Issue highlights 1. VMware: We're aiming to be a top 3 cloud provider 2. Microsoft's Smith calls for new privacy push in Congress 3. Apple planning to release 12-inch MacBook Air later this year 4. Intel updates age-old webcam technology 5. End users must be part of cybersecurity solutions 6. Police test smartphones over cellular for undercover use during Boston Marathon 7. Hungry ants knock out FiOS service … again 8. INSIDER CIOs Will Find That the Most Valuable Data Comes From Outside (free reg) 9. Why you should still worry about Heartbleed 10. A Wakeup Call for the Cloud 11. OpenStack chair: Linux at the cutting edge of the cloud 12. New Havex malware variants target industrial control system and SCADA users 13. Apple planning to release 12-inch MacBook Air later this year |
RESOURCE COMPLIMENTS OF: Alcatel-Lucent Nuage Networks Software Defined Networking (SDN) solution lays the foundation for an open and dynamically controlled datacenter network fabric to accelerate application programmability, facilitate unconstrained mobility, and maximize compute efficiency for cloud service providers, webscale operators & leading tech enterprises across the globe. The cloud has changed the way we use networks every day. Learn about Software Defined Networking (SDN) and how Nuage Networks removes the network constraints and unleashes the power of the cloud. Watch now. |
In Gartner's recent Magic Quadrant VMware fell far behind in the market, but executive say it's early yet. READ MORE |
Lamwakers need to address consumer privacy for data held by companies and for data gathered by spy agencies, he says READ MORE |
According to a recent report in Digitimes, Apple is prepping plans to manufacture a 12-inch MacBook Air during the third quarter of 2014. As it stands now, the MacBook Air comes in 11 and 13-inch flavors so it remains unclear if Apple's svelte notebook will be available in three distinct sizes or if one of the aforementioned form factors will be shown the door. The sources pointed out that Apple is releasing a 12-inch MacBook Air because its 11-inch model has a screen size similar to its iPad series products and iPad's increasing sales are impacting MacBook demand and therefore the company is looking to establish a clear boundary between the two product lines.To read this article in full or to leave a comment, please click here READ MORE |
Called RealSense, the new, 3D camera can understand facial expressions and gestures. Follow reporter Nick Barber on Twitter @nickjb READ MORE |
WHITE PAPER: Apperian Download this guide and learn how to manage the secure deployment of enterprise mobile apps and data, while still encouraging the levels of employee adoption needed to drive the productivity and ROI gains that are possible. Learn More |
As the old infosec adage goes, "people are the weakest link in the cybersecurity chain." Clearly, enterprise security professionals agree with this statement. In a recent ESG research survey, enterprise security professionals were asked to identify the factors most responsible for successful malware attacks. It turns out that 58% point to "a lack of user knowledge about cybersecurity risks" – the most popular answer by far (note: I am an employee of ESG).This data is not unusual; security professionals often bemoan end-user cybersecurity behavior. They don't pay attention in training classes, they click on suspect links, they are easily fooled by social engineering tactics, etc.To read this article in full or to leave a comment, please click here READ MORE |
During April's Boston Marathon, police in Brookline, Mass., piloted a wireless system that let undercover police and supervisors to use ordinary iPhones and Android devices to communicate with rugged Land Mobile Radios over LTE and other commercial cellular networks.Brookline is adjacent to Boston and includes a portion of the marathon along Beacon Street near the end of the 26.2 mile course.After the 2013 bombings near the marathon finish line, security for 2014 was "incredibly high, like I've never seen before," said Officer Scott Wilder, director of technology and communications for the 145-member Brookline Police Department.To read this article in full or to leave a comment, please click here READ MORE |
Everyone keeps asking if the ants actually ate their way through the fiber optic cable and I do not know the answer. What is certain is that they chewed through the outer casing and caused enough damage to knock out TV, phone and Internet service to my house: the Verizon triple no-play.I also know that it takes about five years for ants to accomplish such a task, because the same thing happened in June 2009.The box housing the cable splice that brings FiOS into my home is located across the street about five feet up on a utility pole. When the Verizon technician opened the box it was filled with hundreds of ants (I had actually forgotten about the earlier ant episode, but he clearly expected them to be there). And when he shooed away enough of the critters to get a look inside, the red glow of a stripped fiber optic cable was clearly visible.To read this article in full or to leave a comment, please click here READ MORE |
Companies are awash in data. CIOs have done a great job of building a hardware and software infrastructure that produces data on just about every part of operations.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE |
WEBCAST: Network Instruments This webcast discusses five best practices on how to successfully optimize and manage UC, as well as how to gain clear picture of overall performance and quickly troubleshoot when the inevitable issues arise. Learn More |
Patching of Internet-connected systems that contain the Heartbleed bug has slowed to a snail's pace, and security experts are advising companies to take extra precautions to avoid a security breach.Errata Security scanned the Internet late Friday and found roughly 309,000 sites with the bug, which is in the secure sockets layer (SSL) library of the OpenSSL Project. That number was only about 9,000 less than what Errata found a month ago.When Hearbleed was discovered in April, Errata found more than 600,000 vulnerable systems on port 443, which is used by default for SSL-secured communications between clients and servers.To read this article in full or to leave a comment, please click here READ MORE |
Every so often something happens that should make people stop and think. That may have just happened in the cloud.Code Spaces is a company that hosted application development work in Amazon Web Service's cloud on behalf of its customers. On June 17 the company experienced a DDOS attack where traffic floods the company's servers. Multiple media outlets have reported that when company officials contacted the perpetrator, a random was demanded. When the money was not paid, the bad guys hacked into the Cloud Spaces administrative console for Code Space's AWS account and deleted what appears to be the entirety of the company's files. Code Spaces has since been shut down.To read this article in full or to leave a comment, please click here READ MORE |
The cloud-dominated world of modern IT is the perfect breeding ground for the spread of Linux in particular and open-source software in general, according to the man responsible for guiding one of the most important open-source projects.SUSE director of industry initiatives and open-source Alan Clark is also the chair of the OpenStack Foundation. Speaking Monday at the Linux Enterprise End-User Summit in New York, he said that the efficiencies in money and time provided by an open development model are proving to be potent draws for new adopters.+ALSO ON NETWORK WORLD: The future of networking is a NOS on your choice of bare metal, says Cumulus Networks | Google I/O 2014: What to expect as Google increases its focus on 'connected' tech +To read this article in full or to leave a comment, please click here READ MORE |
A malware threat previously used in attacks against energy sector companies is now being aimed at organizations that use or develop industrial applications and machines.During the spring, attackers began distributing new versions of a remote access Trojan (RAT) program called Havex by hacking into the websites of industrial control system (ICS) manufacturers and poisoning their legitimate software downloads, researchers from security firm F-Secure said Monday in a blog post."Our research uncovered three software vendor sites that were compromised in this manner," the F-Secure researchers said. "The software installers available on the sites were trojanized to include the Havex RAT. We suspect more similar cases exist but have not been identified yet."To read this article in full or to leave a comment, please click here READ MORE |
According to a recent report in Digitimes, Apple is prepping plans to manufacture a 12-inch MacBook Air during the third quarter of 2014. As it stands now, the MacBook Air comes in 11 and 13-inch flavors so it remains unclear if Apple's svelte notebook will be available in three distinct sizes or if one of the aforementioned form factors will be shown the door. The sources pointed out that Apple is releasing a 12-inch MacBook Air because its 11-inch model has a screen size similar to its iPad series products and iPad's increasing sales are impacting MacBook demand and therefore the company is looking to establish a clear boundary between the two product lines.To read this article in full or to leave a comment, please click here READ MORE |
WEBCAST: Kemp Technologies The Growth of Hybrid Cloud is effecting companies of all sizes. In this webinar you will learn: How to deploy Hybrid Cloud Applications in Hours Not Weeks, Enable Security & High Availability for Apps Migrated to the Hybrid Cloud. Learn More |
|
No comments:
Post a Comment