---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <
nww_newsletters@newsletters.networkworld.com>
Date: Jan 31, 2014 2:05 PM
Subject: Watch Apple's creepy follow-up to the 1984 Super Bowl ad
To: <
aquarianm@gmail.com>
Cc:
Network World Daily News PM | | Everyone, or at least everyone who will read this, is familiar with Apple's 1984 Super Bowl ad. That's especially impressive when you consider that it was only shown on TV once (after the Super Bowl, George Orwell's estate sent Apple a cease and decist letter charging copyright infringement of the novel 1984). Even so, it remains up there with Mean Joe Green and "Where's the beef?!" in the classic... | | Issue highlights 1. 7 hi-tech firsts you'll see at the Super Bowl 2. INSIDER Big Data Helps Walgreens Treat Walk-in Patients 3. Microsoft's long, messy, occasionally clumsy CEO search is about to end 4. Sprint "Complete Collaboration" Adds Microsoft Lync to its UC Solution 5. Fixing corrupted Outlook PST files 6. Criminals use Java to infect Linux and Mac users with DDoS bot 7. IBM to consolidate communication and collaboration wares into Connections suite 8. INSIDER The processes and tools behind a true APT campaign: Command & Control 9. FCC: IP addresses could replace phone numbers 10. The moral of the Twitter-GoDaddy breach: People are the easiest thing to hack 11. Symantec's results show firm battling changing security market 12. Medical lab says FTC breach probe forced it to close 13. Yahoo resets passwords after Mail attack | WHITE PAPER: IBM IBM commissioned research by Aberdeen group that recommends the steps that mid-market organizations need to take to become best-in-class in B2B collaboration and integration. Read Now | Between 3D printed cleats and game predictions determined by big data, the Nerd Bowl has truly earned its name. READ MORE | Cloud-based electronic medical records and analytics systems give Walgreens health data to diagnose and treat patients at in-store clinics. READ MORE | Microsoft could be ready to announce a new CEO within the next week, and it looks to be an insider, after the lengthy outsider search failed to produce results. READ MORE | READ MORE | RESOURCE COMPLIMENTS OF: CITE Conference + Expo You’ve heard about consumerization...but how can you use it to give your organization a competitive edge? Find out at the third annual Consumerization of IT in the Enterprise (CITE) April 27–29 in San Francisco. Learn how consumer-driven technology can transform your business, your workplace, and your customer relationships. Learn more | READ MORE | Criminals are once again using Java's cross-platform design to add Linux and Mac users to their usual Windows target list, Kaspersky Lab's researchers have discovered. READ MORE | Connections' scope will extend beyond enterprise social networking to include email, productivity apps and video conferencing READ MORE | In part four of a series on understanding the processes and tools behind an APT-based incident, CSO examines the Command & Control phase, often referred to as C2. During this phase, the attacker(s) are on the network, and depending on their objectives, will start focusing on their endgame. READ MORE | WHITE PAPER: OutSystems This whitepaper, authored by Bloor Research practice leader David Norfolk, compares two different PaaS (platform as a service) solutions - OutSystems Platform and Force.com and includes a comprehensive analysis of the two PaaS solutions. Learn more | Yesterday, the FCC announced what it called a "set of voluntary experiments" meant to explore the transition away from outdated communications technology and toward newer, more useful services. One of the more interesting prospects listed is the possibility of replacing traditional phone numbers with IP addresses. READ MORE | Of all the lessons to be learned from the hacking of Naoki Hiroshima and the loss of his coveted @N Twitter handle, the most troubling is the one which will ultimately be the most difficult to solve. In online security, weak passwords and poor encryption standards may be part of the problem, but the biggest problem of all remains ourselves. READ MORE | With sales of security software predicted to rise this year by Gartner, one of the top security software houses, Symantec, appears to be struggling in the very market it should be dominating. READ MORE | An Atlanta-based medical laboratory that has been embroiled in a bitter feud with the U.S. Federal Trade Commission over a data breach investigation shut down its operations this week. READ MORE | Yahoo has been resetting email accounts that were targeted in an attack apparently aimed at collecting information from people's recently sent messages, the company said Thursday. READ MORE | WHITE PAPER: HP and Intel® Misinformation may be the most daunting obstacle when building an IT infrastructure. To help you separate the facts from the hype, experts from HP Technology Consulting have created this informative guide to provide you with the insight you need to make decisions about successful cloud strategies. Read Now>> | | | | | | | | |
No comments:
Post a Comment