---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <
nww_newsletters@newsletters.networkworld.com>
Date: Feb 16, 2014 7:01 AM
Subject: Are We Too Stupid to Let Watson Make Us Smarter?
To: <
aquarianm@gmail.com>
Cc:
Network World Daily News AM | | IBM's supercomputer is ready to make the leap from analyzing massive data sets to actually helping us make the right decision. But will we be too proud to take Watson's advice? | | Issue highlights 1. Eye-popping Presidents’ Day weekend tech bargains 2. Hackers circulate thousands of FTP credentials, New York Times among those hit 3. WifiForward group shows growing competition between carriers and cable operators 4. INSIDER The processes and tools behind a true APT campaign: Command & Control 5. VMware jumps into mobile, but lacks network control 6. A Microsoft version of Android would be a nightmare for everybody 7. Dozens of rogue self-signed SSL certificates used to impersonate high-profile sites 8. Spec standoff: LG G Pro 2 vs Samsung Galaxy Note 3 9. Tech 'firsts' that made a President's day | WHITE PAPER: IBM This report provides directional guidance for mid-market companies to appropriately use Social Business to achieve their goals. Learn More. | Presidents’ Day is no Black Friday when it comes to tech bargains, at least in the volume of deals, but some good buys can be had. Here’s a sampling of price drops we came across: READ MORE | Hackers are circulating credentials for thousands of FTP sites and appear to have compromised file transfer servers at The New York Times and other organizations, according to a security expert. READ MORE | Cable operators Comcast, Time Warner Cable and Charter Communications have joined forces and formed WifiForward, an organization that will work to protect existing unlicensed frequencies and get lawmakers to free up more spectrum. READ MORE | WHITE PAPER: Dell Software These liabilities create security vulnerabilities and force enterprises into expensive workarounds like deploying separate gateway antivirus products and intrusion prevention systems (IPS).Next-Generation Firewalls remedy these problems. Learn More | In part four of a series on understanding the processes and tools behind an APT-based incident, CSO examines the Command & Control phase, often referred to as C2. During this phase, the attacker(s) are on the network, and depending on their objectives, will start focusing on their endgame. READ MORE | Last month, VMware made a big splash in the Enterprise Mobile Management (EMM) market by plunking down over $1.5 billion for AirWatch. EMM, formerly known as mobile device management (MDM), has been one of the hottest market segments in tech, primarily due to the seemingly unstoppable force know as BYOD. This acquisition comes a little over a year after Citrix purchased Zenprise to complement its mobile... READ MORE | There’s talk about Microsoft embracing Android, either as a mobile OS topped by Windows features and services or by providing support for Android applications within Windows. READ MORE | WEBCAST: SAP On March 6, join us in an exclusive live event featuring Nolan Bushnell, a technology pioneer, entrepreneur, and scientist who’s often cited as the father of the video game industry. This event will feature topics on laying the foundations for mobile, Big Data, and cloud applications that business teams require to stay competitive. Learn more | Dozens of self-signed SSL certificates created to impersonate banking, e-commerce and social networking websites have been found on the Web. The certificates don't pose a big threat to browser users, but could be used to launch man-in-the-middle attacks against users of many mobile apps, according to researchers from Internet services firm Netcraft who found the certificates. READ MORE | LG Electronics has launched the G Pro 2, another option for people who want smartphones with supersized screens. To succeed, the device will have to outcompete products like the Galaxy Note 3 from Samsung, and there isn't much to tell the two apart when comparing hardware specs. READ MORE | From the first presidential steamboat ride to the introduction of electricity in the White House to Obama's famous BlackBerry, our nation's commanders in chief have always enjoyed the privilege of being exposed to technology's cutting edge -- even if they haven't always embraced the opportunities. So in honor of Monday's celebration of Presidents' Day, here's a look at some of the more notable – and controversial -- presidential first encounters with the leading technologies of their days. READ MORE | WEBCAST: IBM Intelligent Investigation Manager optimizes fraud investigation and analysis and it dynamically coordinates and reports on cases, provides analysis and visualization, and enables more efficient and effective investigations. Learn More. | | | | | | | | |
No comments:
Post a Comment