dynamically coordinates and reports on cases, provides analysis and visualization, and enables more efficient and effective investigations. Learn More. | The growing popularity of 10 Gigabit and 40 Gigabit Ethernet in data centers helped propel the entire Ethernet switch market during the third quarter, according to IDC. READ MORE | Just when IT execs are getting a handle on how to accommodate employees' personal smartphones and tablets in the workplace, the technology industry has thrown up a new challenge -- wearable computers. READ MORE | Sen. Edward Markey (D-MA) this week asked automakers what they're doing to protect vehicles from wireless hacking threats and privacy intrusions. READ MORE | Counting from zero instead of one is just one of the many real-life bad habits you can get from being a developer; here are the most common ones READ MORE | WHITE PAPER: IBM In this paper, we highlight the common reasons why midsize companies often do not realize significant ROI with their ERP system implementations and suggest solutions for getting the most value from their applications. Learn More. | | | | | | | | |
No comments:
Post a Comment