Network World Daily News AM | | iStockPhoto This week disappointing news came from service provider Code Spaces, a company that provided support for devops application management. Code Spaces, which was hosted in Amazon Web Service's cloud, ceased operations. after suffering a distributed denial-of-service attack by a perpetrator who demanded ransom and then began deleting data when company officials logged into their AWS account to stop the attack.To read this article in full or to leave a comment, please click here | | Issue highlights 1. Network World's 2014 State of the Network survey 2. INSIDER What color is your Big Data parachute? 3. Florida college applies corporate-style security to 'BYOD' campus network 4. Companies warned of major security flaw in Google Play apps 5. Microsoft reveals Office 365 roadmap, offers opt-in previews 6. NASA bolsters Pluto-bound spacecraft for 2015 visit 7. Hacker puts 'full redundancy' code-hosting firm out of business 8. House approves effort to limit NSA searches of US data 9. The best portable hard drives: Our top picks are fast, light and spacious 10. Judge not sold on $324M settlement in Silicon Valley tech worker case 11. Katherine the White Shark crashes research site's servers 12. Chinese site in signal-jammer sting could pay record $34.9M FCC fine 13. The tech industry goes to the World Cup | WEBCAST: HP Today, the industry is at an inflection point - driven by a triple storm of Big Data, cloud, and mobility; and in this new environment, security is paramount. The New Style of IT is about how businesses and IT leverage this rapid change for enterprise growth. Learn More | Aligning IT with the business has been a top priority of IT organizations for the past few years, but that is changing, according to the latest State of the Network Survey. IT has apparently made enough headway on the alignment issue that other priorities are coming to the fore. The No. 1 business objective of the 282 IT respondents is decreasing operational costs, while the top technology objective is lowering IT operational costs through server consolidation and overall IT simplification. Continue for more survey results.To read this article in full or to leave a comment, please click here READ MORE | Salaries are on the rise for IT professionals, increasing anywhere from 3% to 7%, according to the latest surveys. For big data professionals, however, the news on compensation is even better. In a DICE study, IT pros adept at big data-related languages, databases and skills (like R, NoSQL, MapReduce and Hadoop) are getting premium pay, accounting for nine of the top 10 paying jobs.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | Can a college campus filled with exuberant students and free-thinking professors armed to the hilt with smartphones and tablets find a way to establish business-like network security and appropriate-use expectations without crimping everyone's style? Broward College, a state college near Miami, has that in mind in the "Bring Your Own Device" (BYOD) strategy forged with help from the college's chief information security officer, Matt Santill. Since he's been there the past few years, he's pushed to register the tens of thousands of devices that touch the campus network to determine the student and staff users, who must agree to and sign the college's acceptable-use policy. There are requirements for anti-virus software, and a general taboo on many peer-to-peer (P2P) connections in order to prevent students from downloading video and other content across the campus network that would violate the Digital Millennium Copyright Act and possibly get both the student and the college into trouble with content owners. Monitoring is done through security gear, such as unified threat management gateways and network-access control, to enforce policy.To read this article in full or to leave a comment, please click here READ MORE | University researchers have found that developers often store authentication keys in the Android apps on Google Play, making it possible for criminals to steal corporate or personal data.The major security threat has cast doubt on the effectiveness of the automated scanning tools Google uses to uncover malicious code and other problems that could pose a risk to users."If I'm a CISO, and I'm trying to make decisions about BYOD policies for my corporation, I might say, 'you know what – Android, not cool,'" Jonathan Sander, strategy and research officer for STEALTHbits Technologies, said.Google, which has been notified of the problem, did not respond to a request for comment.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: OutSystems With the release of the 5th major version of HTML (aka HTML5), new features that mainly target Web Applications have been introduced, ranging from CSS3 (related technology) to GeoLocation and WebStorage. This article explores the top 5 features that developers should be using now. Read Now | Microsoft on Thursday delivered on a promise made earlier this year to provide a roadmap to future Office 365 enhancements and additions, something both current and potential customers have been clamoring for, an analyst said."Of the key concerns [about Office 365] in large organizations [is] when will, and how will, Office 365 be upgraded?" Wes Miller, an analyst with Directions on Microsoft, said Thursday. "[They] want to know when the technology will arrive, both to be aware and to prepare users."+ ALSO ON NETWORK WORLD Tips on how to ace an Office 365 certification test +To read this article in full or to leave a comment, please click here READ MORE | When you are on a 3 billion mile trip through the universe at over 34,000 mph, you might need a check-up or two to make sure everything is function right. That's exactly what's going on this week as NASA said it will soon update and checkout its Pluto-bound spacecraft known as New Horizons. Mission controllers at the Johns Hopkins Applied Physics Laboratory will begin the spacecraft's eighth check-up since the satellite launched in 2006. It will be the last before next year's rendezvous with Pluto. +More on Network World: Coolest house in the world: A Boeing 727+To read this article in full or to leave a comment, please click here READ MORE | A code-hosting and project management services provider was forced to shut down operations indefinitely after a hacker broke into its cloud infrastructure and deleted customer data, including most of the company's backups.The customers of CodeSpaces.com, run by a company based in Wayne, New Jersey, called AbleBots, were informed Wednesday that their data might have been permanently lost following the compromise of the company's account on Amazon's Elastic Compute Cloud (EC2).The devastating security breach happened over a span of 12 hours and initially started with a distributed denial-of-service attack followed by an attempt to extort money from the company.To read this article in full or to leave a comment, please click here READ MORE | The amendment to a defense spending bill would end a 'backdoor loophole' allowing warrantless searches READ MORE | : Logicalis Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes. Considering the vast amounts of data being collected by these organizations, the need for real-time business analytics for big data is essential. View Now | A portable hard drive is all kinds of usefulThe SSD in your brand-new Ultrabook is super-fast, but its capacity is exceedingly limited. You could turn to a cloud-storage solution like Box, Dropbox, Google Docs, or Microsoft's OneDrive, but you'll have to pay over and over again for a subscription fee.And if that isn't bad enough, there's the inherent security risk of storing data on servers outside your control. And what happens when you don't have Internet access?To read this article in full or to leave a comment, please click here READ MORE | A proposed US$324.5 million settlement of claims that Silicon Valley companies including Google and Apple suppressed worker wages by agreeing not to hire each others' employees may not be high enough, a judge signaled on Thursday.Judge Lucy Koh said in court that she was worried about whether that amount was fair to the roughly 64,000 technology workers represented in the case. "I have concerns over whether it's sufficient," she said, speaking at the U.S. District Court in San Jose, California.Koh didn't say whether she would approve the settlement. Throughout the course of Thursday's hearing, she questioned not just the amount but the logic behind the settlement as presented by lawyers for both the plaintiffs and the defendants.To read this article in full or to leave a comment, please click here READ MORE | Like the real star of the movie Jaws, another White Shark has taken on celebrity status along with dozens of others tagged with electronic tracking devices - so much so that visitors to a research site are crashing its servers.The celebrity's name is Katherine, a 14-foot, 2,300 pound White Shark (Latin name: carcharodon carcharias) who was tagged off of Cape Cod last August; She was named by researchers from OCEARCH after Katherine Lee Bates, a Cape Cod native and writer of America the Beautiful." OCEARCH OCEARCH is a non-profit, global shark tracking project that uses four different tagging technologies to create a three-dimensional image of a shark's activities. OCEARCH is hoping to develop successful conservation and management strategies by studying shark habits in granular detail.To read this article in full or to leave a comment, please click here READ MORE | A Chinese electronics vendor accused of selling signal jammers to U.S. consumers could end up leading the market in one dubious measure: the largest fine ever imposed by the Federal Communications Commission.The agency wants to fine CTS Technology US$34,912,500 for allegedly marketing 285 models of jammers over more than two years. CTS boldly—and falsely—claimed that some of its jammers were approved by the FCC, according to the agency's enforcement action released Thursday. Conveniently, CTS' product detail pages also include a button to "report suspicious activity."To read this article in full or to leave a comment, please click here READ MORE | Image by Shutterstock/Stephen SauerAs we hurtle towards the start of the 2014 World Cup in Brazil, here's a look at some major tech players, along with their international soccer analogues. Just in case you were trying to decide whom to root for, or something.To read this article in full or to leave a comment, please click here READ MORE | WEBCAST: Network Instruments This webcast discusses five best practices on how to successfully optimize and manage UC, as well as how to gain clear picture of overall performance and quickly troubleshoot when the inevitable issues arise. Learn More | | | | | | | |
No comments:
Post a Comment