High-tech

High-tech
Light

Saturday, June 21, 2014

Amazon enters smartphone market with Fire phone

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jun 18, 2014 2:05 PM
Subject: Amazon enters smartphone market with Fire phone
To: <aquarianm@gmail.com>
Cc:


Multitasking: An equal opportunity distraction

Maliciously crafted files can disable Microsoft's antimalware products

Network World Daily News PM
June 18, 2014
Share this email

Amazon enters smartphone market with Fire phone

Amazon unveiled its highly anticipated entry into the smartphone market Wednesday, a handset called "Fire."The phone, announced by CEO Jeff Bezos at an event in Seattle, has a 4.7-inch screen, a 13-megapixel camera with optical image stabilization and a quad-core processor.Amazon's entry into the crowded smartphone space could increase competition if consumers buy into its vision. Unlike other phone makers, Amazon has a compelling service to offer alongside its hardware in the shape of the Amazon Prime music, ebook and video service.However, success is not certain. Facebook attempted to get in on the market in early 2013 with a customized handset from Taiwan's HTC called the HTC First. The phone was a flop and just a few months later carrier AT&T was offering it at a discount.To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. Multitasking: An equal opportunity distraction

2. Maliciously crafted files can disable Microsoft's antimalware products

3. BlackBerry makes Amazon app store part of rescue plan

4. How the 'Internet of Thing' will become the Internet of Things

5. Avoiding the perils of 'rogue analytics' with a new approach to data blending

6. Dear FCC: Please don't let me watch football

7. Acer names new chairman as business struggles

8. 7 tips for older programmers joining startups

9. Will full encryption sideline Google's targeted ads?

10. Three strategies for the new era of enterprise cybersecurity

11. Europe's top court to review personal data exchange between EU and US

12. Wireless data traffic more than doubled in US in 2013

13. Amazon CTO says business unaffected by Snowden revelations

RESOURCE COMPLIMENTS OF: LeaseWeb

Enjoy full control of your own Private Cloud environment

Get into the driver's seat and create your own virtualized infrastructure on our Private Cloud. Dedicated cores for every instance. Available for a flat fee. Learn more

Multitasking: An equal opportunity distraction

Even the strongest students can be no match for the distractions of multitasking, according to new research from Michigan State University. Researchers, funded by the National Science Foundation, took a look at the impact of fiddling with smartphones and laptops among 500 student during lectures and found that non-academic Internet use (responding to email, checking Facebook updates, etc.)  hurts classroom content retention. To read this article in full or to leave a comment, please click here READ MORE

Maliciously crafted files can disable Microsoft's antimalware products

A vulnerability allows attackers to disable Microsoft's antimalware products by sending specifically crafted files to users via websites, email or instant messaging applications.The vulnerability is located in the Microsoft Malware Protection Engine, which sits at the core of many Microsoft security products for desktops and servers including Microsoft Forefront Client Security, Microsoft System Center 2012 Endpoint Protection, the Microsoft Malicious Software Removal Tool, Microsoft Security Essentials, Windows Intune Endpoint Protection and Windows Defender, which comes pre-installed in Windows Vista and later.Microsoft fixed the vulnerability in Microsoft Malware Protection Engine 1.1.10701.0 released Tuesday. For home users, the new version should typically download and install automatically within 48 hours, but administrators in enterprise environments should make sure that their update management software is configured to approve the engine updates.To read this article in full or to leave a comment, please click here READ MORE

BlackBerry makes Amazon app store part of rescue plan

The BlackBerry 10 OS will soon have Amazon's Android app store built-in, in a bid to increase the number of apps available on the smartphone and allow BlackBerry to focus on enterprise software as it tries to stay afloat.The Amazon Appstore will be integrated in version 10.3 of BlackBerry's OS, which is scheduled to arrive this fall, according to the company. That provides access to apps such as Groupon, Netflix, Pinterest, Candy Crush Saga and Minecraft, Blackberry said on Wednesday.When BlackBerry 10 was launched back in the beginning of 2013, one of the main goals was to attract consumer users, not just the business users that had been the company's strong suit. However, smartphones like the Z10 never caught on with the mass market. One of the issues that put a damper on sales was a lack of apps, which BlackBerry is now hoping to address with the Amazon deal.To read this article in full or to leave a comment, please click here READ MORE

How the 'Internet of Thing' will become the Internet of Things

Right now, most of the IoT is limited to connecting a singular device to the cloud and the cloud to an app to control it. READ MORE

WHITE PAPER: Radware

Assuring Web Performance Levels With Next Generation ADCs

Next generation application delivery controllers (ADCs) accelerate applications, monitor end-to-end performance in real time, ensure their security and dedicate system resources to them to ensure SLAs. Learn More

Avoiding the perils of 'rogue analytics' with a new approach to data blending

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach. A plethora of technological developments make it easier than ever to gather information from new kinds of data sources and machines, including websites, applications, servers, networks, sensors, mobile devices and social networks. But the real value of big data is not the data itself, but rather the whole new world of insights that emerge when combining data from an assortment of both new and established sources. Organizations making decisions based purely on established relational data sources will likely lose marketshare to companies that can capitalize on all their available data sources. Put another way, it's the ability to blend data from operational business applications with data from social networks, sensors and weblogs that really opens up competitive advantage.To read this article in full or to leave a comment, please click here READ MORE

Dear FCC: Please don't let me watch football

I can understand why millionaire NFL team owners would lobby the FCC in an effort to dissuade that regulatory body from ditching its so-called "TV blackout rule." After all, the rule requires that 85% of an NFL team's ridiculously priced "non-premium" seats be sold or a game cannot be shown on TV (free or otherwise).Who wouldn't want to protect such a sweet racket?What I don't understand is how these millionaire NFL team owners could envision me – a lifelong fan and former season-ticket holder – getting behind this effort to convince the FCC to continue playing a role in stopping me from watching football.To read this article in full or to leave a comment, please click here READ MORE

Acer names new chairman as business struggles

Acer named one of its co-founders, George Huang, to the post of company chairman as the Taiwanese PC maker battles to become a force in mobile devices and software.On Wednesday, Acer's board of directors elected Huang to the position as previous chairman and co-founder Stan Shih stepped down according to plan. Both Shih and Huang returned to Acer in November to lead a corporate restructuring of the struggling PC maker.During that time, Huang supervised the company's reform plans and was involved in hiring its current CEO, Jason Chen, in December. He also helped develop Acer's new strategy, which has centered more on mobile devices, and bringing private cloud services to consumers.To read this article in full or to leave a comment, please click here READ MORE

7 tips for older programmers joining startups

"Image by flickr/Tim GreenIn the grand scheme of things, 40-something isn't considered old. But anything beyond 20-something is often considered old in that stereotypical bastion of fresh-out-of-school youth - the startup. Joining a startup can give seasoned programmers a new jolt of energy and excitement, but can also cause them concern over trying to bridge the generation gap with their new, younger colleagues. A number of programmers, of all ages, recently shared advice on Slashdot for older developers considering joining startups. Here are 7 tips they gave for you more seasoned developers to keep in mind when joining a startup.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: VCE

Business Benefits of Running SAP on Converged Infrastructure

Forrester Consulting conducted a Total Economic Impact™ study and examined the potential return on investment (ROI) enterprises may realize by replatforming SAP on factory-integrated systems. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact on their organization. Learn more

Will full encryption sideline Google's targeted ads?

Mining personal data to deliver targeted ads is the lifeblood of Google's business—and of many other online firms. But what if that data dries up at the source?Google released an early version of a new tool recently that will provide full "end-to-end" encryption for email. It's a super-strong cloaking technology that scrambles messages before they leave their browser and keeps them that way until they're decoded by the recipient.The technology makes use of a private key-string that only the user has access to, meaning even the email provider can't read the contents of messages. Google says anyone will be able to use the tool with their existing web-based email service.To read this article in full or to leave a comment, please click here READ MORE

Three strategies for the new era of enterprise cybersecurity

The pace of change for Information Technology is challenging established notions of "What is IT?" and "What is Information Security in the modern age?" For one example, the "new" data center technologies such as virtualization, Software-Defined Networking (SDN), service-oriented delivery models, and cloud computing have radically changed the typical IT infrastructure from a defined set of assets owned and controlled by the organization to a constantly fluctuating roster of resources that can come and go from IT department visibility and control.[Enterprise defenses lag despite rising cybersecurity awareness] To read this article in full or to leave a comment, please click here READ MORE

Europe's top court to review personal data exchange between EU and US

The Irish High Court has referred to a 14-year-old agreement governing the exchange of personal data between the European Union and the U.S. to the EU's top court.The referral, on Wednesday, came in a case over whether the Irish Data Protection Commissioner was right to refuse to investigate Facebook's alleged involvement with the U.S. government surveillance program Prism.Europe-v-Facebook, an Austrian group representing some Facebook users, filed a complaint with the Irish DPC over Facebook's data exportation regime in June last year. It argued that when Facebook collects user data and exports it to the U.S. it is giving the U.S. National Security Agency (NSA) the opportunity to use the data for massive surveillance of personal information without probable cause—and by doing so, Facebook is violating European laws.To read this article in full or to leave a comment, please click here READ MORE

Wireless data traffic more than doubled in US in 2013

The total amount of data handled by wireless carriers in the U.S. more than doubled in 2013, an increase driven in large part by video traffic.U.S. carriers saw 3.2 exabytes of data traffic run across their networks, the CTIA said in its annual report on the U.S. wireless industry. An exabyte is 10x18 bytes or, put another way, a billion gigabytes.The figure represents a 120 percent increase from the 1.5 exabytes carried in all of 2012, the group said on Tuesday. The CTIA is the Washington, D.C, -based lobbying group that represents the industry and it conducted the survey among its members. The data refers to traffic carried over licensed spectrum.To read this article in full or to leave a comment, please click here READ MORE

Amazon CTO says business unaffected by Snowden revelations

Business overseas is as strong as ever, Werner Vogels says READ MORE

WHITE PAPER: APC by Schneider Electric

Economizer Modes of Data Center Cooling Systems

This paper provides terminology and definitions for the various types of economizer modes and compares their performance against key data center attributes. Learn more!

SLIDESHOWS

10 reasons why open source is eating the world

Here are 10 reasons for the surging popularity of open source software.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco buys its way into AT&T SDN

2. Microsoft's most famous couple, Bill and Melinda Gates: Stanford commencement speech transcript

3. Why the Tail-F acquisition is a big win for Cisco

4. Comcast's latest bad idea turns your Wi-Fi into everybody's Wi-Fi

5. How Google Glass set wearable computing back 10 years

6. Open Networking: The Whale that swallowed SDN

7. The best portable hard drives: Our top picks are fast, light and spacious

8. IRS computer crash eats email evidence: Conspiracy or 'worst IT department ever'?

9. "H4CKERS WANTED" report: NSA nothing trouble filling cybersecurity jobs

10. 10 reasons why open source is eating the world

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment