High-tech

High-tech
Light

Saturday, May 24, 2014

21 more crazy and scary things the TSA has found on travelers

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: May 23, 2014 9:34 AM
Subject: 21 more crazy and scary things the TSA has found on travelers
To: <aquarianm@gmail.com>
Cc:

New iOS app secures IM traffic with 'post quantum' encryption scheme

10 cities that provide 1-Gig internet services

Network World Daily News PM
May 23, 2014
Share this email

21 more crazy and scary things the TSA has found on travelers

This year the TSA found everything from Bazooka rounds to a medieval mace and bones

READ MORE
 

Issue highlights

1. New iOS app secures IM traffic with 'post quantum' encryption scheme

2. INSIDER 10 cities that provide 1-Gig internet services

3. How IBM Plans to Get With the Times

4. 10 tools for stealthily slacking off at work

5. Cisco Live lives it up at 25

6. Does the CFO Need to Become a Technologist?

7. Security Threat Landscape: May 2014

8. New generic top-level domain names do more harm than good

9. Dark Wallet--Threat or No Threat?

10. IT power grab: Should you be a Machiavellian manager?

11. Department of Justice bashes $20 million identity refund fraud ring

12. 20 cool things you can do with a Raspberry Pi

: LogMeIn

Avoid the Sales/IT Collision Scenario

This InfoWorld research report, based on an IDG QuickPulse survey administered to IT professionals, will provide insight into the BYOA trend, identify pain points associated with traditional online meeting tools, and address business-driven IT requirements that benefit the overall organization. Learn More

New iOS app secures IM traffic with 'post quantum' encryption scheme

A new instant messaging application for the iPhone uses an advanced, "post quantum" encryption scheme to scramble one-on-one chats. It's intended as a bullet-proof secure alternative to WhatsApp's addictive message interface and to mobile carrier's primitive and (outside the U.S.) pricey SMS texting services. READ MORE

INSIDER

10 cities that provide 1-Gig internet services

Municipal broadband is becoming a contentious issue in the race to establish ubiquitous high-speed Internet throughout the United States. READ MORE

How IBM Plans to Get With the Times

This week's IBM Edge2014 infrastructure event hinted at how the company plans to use experience to its advantage. Far from burning out or fading away like an aging rock star, IBM intends to join today's young rockers on stage -- and steal the show. READ MORE

10 tools for stealthily slacking off at work

We're all about helping you be more productive, but to stay at the top of your game you need occasional downtime. Can it be helped that sometimes the need strikes while your at work? READ MORE

WEBCAST: Dell SecureWorks

Counterstrategies for Combatting Social Engineering

Social Engineering is proving costlier than ever, especially phishing and spear phishing. With recent breaches, the imperative to counter social engineering effectively takes on a whole new level of urgency. In this webcast, the CISO for Dell SecureWorks discusses the realities of social engineering and what your organization must do to counter it. Learn more

Cisco Live lives it up at 25

It started with a sobering declaration and ended with what for some was an inebriating party. READ MORE

Does the CFO Need to Become a Technologist?

Technology today, particularly big data and analytics, is disrupting roles throughout the enterprise, whether it's the CIO that needs to seek new ways to be a strategic partner to the business or the CMO constantly faced with decisions about technology that can make the marketing function more data-driven and efficient. Even the CFO role is not immune. READ MORE

Security Threat Landscape: May 2014

In this month's episode, Keith Shaw (IDG Enterprise) and Derek Manky (Fortinet) discuss the BlackShades arrests, ransomware updates, new evasion techniques and other security threats seen this month. READ MORE

New generic top-level domain names do more harm than good

It's been a few months now since the bevy of new generic top-level domains (gTLDs) were made available. These were supposed to rock the domain name registration business and change the Internet landscape forever. We're all used to the traditional TLDs, such as .net, .com and .org, and the point of the initiative is to add a bunch of new gTLDs to create more options because the Internet is running... READ MORE

WEBCAST: Sourcefire, now part of Cisco

Innovations that Protect Against Advanced Attackers

This webinar will explore new technologies and process for protecting endpoints from advanced attackers and how innovations like continuous data collection combined with big data analytics are pushing the envelope for what security teams can do during and after an advanced attacker puts them in their sights. Learn more >>

Dark Wallet--Threat or No Threat?

The Fuss About Dark Wallet READ MORE

IT power grab: Should you be a Machiavellian manager?

Two recent works from leading analyst firms throw down the gauntlet to CIOs: Once IT leaders fully embrace the power they hold in the enterprise, they can stop taking orders and start giving advice. READ MORE

Department of Justice bashes $20 million identity refund fraud ring

The US Department of Justice said 10 people were indicted today for their roles in a $20 million stolen identity refund fraud conspiracy. READ MORE

20 cool things you can do with a Raspberry Pi

Get creative. No, more creative than that. Keep going. READ MORE

WEBCAST: IBM

Reinventing Storage Efficiency!

Live event: Tuesday, June 17, 2014 1 PM ET / 12 PM CT / 10 AM PT What if you could reduce your storage costs by half? Attend this webcast to hear how you can maximize the economics of your data center by modifying your storage footprint and power usage using Flash Storage, and to learn how IBM is accelerating storage efficiency. Register Now

SLIDESHOWS

Celebrating 25 years of Cisco Networkers

This year, Cisco recognizes the 25th anniversary of its Networkers user conference.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 12 most powerful Internet of Things companies

2. Cisco to acquire malware prevention company

3. TCO of Cisco ACI 3X better than VMware NSX

4. Linux: Best desktop distros for newbies

5. Tech's top-paid CEOs

6. 20 cool things you can do with a Raspberry Pi

7. New Internet Explorer zero-day details released after Microsoft fails to patch

8. IT pro gets prison time for sabotaging ex-employer's system

9. FIRST LOOK: Microsoft Surface Pro 3 tablet/PC

10. Rackspace not a good fit for Cisco, says Chambers

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment