High-tech

High-tech
Light

Friday, December 6, 2013

Discovered! Elusive "HotSpot 2.0" Wi-Fi Connections

---------- Forwarded message ----------
From: "Network World Daily News Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Dec 5, 2013 2:08 PM
Subject: Discovered! Elusive "HotSpot 2.0" Wi-Fi Connections
To: <aquarianm@gmail.com>
Cc:

18 essential Hadoop tools for crunching big data

IBM blames ISPs for 'offensive' Internet ... back in 1994

Network World Daily News PM
December 05, 2013
Share this email

Discovered! Elusive "HotSpot 2.0" Wi-Fi Connections

There are currently several million smartphones certified to run on a "HotSpot 2.0" Wi-Fi network. In November, about 400 of them finally got a chance to do so -- in Beijing, China.

READ MORE
 

Issue highlights

1. 18 essential Hadoop tools for crunching big data

2. IBM blames ISPs for 'offensive' Internet ... back in 1994

3. Microsoft customer privacy vs. NSA snooping

4. Anti-Bot Working Group to fight DDoS attacks from cloud infrastructure

5. HP (quietly) snubs Amazon's cloud in latest release

6. JPMorgan to notify 500,000 due to data breach, but will not offer replacement cards

7. Data centers drove Ethernet sales in Q3, says IDC

8. INSIDER Five ways IT can prepare for wearable devices at work

9. Sen. Markey wants to know: Can your car be hacked?

10. 8 bad habits you can blame on programming

RESOURCE COMPLIMENTS OF: EMC

Improve Business Agility and Trust through Data Protection

EMC Data Protection enables businesses to accelerate IT Transformation through a Protection Storage Architecture that brings together backup, DR and archiving to increase scalability while driving down complexity and cost. Avoid accidental architectures that will slow your business down. Learn more.

18 essential Hadoop tools for crunching big data

Making the most of this powerful MapReduce platform means mastering a vibrant ecosystem of quickly evolving code READ MORE

IBM blames ISPs for 'offensive' Internet ... back in 1994

1994: It was a simpler time, when IBM sold an operating system called OS/2 version 3.0 (a.k.a. OS/2 Warp) and corporate lawyers could plausibly imagine people venturing onto the Internet and being shocked - shocked! - to find "objectionable" content there. READ MORE

Microsoft customer privacy vs. NSA snooping

In the midst of the NSA snooping scandal, Microsoft is talking up a three-pronged approach to keep customer data safe from the prying eyes of governments. READ MORE

WHITE PAPER: CDW

Software Asset Management: Getting Started

Find out what steps to take that can lead your organization down the smooth path to SAM deployment. This SAM primer can help you and your organization mitigate software non-compliance issues and optimize software license management while containing costs. Read Now

Anti-Bot Working Group to fight DDoS attacks from cloud infrastructure

Distributed denial-of-service attacks against financial firms and other industries have been mounting, so today the Cloud Security Alliance (CSA) announced it is establishing the Anti-Bot Working Group to help fight this threat. READ MORE

HP (quietly) snubs Amazon's cloud in latest release

HP this week released the 13.5 version of its cloud platform, which is the software that serves as the basis for the company's public cloud offering. Toward the bottom of a note about new features, HP mentions something quite interesting: HP's cloud no longer inherently supports Amazon Web Service's cloud Elastic Compute Cloud (EC2). It may not sound like a big deal, but it marks a strategic shift... READ MORE

JPMorgan to notify 500,000 due to data breach, but will not offer replacement cards

JPMorgan Chase & Co. has said they plan to issue breach notifications to nearly 500,000 customers, or two percent of the bank's 25 million UCard users, after hackers breached their network in July. However, because there's no evidence that funds were stolen, the bank will not issue replacement cards. READ MORE

WEBCAST: IBM

IBM Intelligent Investigation Manager: Online Product Demo

Intelligent Investigation Manager optimizes fraud investigation and analysis and it dynamically coordinates and reports on cases, provides analysis and visualization, and enables more efficient and effective investigations. Learn More.

Data centers drove Ethernet sales in Q3, says IDC

The growing popularity of 10 Gigabit and 40 Gigabit Ethernet in data centers helped propel the entire Ethernet switch market during the third quarter, according to IDC. READ MORE

INSIDER

Five ways IT can prepare for wearable devices at work

Just when IT execs are getting a handle on how to accommodate employees' personal smartphones and tablets in the workplace, the technology industry has thrown up a new challenge -- wearable computers. READ MORE

Sen. Markey wants to know: Can your car be hacked?

Sen. Edward Markey (D-MA) this week asked automakers what they're doing to protect vehicles from wireless hacking threats and privacy intrusions. READ MORE

8 bad habits you can blame on programming

Counting from zero instead of one is just one of the many real-life bad habits you can get from being a developer; here are the most common ones READ MORE

WHITE PAPER: IBM

Maximizing Enterprise Resource Planning ROI

In this paper, we highlight the common reasons why midsize companies often do not realize significant ROI with their ERP system implementations and suggest solutions for getting the most value from their applications. Learn More.

SLIDESHOWS

Don't click on these links

Whether you receive a phishing email inviting you to click on a specific link or whether you stumble upon it while Web surfing, here are 10 types of links you should never click on.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. The 21 most powerful enterprise networking companies

2. Windows 8 Update: China prefers to stick with dying Windows XP rather than upgrade

3. Quick look: Inside Amazon's vast distribution business

4. 10 ex-Cisco employees making an impact in the industry

5. Cisco sees SDN, Internet of Things in its 2014 crystal ball

6. First look: Google Compute Engine vs. Amazon Web Services

7. IT pros share blame for 'shadow IT' problem, survey shows

8. 18 Hot IT Certifications for 2014

9. Why Are So Many IT Projects Failing?

10. Obama is not allowed to use an iPhone due to security risks

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment