High-tech

High-tech
Light

Thursday, February 27, 2014

Boeing's new smartphone will self-destruct in 3...2...

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Feb 27, 2014 2:14 PM
Subject: Boeing's new smartphone will self-destruct in 3…2…
To: <aquarianm@gmail.com>
Cc:

Is Your IT Shop a Scrambler or a Leader?

10 Android apps developers will love

Network World Daily News PM
February 27, 2014
Share this email

Boeing's new smartphone will self-destruct in 3…2…

Aerospace and defense company Boeing this week rolled out the Boeing Black – a heavily secured Android smartphone designed for use by the U.S. military and intelligence agencies, which – no kidding – will essentially self-destruct if tampered with.

READ MORE
 

Issue highlights

1. INSIDER Is Your IT Shop a Scrambler or a Leader?

2. 10 Android apps developers will love

3. FTC: Identity theft is the plague of the country

4. FBI expects to roll out malware-analysis system to help businesses identify attacks

5. Help! Most enterprises turn to consultants when using the cloud

6. This story is about violent vigilantism, not ‘sexting’

7. Products of the week 02.24.14

8. Enterprises advised to exercise care in using Apple products

9. Brocade's fabric strategy appears to be working

10. Google Android chief Sundar Pichai says Android not designed to be safe

11. Postini traps legitimate messages, creates Gmail delivery backlog

12. Off topic: Why would someone dump a coin collector's book in a bank's ATM booth?

13. 5 Things You Need to Know About Bluetooth Low Energy

14. Google postpones add-on 'kill switch' for Chrome on Windows

15. Best new technology from Mobile World Congress 2014

RESOURCE COMPLIMENTS OF: CIO Perspectives Atlanta Conference

Invite to CIO Perspectives Atlanta Conference - March 12

Agenda highlights include: Innovative Approaches to Digital Disruption & Business Model Change; Transforming the IT-Business Partnership; Finding and Keeping Great IT Talent; Strategies for C-Suite Leadership & Success; Innovative Approaches to Digital Disruption & Business Model Change. Visit our website and register today!

INSIDER

Is Your IT Shop a Scrambler or a Leader?

An IT veteran describes the four stages of the technology organization -- and what it takes to move up a notch READ MORE

10 Android apps developers will love

From full-blown IDEs to essential resource utilities, these Android apps bring powerful programming features to phones and tablets READ MORE

FTC: Identity theft is the plague of the country

The Federal Trade Commission today issued its annual look at what consumers in the United States are complaining about the most. READ MORE

FBI expects to roll out malware-analysis system to help businesses identify attacks

The director of the Federal Bureau of Investigation (FBI) said this week his agency plans to introduce a malware-analysis system later this year that will let businesses and the public, report newly identified malware attacks, upload malware samples and receive reports on them. READ MORE

Help! Most enterprises turn to consultants when using the cloud

Customers using the cloud overwhelmingly turn to professional service consultants to execute or plan out projects, according to a report from Technology Business Research. READ MORE

WHITE PAPER: Crittercism

Top 10 Internet Applications Most Likely to be Mobilized

Effective mobile application performance management optimizes application availability and response time, ensuring the best user experience. Learn the difference the right management tools make and why tools that monitor the network or focus only on performance at the device level are not enough. Read now!

This story is about violent vigilantism, not ‘sexting’

This headline could not be more misleading. And, knowing my business as I do, it's all but certain that the failure to communicate is a byproduct of the headline writer's inability to resist the word "sexting." READ MORE

Products of the week 02.24.14

Our roundup of intriguing new products from companies such as Dell and Solarwinds READ MORE

Enterprises advised to exercise care in using Apple products

While Apple's recent security flub could have happened to any vendor, enterprises should take note of the computer maker's shortcomings in fixing a flaw that heightened the risk of using Apple products. READ MORE

Brocade's fabric strategy appears to be working

The networking industry has certainly gone ga-ga over the topic of software defined networks (SDN). Before SDNs were all the rage, network transformation had already begun with the use of fabrics. The rise of SDNs certainly took the media focus away from fabrics and that caused many vendors to shift their marketing messages as well. However, one of the vendors that has been fairly consistent with the... READ MORE

Google Android chief Sundar Pichai says Android not designed to be safe

Earlier this week, Google Android chief Sundar Pichai spoke at the Mobile World Congress where he explained, rather bluntly, that Android is designed to be open more so than it's designed to be safe. He also added that if he were a hacker today, he too would focus most of his efforts on Android on account of its marketshare position. FrAndroid reports: READ MORE

WHITE PAPER: Crittercism

Getting Agnostic about Mobile Devices

The need for flawless, high-performing mobile apps is critical, yet many organizations struggle. This paper explains how to accurately analyze performance of mobile apps, calculate the cost of app failure, and how to develop, deploy and test mobile apps so that malfunctions don’t happen. Read more!

Postini traps legitimate messages, creates Gmail delivery backlog

Google has been scrambling for more than 24 hours to unclog a queue of messages sent to Gmail users that its Postini email filter incorrectly labeled as spam and quarantined. READ MORE

Off topic: Why would someone dump a coin collector's book in a bank's ATM booth?

For a moment there, I imagined myself following in the footsteps of that California couple who just stumbled across $10 million in gold coins. READ MORE

5 Things You Need to Know About Bluetooth Low Energy

BLE -- which Apple calls iBeacon -- could be used for smart homes, retail geofencing and mobile payments, if privacy and security issues are addressed. READ MORE

Google postpones add-on 'kill switch' for Chrome on Windows

Google yesterday gave Chrome extension developers another two months to register their work with the browser's online store, after which the company will throw a "kill switch" on most add-ons installed from other sources. READ MORE

Best new technology from Mobile World Congress 2014

Smartphones, tablets, wearables on display at the show READ MORE

WHITE PAPER: Crittercism

The 2013 Mobile App Performance Management Report

Most enterprises are looking for ways to leverage their investments in web technology to handle mobile app performance, but between monitoring, OS variants, screen sizes and OEMs, this can be a costly and complex approach. This 2013 Mobile APM Report highlights best practices for meeting mobile app challenges and ensuring mobile app performance. Read more!

SLIDESHOWS

Free tools for Windows Server admins

There are endless software tools and utilities out there to help you in managing your network. Here are some of the best free ones.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. RSA security attack demo deep-fries Apple Mac components

2. Google Glass backlash escalates to violence

3. 10 cities that provide 1-Gig internet services

4. No hard feelings, Alan? Ford reportedly will dump Microsoft's Sync

5. 14 Tech Conventions You Should Attend in 2014

6. Ultimate cloud speed tests: Amazon vs. Google vs. Windows Azure

7. Are Apple iOS, OS X flaws really backdoors for spies?

8. 13 of today's coolest network research projects

9. Danger! Danger! iOS update may brick your iPhone 5S or iPad Air

10. Best new technology from Mobile World Congress 2014

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment