Network World Daily News PM | | Peering deep inside WindowsThe beauty of Windows lies in its flexibility and depth. In fact, Windows is so deep and flexible that many of us never touch its more powerful tools, whether from unawareness or sheer forgetfulness. But beneath Internet Explorer and the Start button hides a universe of tools and tricks that are positively brimming with potential.To read this article in full or to leave a comment, please click here | | Issue highlights 1. Cool Stuff at CE Week New York 2. No more excuses, time to roll out IPv6, says registry boss 3. IPv6 usage is climbing in Europe, while Asian countries are most ready for 4K TV, says study 4. Cyphort provides guidance on prioritizing APTs for mitigation 5. 8 Internet things that are not IoT 6. SCOTUS: 'Privacy comes at a cost' but 'get a warrant' before searching that phone 7. Carnegie Mellon system lets you get to the good parts of video, fast 8. VMware catches up with some Apache Struts patches, but not all 9. Hackers found controlling malware and botnets from the cloud 10. Supreme Court goes 1 for 2 on big tech decisions | WHITE PAPER: Limelight Networks This practical guide to superior online performance takes a closer look at the complex concept of online performance: what it is, how to measure it, and—most critically—what it takes to make it better. Learn More | OK, kids, strap in for this post - we're going to move quickly here. Start off by watching the video above to see a bunch of new gadgets that we saw this week at the CE Week New York event (in New York City, natch).There was pretty much something for everyone - new health and fitness gadgets, toys and robots for the kids, audio gear, new 4K TVs, and a bunch of stuff for your smartphone or tablet or computer.Ready, set go!Elektrokidz: From WowWee Robotics comes these cute creatures - don't call them Trolls (the Trolls people might get irked) - but rather these toys react to the beat of music in fun ways. WowWee was showing these at the show alongside their new MiP robots (we saw them at CES), which explore, dance, play games and do other activities by balancing on their two wheels.To read this article in full or to leave a comment, please click here READ MORE | As the dwindling number of IPv4 addresses starts to cause problems for organizations around the world, time has come to roll out IPv6 on a larger scale and leave behind dead-end technologies that delay the inevitable, according to the chief of the regional Internet registry in Asia-Pacific.The newer version of the IP (Internet Protocol) adds an almost inexhaustible number of addresses thanks to a 128-bit long address field, compared to the 32 bits used by version 4. Since every connected device on the Internet needs an IP address, there is increasing pressure to move to IPv6 as more non-computer devices come online in the so-called Internet of things.To read this article in full or to leave a comment, please click here READ MORE | Belgium is leading the world in IPv6 adoption, while South Korea and Japan are most ready for 4K video streaming, according to a report.That Japan and South Korea should be preparing for the arrival of 4K video is no surprise, given that they are home to some of the world's largest TV and flat-panel display makers.But Belgium, a leader in the use of the new addressing system that potentially allows every person and device on the planet to have their own unique IP address? Yes, says Akamai Technologies in its State of the Internet report for the first quarter of 2014.The report, a grab-bag of statistics about Internet traffic volumes and technology adoption, is based on traffic passing through the company's global content delivery network (CDN).To read this article in full or to leave a comment, please click here READ MORE | : LogMeIn This InfoWorld research report, based on an IDG QuickPulse survey administered to IT professionals, will provide insight into the BYOA trend, identify pain points associated with traditional online meeting tools, and address business-driven IT requirements that benefit the overall organization. Read Now | This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. It seems the life tech generation cycles is getting shorter these days. It has only been a few years since the emergence of a class of sophisticated solutions that detect and prevent advanced persistent threats (APT) in the enterprise by monitoring URLs and content and forcing them to play out in a sandbox to look for the presence of malware. Fed by the analysis of billions of transactions across the Internet, these solutions can pinpoint malicious behaviors, IP address and URLs and provide intelligence to firewalls, proxies and intrusion prevention systems (IPS) to make them more effective.To read this article in full or to leave a comment, please click here READ MORE | Cisco's proclamations on the value of the Internet of Things/Everything market -- $14.4 trillion -- would seem to include everything but the kitchen sink… and maybe even that if it's IP-enabled. So is there anything IP-enabled that's not included in the Internet of Things/Everything market? We asked a couple of analysts tracking the market and they gave us a list of eight IP-enabled devices they do not consider elements of the Internet of Things/Everything:To read this article in full or to leave a comment, please click here READ MORE | In huge win for digital privacy that will help pave the future of the Fourth Amendment, the Supreme Court unanimously ruled that Johnny Law needs a warrant before he can search the cellphone a person he arrested.Despite a former DHS official's previous opinion that reduced the Supreme Court Justices to "nine Baby Boomers" who wouldn't know the "creepy line" if it bit them on the butt, yesterday SCOTUS showed that people are still entitled to Fourth Amendment protections even in the digital age. "Our answer to the question of what police must do before searching a cell phone seized incident to an arrest is accordingly simple—get a warrant," they ruled (pdf).To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: Damballa A Fortune 500 company wanted to detect advanced malware, zero-day threats, and other targeted attacks. Every solution they reviewed used signature-based techniques or sandboxing, which wasn't enough. They selected Damballa Failsafe to plug the security gaps. Read Now | While Video has become ubiquitous thanks mostly to smartphones it doesn't mean you want to actually watch all of it. Carnegie Mellon University computer scientists say they have invented a video highlighting technique called LiveLight that can automatically pick out action in videos shot by smartphones, GoPro cameras or Google Glass users. +More on Network World: NASA's coolest 'way-out' future projects+ LiveLight constantly evaluates action in a video, looking for visual novelty and ignoring repetitive or eventless sequences, to create a summary that enables a viewer to get the gist of what happened. What it produces is a miniature video trailer. Although not yet comparable to a professionally edited video, it can help people quickly review a long video of an event, a security camera feed, or video from a police cruiser's windshield camera, according to Carnegie researchers.To read this article in full or to leave a comment, please click here READ MORE | Two months after critical vulnerabilities were patched in Apache Struts, a popular open-source framework for developing Java-based Web applications, VMware released a security update to incorporate the fixes in its vCenter Operations Management Suite product but appears to have left out a more recent patch.The vCenter Operations Management Suite can be used to monitor and manage the performance, capacity and configuration of virtualized infrastructure. It depends on Struts for some of its features."The Apache Struts library is updated to version 2.3.16.2 to address multiple security issues," VMware said in a security advisory Tuesday that coincided with the release of vCenter Operations Management Suite (vCOps) version 5.8.2.To read this article in full or to leave a comment, please click here READ MORE | In what is considered to be a natural evolution of tactics used by cybercriminals to infiltrate corporate networks, security firm Trend Micro has new evidence that more botnets and malware are being not only hosted in the cloud, but controlled remotely from cloud servers.The goal of hackers is to disguise their malicious software as regular traffic between corporate end points and cloud-based services.Trend Micro reported today through a blog post that it has observed the first instance of hackers using DropBox to host the command and control instructions for malware and botnets that have made it past corporate firewalls."At end of the day, cybercriminals are business people," says Trans Micro Global Threat Communications Manager Christopher Budd. "The same logic that drives business people to using cloud-based services is driving the bad guys to use the cloud too." And that requires business end users to stay on their feet to combat these threats.To read this article in full or to leave a comment, please click here READ MORE | Wednesday was a big day for technology cases in the Supreme Court. The Justices ruled on a pair of important cases that promise to have wide-ranging implications for the development and use of modern technology for years and decades to come. But the effects of the decisions aren't necessarily what either side in the cases has been arguing.One decision rightly affirmed that cellphones cannot be searched by police without a warrant. The other rejected Aerio's claim that its unique technological model circumvented copyright restrictions, without addressing the larger cloud storage issues everyone is worrying about. Let's look at the cellphone case first.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: Radware Cost reduction, business agility and operational efficiency: three main drivers for any CIO considering the adoption of cloud computing and virtualization technologies as part of an IT-as-a-service initiative. Learn More | | | | | | | | |
No comments:
Post a Comment