High-tech

High-tech
Light

Sunday, February 16, 2014

Are We Too Stupid to Let Watson Make Us Smarter?

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Feb 16, 2014 7:01 AM
Subject: Are We Too Stupid to Let Watson Make Us Smarter?
To: <aquarianm@gmail.com>
Cc:

Eye-popping Presidents’ Day weekend tech bargains

Hackers circulate thousands of FTP credentials, New York Times among those hit

Network World Daily News AM
February 16, 2014
Share this email

Are We Too Stupid to Let Watson Make Us Smarter?

IBM's supercomputer is ready to make the leap from analyzing massive data sets to actually helping us make the right decision. But will we be too proud to take Watson's advice?

READ MORE
 

Issue highlights

1. Eye-popping Presidents’ Day weekend tech bargains

2. Hackers circulate thousands of FTP credentials, New York Times among those hit

3. WifiForward group shows growing competition between carriers and cable operators

4. INSIDER The processes and tools behind a true APT campaign: Command & Control

5. VMware jumps into mobile, but lacks network control

6. A Microsoft version of Android would be a nightmare for everybody

7. Dozens of rogue self-signed SSL certificates used to impersonate high-profile sites

8. Spec standoff: LG G Pro 2 vs Samsung Galaxy Note 3

9. Tech 'firsts' that made a President's day

WHITE PAPER: IBM

Introducing Social Business for the Mid-Market

This report provides directional guidance for mid-market companies to appropriately use Social Business to achieve their goals. Learn More.

Eye-popping Presidents’ Day weekend tech bargains

Presidents’ Day is no Black Friday when it comes to tech bargains, at least in the volume of deals, but some good buys can be had. Here’s a sampling of price drops we came across: READ MORE

Hackers circulate thousands of FTP credentials, New York Times among those hit

Hackers are circulating credentials for thousands of FTP sites and appear to have compromised file transfer servers at The New York Times and other organizations, according to a security expert. READ MORE

WifiForward group shows growing competition between carriers and cable operators

Cable operators Comcast, Time Warner Cable and Charter Communications have joined forces and formed WifiForward, an organization that will work to protect existing unlicensed frequencies and get lawmakers to free up more spectrum. READ MORE

WHITE PAPER: Dell Software

What to Look for When Evaluating Next-Generation Firewalls

These liabilities create security vulnerabilities and force enterprises into expensive workarounds like deploying separate gateway antivirus products and intrusion prevention systems (IPS).Next-Generation Firewalls remedy these problems. Learn More

INSIDER

The processes and tools behind a true APT campaign: Command & Control

In part four of a series on understanding the processes and tools behind an APT-based incident, CSO examines the Command & Control phase, often referred to as C2. During this phase, the attacker(s) are on the network, and depending on their objectives, will start focusing on their endgame. READ MORE

VMware jumps into mobile, but lacks network control

Last month, VMware made a big splash in the Enterprise Mobile Management (EMM) market by plunking down over $1.5 billion for AirWatch. EMM, formerly known as mobile device management (MDM), has been one of the hottest market segments in tech, primarily due to the seemingly unstoppable force know as BYOD. This acquisition comes a little over a year after Citrix purchased Zenprise to complement its mobile... READ MORE

A Microsoft version of Android would be a nightmare for everybody

There’s talk about Microsoft embracing Android, either as a mobile OS topped by Windows features and services or by providing support for Android applications within Windows. READ MORE

WEBCAST: SAP

SAP IT Transformation Forum

On March 6, join us in an exclusive live event featuring Nolan Bushnell, a technology pioneer, entrepreneur, and scientist who’s often cited as the father of the video game industry. This event will feature topics on laying the foundations for mobile, Big Data, and cloud applications that business teams require to stay competitive. Learn more

Dozens of rogue self-signed SSL certificates used to impersonate high-profile sites

Dozens of self-signed SSL certificates created to impersonate banking, e-commerce and social networking websites have been found on the Web. The certificates don't pose a big threat to browser users, but could be used to launch man-in-the-middle attacks against users of many mobile apps, according to researchers from Internet services firm Netcraft who found the certificates. READ MORE

Spec standoff: LG G Pro 2 vs Samsung Galaxy Note 3

LG Electronics has launched the G Pro 2, another option for people who want smartphones with supersized screens. To succeed, the device will have to outcompete products like the Galaxy Note 3 from Samsung, and there isn't much to tell the two apart when comparing hardware specs. READ MORE

Tech 'firsts' that made a President's day

From the first presidential steamboat ride to the introduction of electricity in the White House to Obama's famous BlackBerry, our nation's commanders in chief have always enjoyed the privilege of being exposed to technology's cutting edge -- even if they haven't always embraced the opportunities. So in honor of Monday's celebration of Presidents' Day, here's a look at some of the more notable – and controversial -- presidential first encounters with the leading technologies of their days. READ MORE

WEBCAST: IBM

Reduce the Costs of Fraud

Intelligent Investigation Manager optimizes fraud investigation and analysis and it dynamically coordinates and reports on cases, provides analysis and visualization, and enables more efficient and effective investigations. Learn More.

SLIDESHOWS

Steve Ballmer's retirement plans

The retired Microsoft CEO is now ready to ride off into the sunset. But what will he do?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 16 weirdest places you'll find Linux

2. Federal smartphone kill-switch legislation proposed

3. IE10 under attack as hackers exploit zero-day bug

4. 11 best places to take a techie on a date

5. Windows XP isn't the only software getting the knife in 8 weeks

6. Cisco profit halved as revenue falls

7. Apple's hiring spree of biosensor experts continues

8. How Apple’s iBeacon location sensing tech works

9. SDN in action: Pertino service lets users turn up a network without buying a switch, router or server

10. How Nokia could help Microsoft with its Android smartphone

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment