High-tech

High-tech
Light

Monday, June 2, 2014

iPhone 6 rumor rollup for the week ending May 30

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jun 2, 2014 6:42 AM
Subject: iPhone 6 rumor rollup for the week ending May 30
To: <aquarianm@gmail.com>
Cc:

The PSTN Transition to VoIP: Security Must be Addressed

OS X 10.10 may be called OS X Yosemite

Network World Daily News AM
June 02, 2014
Share this email

iPhone 6 rumor rollup for the week ending May 30

With Apple's annual Worldwide Developers Conference 2014 starting Monday June 2, it's déjà vu all over again with iPhone and iOS rumors that have been circulating since the end of WWDC 2013.

READ MORE
 

Issue highlights

1. The PSTN Transition to VoIP: Security Must be Addressed

2. OS X 10.10 may be called OS X Yosemite

3. HP opts for hard drive over SSD in Split X2 budget tablet

4. Security researcher warns cars can be hacked to remotely take control

5. Young kids react hilariously to an old Apple II

6. University researchers test cyber-defense for nation's power grid

7. How to fix Firefox on Windows hanging on exit and not restarting

8. Has Facebook found the silver bullet?

9. INSIDER Tech Pros Need to Learn the Art of Brevity

10. Cisco purchase of CIA-funded company may fuel distrust abroad

11. The Top 11 Cities for Technology Careers

WHITE PAPER: Silver Peak Systems Inc

An ROI Analysis of Virtualized WAN Optimization Software

The Enterprise Strategy Group discusses how data center consolidation, virtualization, and cloud architectures are on the rise; however IT budgets are not increasing. This poses a unique challenge: How do you create a flexible and agile environment without increasing the cost? Learn more >>

The PSTN Transition to VoIP: Security Must be Addressed

READ MORE

OS X 10.10 may be called OS X Yosemite

WWDC is less than 24 hours away, and per usual, banners are slowly but surely being put up at the Moscone Center in San Francisco. Last year, you'll likely recall that Apple finally did away with its cat naming scheme for OS X. In its place, Apple began a new naming scheme devoted to hot spots in California, with OS X 10.9 titled "Mavericks", a famed surfing location in the Golden State. READ MORE

HP opts for hard drive over SSD in Split X2 budget tablet

Tablets are mostly packed with flash storage, but Hewlett-Packard has made an exception and plugged a high-capacity hard drive into its latest Split X2 budget tablet. READ MORE

WEBCAST: Dell SecureWorks

Counterstrategies for Combatting Social Engineering

Social Engineering is proving costlier than ever, especially phishing and spear phishing. With recent breaches, the imperative to counter social engineering effectively takes on a whole new level of urgency. In this webcast, the CISO for Dell SecureWorks discusses the realities of social engineering and what your organization must do to counter it. Learn more

Security researcher warns cars can be hacked to remotely take control

Imagine a job where you go into work, sit down at your desk, boot up your machine and then launch a cyberattack on a car while it is being driven on the other side of the globe. While that might sound like a movie plot, security research engineer Jonathan Brossard says it's possible. READ MORE

Young kids react hilariously to an old Apple II

"It can really do nothing." "It's about as good as a footstool" These were just some of the hilarious reactions that a group of young kids had when shown an old Apple II. It's funny that a computer that was so revolutionary and impactful for its time is now nothing more than a device that elicits a collective "huh?" from younger generations. There's no GUI, no mouse, basically nothing on the old OS... READ MORE

University researchers test cyber-defense for nation's power grid

University researchers are testing whether a distributed computing system could be used to prevent a major blackout during a cyberattack on the nation's power grid. READ MORE

WEBCAST: Network Instruments

5 Best Practices for Optimizing UC Monitoring

This webcast discusses five best practices on how to successfully optimize and manage UC, as well as how to gain clear picture of overall performance and quickly troubleshoot when the inevitable issues arise. Learn More

How to fix Firefox on Windows hanging on exit and not restarting

READ MORE

Has Facebook found the silver bullet?

READ MORE

INSIDER

Tech Pros Need to Learn the Art of Brevity

A communication expert -- author of the new book "Brief" -- says you'll have a bigger impact by saying less. But it requires preparation. READ MORE

Cisco purchase of CIA-funded company may fuel distrust abroad

The CIA's non-profit venture capital arm, In-Q-Tel, has been pumping millions of dollars into technology startups since its launch in 2000, meaning it's not the least bit unusual for major vendors to have acquired and assimilated one of these CIA-nurtured seedlings. READ MORE

The Top 11 Cities for Technology Careers

Is your particular skill-set saturated in your current location? Are you thinking about taking your tech talents to a new locale, possibly one with more IT career opportunities? If so, here are some cities you may want to consider before choosing a new home. READ MORE

WHITE PAPER: Intigua

Systems Management Virtualization

Discover how virtualizing the management layer, by de-coupling agents from the underlying server infrastructure, eliminates the need to install physical agents on servers and makes ongoing management tasks such as provisioning and updating agents as simple as copying a single "virtual agent" file to all required servers. Read more. Learn More

SLIDESHOWS

10 biggest CEO pay raises

Which tech leaders received the most generous pay hikes in 2013?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. How MIT and Caltech's coding breakthrough could accelerate mobile network speeds

2. Encryption canary or insecure app? TrueCrypt warning says use Microsoft's BitLocker

3. 15 hot Kickstarter tech campaigns

4. Gartner: Amazon runs away with IaaS cloud Magic Quadrant; Microsoft catching up

5. 10 things M.I.T. computer scientists have given the world

6. Hacking Windows XP to get security patches is a really bad idea

7. Microsoft baffled by fact one of its products keeps getting better

8. Sprint union with T-Mobile reportedly a done deal

9. Ballmer wins LA Clippers basketball team for $2 billion

10. The Top 11 Cities for Technology Careers

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment