High-tech

High-tech
Light

Tuesday, March 11, 2014

Microsoft risks security reputation ruin by retiring XP

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Mar 10, 2014 2:15 PM
Subject: Microsoft risks security reputation ruin by retiring XP
To: <aquarianm@gmail.com>
Cc:

Virtual machine (VM) security still a work in progress

Why IBM thinks Windows Phone is best for the enterprise

Network World Daily News PM
March 10, 2014
Share this email

Microsoft risks security reputation ruin by retiring XP

A decade ago, Microsoft kicked off SDL, or Security Development Lifecycle, a now-widely-adopted process designed to bake security into software, and began building what has become an unmatched reputation in how a vendor writes more secure code, keeps customers informed about security issues, and backs that up with regular patches.

READ MORE
 

Issue highlights

1. Virtual machine (VM) security still a work in progress

2. Why IBM thinks Windows Phone is best for the enterprise

3. Neil Young to launch hi-fi music player via Kickstarter

4. How Code Marketplaces Can Cut Application Development Costs

5. How to make the most of Minnesota winter

6. Navy network hack has valuable lessons for companies

7. VMware Unwraps Hybrid Cloud Desktop Virtualization

8. One year later, Microsoft Office's collaboration tools are still a work in progress

9. Google's Android boss announces SDK specifically geared toward wearables

10. Internet pranked by ‘Facebook for Drunks’ app

RESOURCE COMPLIMENTS OF: CITE Conference + Expo

Lead the consumerization culture shift

Consumer technologies are changing business in fundamental ways. Learn how to lead the culture shift in your enterprise at the third annual Consumerization of IT in the Enterprise (CITE) April 27–29 in San Francisco. Learn more

Virtual machine (VM) security still a work in progress

Trying to protect your expanding virtual machine (VM) empire will require a security product that can enforce policies, prevent VMs from being terminated or infected, and deliver the virtual equivalents of firewalls, IPS and anti-virus solutions. READ MORE

Why IBM thinks Windows Phone is best for the enterprise

The BYOD movement is how Apple got into the enterprise, but if it were up to IT pros, you'd be issued a Windows Phone. That's what IBM has found in its work with large firms. READ MORE

Neil Young to launch hi-fi music player via Kickstarter

A portable music player that promises better sound fidelity than MP3s is set to launch on Kickstarter with backing from veteran rocker Neil Young. READ MORE

WEBCAST: Attachmate

Workforce Mobilization for Improved Productivity

A mobility research director from Aberdeen discusses reasons for extending legacy applications to mobile devices, and an integration strategist from Attachmate shows how easy it can be. Learn More

How Code Marketplaces Can Cut Application Development Costs

Buying code modules from a curated marketplace can help usher applications into production on time and on budget. Because code marketplaces guarantee that developers will actively maintain modules, concerns about support are largely mitigated. READ MORE

How to make the most of Minnesota winter

A highlight of Minnesota winter: the ice bar. This past weekend we finished ours. The weather was perfect, a balmy 22 degrees with sunshine for the early crowd. We filled plastic bins -- about 20 at a time -- and made the blocks in batches. We started in early January. Since it rarely got above freezing, we could make the blocks ahead of time and stack them in the yard. The hardest part was shoveling... READ MORE

Navy network hack has valuable lessons for companies

The hacking of a U.S. military network that was made easier by a poorly written contract with Hewlett-Packard offers lessons on how negotiations between customer and service provider could lead to weakened security. READ MORE

WHITE PAPER: Attachmate

Cloud Enabling Your Mainframe Data

Find out how you can improve competitive advantage by exposing mainframe-application data to the cloud. This two-page solution brief provides an overview of problems and solutions. Learn More.

VMware Unwraps Hybrid Cloud Desktop Virtualization

With the new VMware Horizon DaaS offering, IT organizations can deploy enterprise-class virtual desktops to a public cloud, private cloud or seamlessly mix the two with a hybrid cloud deployment. READ MORE

One year later, Microsoft Office's collaboration tools are still a work in progress

With the introduction of Office 365 Home Premium last year, Microsoft radically changed the way it delivers Office to consumers. Instead of just offering an Office suite that includes a varied number of applications priced anywhere from $140-$400, the software maker wagered you'd pay $100 per year to get access to all of the Office apps and the right to install them on up to 5 PCs, plus extra Skype minutes and OneDrive storage. READ MORE

Google's Android boss announces SDK specifically geared toward wearables

AUSTIN--Google wants to provide a framework for wearables the same way it has for smartphones and tablets. During a talk at South by Southwest on Sunday, Android head Sundar Pichai said an Android SDK for wearables is coming down the pipeline in two weeks, and will giveA developers the tools they need to make Android-based smartwatches and fitness trackers. READ MORE

Internet pranked by ‘Facebook for Drunks’ app

A social network that caters exclusively to drunks and requires actual Breathalyzer proof of drunkenness using an actual Breathalyzer to log in? Must be a joke, right? Of course it's a joke, but that hasn't stopped The Internet - including a number of tech news sites - from taking this "social network" seriously, or the "founders" from promising to make a splash at the SXSW extravaganza kicking off... READ MORE

WHITE PAPER: Attachmate

Mobile-Enabling Your Workforce with Apps You Already Have

Learn how Verastream can unlock your legacy assets and make them seamlessly accessible to your mobile audience. An advanced technology tool and mobile-enablement platform, Verastream can quickly package your applications and data into any format, for any device. Learn More!

SLIDESHOWS

How to protect virtual machines (VMs)

These four products represent different approaches to VM security.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPhone 6 rumor rollup for the week ending March 7

2. How to Add New Job Skills Without Going Back to School

3. The greatest security story never told -- how Microsoft's SDL saved Windows

4. Why does Eric Schmidt have so much trouble dealing with Google's role in The New Digital Age?

5. A clear-eyed guide to Mac OS X's actual security risks

6. If you haven't retired Windows XP and haven't been fired yet, get busy

7. Apple reveals unprecedented details in iOS security

8. Inside Cisco's private cloud

9. Google and Verizon take big steps in the cloud

10. IPv6 could open networks up to zero-day attacks

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment