Network World Daily News PM | | Level 3 Communication is buying TW Telecom for approximately $5.7 billion [b] in an effort to boost its metropolitan footprint of fixed networks. The two operators are highly complementary, according to Level 3. The combination of the two companies creates a stronger, more nimble competitor to the incumbents, it said on Monday. | | Issue highlights 1. New products of the week 06.16.14 2. Microsoft launches a service to help predict the future 3. Hacked Synology NAS systems used in high-profit cryptocurrency mining operation 4. Your Royal PiNess: Raspberry Pi wins big honors 5. Android's new permissions: Unappreciated by many, disparaged by few 6. Leaked iPhone 6 photos emerge 7. Microsoft's Cortana may be headed to world domination 8. SanDisk to buy enterprise flash storage specialist Fusion-io for $1.1 billion 9. Extreme cybersecurity ineptitude: Stratfor was a hack waiting to happen 10. Comcast's latest bad idea turns your Wi-Fi into everybody's Wi-Fi 11. Microsoft strips some Windows 7 users of IE11 patch privileges 12. Spamhaus readies new antimalware data feeds | WHITE PAPER: Dell Software Learn why anti-evasion is a critical component for your intrusion prevention system. Sophisticated exploits that utilize advanced evasion techniques are all too common. Decoding and normalizing traffic across the network to detect and combat these attacks is critical for your network security plan. Learn more | Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow. Product Name: SafeNet High Speed Encryption Solutions, CN Series Ethernet EncryptorsTo read this article in full or to leave a comment, please click here READ MORE | Microsoft will soon offer a service aimed at making machine-learning technology more widely usable."We want to bring machine learning to many more people," Eron Kelly, Microsoft corporate vice president and director SQL Server marketing, said of Microsoft Azure Machine Learning, due to be launched in beta form in July. "The line of business owners and the marketing teams really want to use data to get ahead, but data volumes are getting so large that it is difficult for businesses to sift through it all," Kelly said.An offshoot of artificial intelligence, machine learning uses algorithms so that computers recognize behavior in large and streaming data sets. It can be superior to traditional forms of business intelligence in that it offers a way to predict future events and behavior based on past actions.To read this article in full or to leave a comment, please click here READ MORE | A hacker exploited publicly known vulnerabilities to install malware on network-attached storage systems manufactured by Synology and used their computing power to generate Dogecoins, a type of cryptocurrency.The operation took place during the first months of the year and is likely the most profitable of its kind to date, earning the attacker over US$600,000 according to a recent analysis by researchers from Dell SecureWorks.Using CPUs and GPUs to solve cryptographic problems as part of cryptocurrency systems is an activity referred to as mining. Those who perform it—typically using their own systems—are automatically rewarded by the system with units or subunits of that respective currency.To read this article in full or to leave a comment, please click here READ MORE | Early backer knighted, team visits palace, meets Queen. READ MORE | WHITE PAPER: LogMeIn Businesses today are experiencing landmark shifts. The emergence of mobile, social, and virtual communications is creating more distributed and real-time work environments. User demand for collaborative tools is growing exponentially. The adoption of Web conferencing is triggered by three key drivers. Read this Frost&Sullivan report to learn more. Read Now | Android users worried about the new Android permissions aren't the users this update was intended to help. The minority of Android enthusiasts know enough to protect themselves against the perceived flaws. The controversy that surrounds this update is clearly an example of what Voltaire referred to when he said "perfect is the enemy of good" two and a half centuries ago.The typical Android user is better off, though. The new Android permissions present app updates more clearly for the everyday Android user. The granular permissions presented by previous releases have now been grouped into families of related permissions to streamline the approvals of permissions during updates.To read this article in full or to leave a comment, please click here READ MORE | Tim Cook not too long ago promised to double down on secrecy, and true to form, Apple during WWDC this year had no shortage of surprises that pleasantly caught developers and fans of the company off guard. But software developed within the secretive confines of 1 Infinite Loop is markedly easier to keep under wraps than hardware, which, by its very nature, is often available to partners months before mass production even begins. Such is the case with Apple's upcoming release of new iPhones. Yep, that's iPhones plural, because all signs are pointing towards Apple releasing two larger-screened iPhone models this year, one with a 4.7-inch screen and another with a 5.5-inch screen.To read this article in full or to leave a comment, please click here READ MORE | The company confirms it is coming to the Windows desktop, and possibly iOS and Android. READ MORE | SanDisk is looking to shore up its position in the enterprise flash storage market by purchasing Fusion-io for US$1.1 billion in an all-cash deal.The acquisition, which was announced Monday, is expected to close in SanDisk's third fiscal quarter."Fusion-io will accelerate our efforts to enable the flash-transformed data center, helping companies better manage increasingly heavy data workloads at a lower total cost of ownership," SanDisk CEO Sanjay Mehrotra said in a statement.+ ALSO ON NETWORK WORLD Top tech M&As of 2014 +To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: HP Turkey's Finansbank needed a way to spot potential fraud among millions of electronic transactions. But implementing a commercial fraud management application would take 18 months. Based on their experience using HP ArcSight Enterprise Security Manager (ESM) for IT security operations, they decided to adapt HP ArcSight ESM for fraud management. Learn More | A new Verizon report details exactly how vulnerable Stratfor during its infamous attack in 2011. READ MORE | Some ideas are just plain bad and when you hear about one of these you have to wonder how and why those responsible ever thought it was good in the first place…which brings me to Comcast's latest "good idea"which transcends bad and moves into "sucks."Before we slice and dice the badness, let me first outline what Comcast plans to do: The company plans to create what will become the biggest Wi-Fi network in the country by transforming residential Xfinity gateways into public Wi-Fi access points (public, that is, if you're an Xfinity customer).Now that may sound good in principle, but if you're a customer and up to five other passing customers can glom onto your network, there's potentially going to be a bandwidth loss as far as you're concerned. According to the Houston ChronicleTo read this article in full or to leave a comment, please click here READ MORE | Microsoft has quietly stopped serving security updates to Internet Explorer 11 (IE11) on consumer and small business Windows 7 PCs unless the customer has successfully applied an April update for the browser.The requirement and associated patch stoppage were similar to those Microsoft mandated for Windows 8.1 when it told customers they had to migrate to Windows 8.1 Update by June 10 or lose their patch privileges. The Windows 7 requirement, however, affected only IE11, Microsoft's newest browser, not the operating system.To read this article in full or to leave a comment, please click here READ MORE | The Spamhaus Project will soon publish two new data feeds intended to prevent people from being lured to malware-infected websites and domains.The organization, which has long been in the forefront of efforts to stop junk mail, said the two data sets are part of its Domain Block List (DBL), a database updated constantly with spammy domains appearing in emails. The DBL data feed can be incorporated into mail server software that scans messages for the presence of those blacklisted domains.MORE ON NETWORK WORLD: Why Google Apps is winning IT hearts and minds The new data sets will make the DBL more effective and versatile while allowing for a near-zero false positive rate, Spamhaus wrote on its blog on Sunday.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: Infortrend Did you know that Infortrend's EonStor DS systems are ideal solutions for storage infrastructure consolidation, high-availability clusters, server virtualization and green datacenters? And now, they're 16Gb Fibre Channel-ready. Learn more >> | | | | | | | |
No comments:
Post a Comment