High-tech

High-tech
Light

Wednesday, February 26, 2014

Google Glass backlash escalates to violence

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Feb 26, 2014 9:01 PM
Subject: Google Glass backlash escalates to violence
To: <aquarianm@gmail.com>
Cc:

  The 700MHZ spectrum: Who owns what? | High-profile US national labs team to build 200 petaflop supercomputers

 
  Network World After Dark

Forward this to a Friend >>>


Google Glass backlash escalates to violence
I've written in the past about the less-than-stellar reception Google Glass has received among the population of people who don't have access to the high-tech eyewear, or just aren't interested i Read More
 


WEBCAST: SAP

SAP IT Transformation Forum
On March 6, join us in an exclusive live event featuring Nolan Bushnell, a technology pioneer, entrepreneur, and scientist who’s often cited as the father of the video game industry. This event will feature topics on laying the foundations for mobile, Big Data, and cloud applications that business teams require to stay competitive. Learn more

WHITE PAPER: Limelight Networks

Why Web Site Performance Is an IT Imperative
A slow or inefficient Web site can have a direct impact on your business. Recently, IDG Research explored the challenges enterprises face in delivering content across multiple devices. Find out how adjusting to these challenges while meeting performance objectives has become a top concern for senior IT managers. View Now

The 700MHZ spectrum: Who owns what?
700MHZ spectrum holdings, from T-Mobile to Verizon and AT&T to Echostar Read More
 

High-profile US national labs team to build 200 petaflop supercomputers
Three principal US national labs today affirmed they will team-up to build supercomputers that operate about 10 times faster than today's most powerful high performance computing (HPC) systems. Read More
 

RSA security attack demo deep-fries Apple Mac components
How bad can cyberattacks get? How about burning the internal components of a machine, whether PC or Mac, to a crisp so there's no thought of it being recoverable? That's what security vendor CrowdStrike showed could be done to an Apple Mac OS X today at the RSA Conference. Read More
 

Are Apple iOS, OS X flaws really backdoors for spies?
Two recently-discovered flaws in Apple iOS and Mac OS X have security experts openly asking whether the software vulnerabilities represent backdoors inserted for purposes of cyber-espionage. There's no clear answer so far, but it just shows that anxiety about state-sponsored surveillance is running high. Read More
 

 

INSIDER
10 cities that provide 1-Gig internet services
Municipal broadband is becoming a contentious issue in the race to establish ubiquitous high-speed Internet throughout the United States. Read More

 

13 of today's coolest network research projects
Here's a whirlwind look at some of the wildest and potentially most useful technology research projects from university and vendor labs related to computer networking. Read More
 

The clock in the mountain: 10 curious side projects of tech's rich and famous
In their spare time, and with copious amounts of cash, these tech giantsindulge in obsessions from space travel to cheating death. Read More
 

Windows 8: Learn to love it
If you're having a rough time with your Windows 8 computer, several options are available to smooth out the bumps Read More
 

What CIOs Need to Know Before Relying on Startups
It seems there's a startup for everything these days. Sure, there are benefits from introducing new, more efficient systems to your enterprise, but there are also technical, financial and practical considerations before signing on with a startup tech company. Here are the pros and cons. Read More
 

RSA Rapid Reaction: Art Coviello keynote
At the RSA Conference in San Francisco, Network World's Ellen Messmer speaks with security industry officials, getting their reactions to the Art Coviello keynote speech. Read More
 

7 hidden dangers of wearable computers
Wearable computers like smart clothes and smart watches offer a myriad of benefits, but also raise security concerns. Here are 7 worries associated with wearable devices. Read More
 

MWC 2014: Samsung targets fitness junkies with Galaxy Gear 2, Gear Fit
The Gear Fit has a 1.84-inch, curved, 432 by 128 pixel display. Both the Gear 2 and Gear fit include heart rate monitors and S Health, an application suite for fitness tracking. Follow reporter Nick Barber on Twitter @nickjb Read More
 

Apple retires Snow Leopard from support, leaves 1 in 5 Macs vulnerable to attacks
Apple on Tuesday made it clear that it will no longer patch OS X 10.6, aka Snow Leopard, when it again declined to offer a security update for the four-and-a-half-year-old operating system. Read More
 

Best new technology from Mobile World Congress 2014
  Smartphones, tablets, wearables on display at the show Read More
 

 

SLIDESHOWS

Free tools for Windows Server admins

There are endless software tools and utilities out there to help you in managing your network. Here are some of the best free ones.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Crowded U.S. airwaves desperately in search of breathing room

2. 13 of today's coolest network research projects

3. Storage on a budget: GlusterFS shines in open source storage test

4. Best new technology from Mobile World Congress 2014

5. iPhone 6 rumor rollup for the week ending Feb. 21

6. RSA chief: NSA exploited 'position of trust'; should spin-out security tech group

7. Battle of the fives: Samsung Galaxy S5 vs. Apple iPhone 5S vs. Google Nexus 5

8. Cisco details Sourcefire security threat integration, open source direction

9. Inside the tiny Kansas town battling cable lobbyists over municipal broadband

10. How to Test the Security Savvy of Your Staff


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment