High-tech

High-tech
Light

Wednesday, February 19, 2014

How to protect Earth from asteroid destruction

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Feb 19, 2014 9:01 PM
Subject: How to protect Earth from asteroid destruction
To: <aquarianm@gmail.com>
Cc:

  Google eyes 34 cities for next step in gigabit fiber expansion | With 'virgin' developers, Microsoft could fork Android

 
  Network World After Dark

Forward this to a Friend >>>


How to protect Earth from asteroid destruction
  There has been much discussion about how NASA and others could protect Earth from the threat of asteroids catastrophically striking the planet. This month NASA issued a report on the conclusions reached by a group of experts on the best ways to find, track and possibly deflect asteroids headed for Earth. Here we take a look at some of the key findings as well as other asteroid detection projects. Read More
 


WHITE PAPER: IBM

Cost-effective messaging for medium-sized businesses
Help strengthen customer relationships, drive operational effectiveness and optimize your workforce with IBM collaboration and messaging solutions for medium-sized businesses. IBM Lotus software is designed to provide simplified solutions and delivery models based on your needs. View Now>>

WHITE PAPER: Dell Software
 
RocketSpace case study
In this case study, see how RocketSpace got both high security and high performance with Dell™ SonicWALL™ E-Class Network Security Appliance (NSA) E5500 Next-Generation Firewall with application intelligence, control and visualization. Read now!

Google eyes 34 cities for next step in gigabit fiber expansion
Google has chosen 34 cities across the U.S. as the next sites for possible expansion of its gigabit-speed Fiber Internet service. The cities encompass nine metro areas and include Salt Lake City; San Antonio; Nashville, Tennessee; Charlotte, North Carolina; clusters of cities around Silicon Valley, including Mountain View where Google has its headquarters; Atlanta; Portland, Oregon; Phoenix; and Raleigh-Durham, North Carolina. Read More
 

With 'virgin' developers, Microsoft could fork Android
Windows Phone is not an option for Microsoft’s mobile renaissance. It’s just too little and too late. Read More
 

Zeus malware-botnet variant spotted 'crawling' Salesforce.com
The Zeus Trojan, malware long known to steal banking credentials to siphon off victims' funds, has been spotted being put to yet another devious use: swiping business data from Salesforce.com. Read More
 

Time to drop unnecessary admin privileges
A new study shows that CSOs could dramatically lower the risk of malware infection by becoming a lot stingier with the number of company employees given administrator accounts on computers. Read More
 

RSA Preview: Machine-learning analytics and cloud encryption
  Keith Shaw chats with Kevin Conklin from Prelert and Elad Yoran from Vaultive about some security trends expected at the 2014 RSA Conference in San Francisco. Read More
 

6 tips to combat Advanced Persistent Threats
The success of advanced persistent threats (APT) is reportedly so pervasive that detecting and defeating them with any consistency may seem to be a hopeless battle. Read More
 

A FICO credit score, but for your cloud
In the early-1980s Fair, Isaac and Co. created a universal metric named the FICO Credit Score that allowed lending agencies to judge the credit-worthiness of potential debtors. Rajiv Gupta, founder of cloud security startup SkyHigh Networks, says the cloud needs the same thing. And his company's Cloud Security Dashbaord aims to be just that. Read More
 

Sony takes the lead in gaming console race
Sony has sold more than 5.3 million PlayStation 4 consoles as of Feb. 8, solidifying its lead over Microsoft's Xbox One. Read More
 

Leaked release dates shed light on Microsoft's Windows 9 plans
The Russian super sleuth continues his stream of updates on a nearing 8.1 update and the release of Windows 9. Maybe it's a good thing Microsoft is in a bit of chaos right now, because it's leakier than an 80-year-old man who drank a gallon of tea. WZor, the leaker with a track record dating back to the Vista days, has unleashed a bunch of dates that, if true, indicate a very busy year. Read More
 

Wireless and Cars: My Initial Experiments with Telematics
  So the end-of-the-year car sales and the expiration of my previous lease converged in late December, leading to my leasing a shiny new Hyundai Santa Fe Sport. Hyundai builds great vehicles, with equally great price/performance, and they have the best warranty anywhere. And they have all of the bells and whistles that appeal to gadget freaks like me - including telematics, which is loosely defined here... Read More
 

Apple reportedy met with Elon Musk of Tesla and may be exploring technology that could predict heart attacks
In 2010, Apple hired a Goldman Sachs investment banker named Adrian Perica. His mission? To focus exclusively on mergers and acquisitions and help Apple seal deals quickly. Since then, Apple, a company that has historically shied away from numerous corporate acquisitions, has stepped on the gas quite noticeably. In 2013 alone, for example, Apple acquired 15 companies, more than it's ever acquired in... Read More
 

 

SLIDESHOWS

The 12 most powerful security companies

Some security vendors just keep getting high marks from independent test organizations and analysts year and year.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Whatever happened to the IPv4 address crisis?

2. The 12 most powerful security companies

3. The erosion of IT's middle class

4. Microsoft Lync to play nice with Cisco, Android

5. 16 weirdest places you'll find Linux

6. Gigabit Internet Service Providers Challenge Traditional ISPs

7. 15 Non-Certified IT Skills Growing in Demand

8. Leaked release dates shed light on Microsoft's Windows 9 plans

9. Apple shop maxes out Airport access points, upgrades to 802.11ac

10. Zeus malware-botnet variant spotted 'crawling' Salesforce.com


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment