High-tech

High-tech
Light

Saturday, June 21, 2014

Need to move to IPv6 highlighted as Microsoft runs out of US address space

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jun 13, 2014 1:54 PM
Subject: Need to move to IPv6 highlighted as Microsoft runs out of US address space
To: <aquarianm@gmail.com>
Cc:

The 12 biggest gaffes by high-tech execs

Mobile phone bill crammers get stuffed with $10 million property forfeiture

Network World Daily News PM
June 13, 2014
Share this email

Need to move to IPv6 highlighted as Microsoft runs out of US address space

Microsoft has been forced to start using its global stock of IPv4 addresses to keep its Azure cloud service afloat in the U.S., highlighting the growing importance of making the shift to IP version 6.Microsoft doesn't mention IPv6 in the blog post, but the use of the protocol would make its address problems disappear. The newer version of the Internet Protocol adds an almost inexhaustible number of addresses thanks to a 128-bit long address field, compared to the 32 bits used by version 4. Since every connected device on the Internet needs an IP address, there will be increasing pressure to move to IPv6 as more non-computer devices come online in the so-called Internet of things.To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. The 12 biggest gaffes by high-tech execs

2. Mobile phone bill crammers get stuffed with $10 million property forfeiture

3. CloudFlare offers free DDoS protection to public interest websites

4. How the Mac is invading the enterprise

5. Three best practices for reducing the risk of SQL injection attacks

6. Privacy win: Cops need a warrant to track your cellphone location

7. P.F. Chang's turns to manual card processing after confirming breach

8. Starbucks' new wireless charging won't work for most devices

9. 13 geeky ways to celebrate Friday the 13th

WEBCAST: Dell SecureWorks

What Can Security Leaders Do to Combat Cyber Threats?

Training employees to understand the risk they create for your organization when they don't consider security in their day-to-day activities is a challenge for most IT and IT security organizations. Changing behavior is always difficult, especially when security awareness programs lack a well-defined approach and dedicated resources. I Learn more

The 12 biggest gaffes by high-tech execs

Tim Cook admires Macs running Windows. Mark Zuckerberg flop-sweats. Marissa Mayer fancies herself a graphic designer. The bigger the names, the bigger the embarrassment when things go awry. READ MORE

Mobile phone bill crammers get stuffed with $10 million property forfeiture

As is often the case in these events, it seems like the penalty should have been more but still, the Federal Trade Commission this week said the operators of massive mobile phone bill cramming operation will surrender $10 million in assets to settle the case. While the $10 million is nothing to sneeze at, the settlement was actually for more than $150 million, but it was partially suspended based on the defendant Lin Miao's "inability to pay the full amount after he turns over nearly all of his and the companies' assets," the FTC said Still, among the assets Miao and the corporate defendants will be required to surrender under the terms of the settlement are:To read this article in full or to leave a comment, please click here READ MORE

CloudFlare offers free DDoS protection to public interest websites

A project launched by CloudFlare, a provider of website performance and security services, allows organizations engaged in news gathering, civil society and political or artistic speech to use the company's distributed denial-of-service (DDoS) protection technology for free.The goal of the project, dubbed Galileo, is to protect freedom of expression on the Web by helping sites with public interest information from being censored through online attacks, according to the San Francisco-based company."If a website participating in Project Galileo comes under attack, CloudFlare will extend full protection to ensure the site stays online -- no matter its location, no matter its content," the Project Galileo website says.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Mobiquity Inc.

BYOP: How Mobile and Social Are Creating New User Personas

The digital world of mobile + social creates new customer segments and behaviors. Companies need to reorient their customer interactions around these segments to drive business impact. Learn More

How the Mac is invading the enterprise

There's been a lot of talk lately about how Apple is finally making big inroads into the enterprise. Most of the hubbub centers around a new study by Dimensional Research for JAMF Software, finding that use of Apple products in the enterprise has doubled in the past three years. The study – called Managing Apple Devices in the Enterprise: A Survey of IT Professionals—is a little fuzzy on calling out the various products, but most of that increase is no doubt due to the rise of the iPhone and iPad. So what about the Macintosh in the enterprise? Is the expiration of Windows XP and the relative unpopularity of Windows 8 finally driving corporate America to the Mac? That would be big news, as the Mac's enterprise penetration has traditionally languished below 10%.To read this article in full or to leave a comment, please click here READ MORE

Three best practices for reducing the risk of SQL injection attacks

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  SQL injection attacks have been around for more than 10 years. Database security experts know they are a serious problem. Now a recently unsealed Second Superseding Indictment against a notorious group of Russian and Ukrainian hackers shows just how damaging this type of attack can be.The indictment provides a long list of companies that have suffered costly data breaches where the root cause has proven to be a SQL injection. According to the indictment:To read this article in full or to leave a comment, please click here READ MORE

Privacy win: Cops need a warrant to track your cellphone location

If you have your cellphone on you, then it constantly pings against the closest tower, whether you are using it or not. Cops and the government regularly use that cellphone location data without a warrant. But in Florida, Georgia, and Alabama, tapping into that location data without a warrant is now illegal."We hold that cell site location information is within the subscriber's reasonable expectation of privacy," a three-judge panel of the 11th U.S. Circuit Court of Appeals in Florida recently decided (pdf). "The obtaining of that data without a warrant is a Fourth Amendment violation."To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Ipswitch, Inc

5 Ways to Ensure Wireless Networks Keep Up With Demand

Discover five ways in which you can keep up with the ever-increasing demands on your wireless networks. Learn More >>

P.F. Chang's turns to manual card processing after confirming breach

P.F. Chang's China Bistro confirmed on Thursday credit and debit card data was stolen from its restaurants, saying it is switching in the meantime to a manual imprinting system to process cards safety.The restaurant chain said in a statement it was alerted on Tuesday by the U.S. Secret Service, which is investigating the cause along with a team of third-party forensic experts.P.F. Chang's said it did not know what cards were affected but that it is working with credit card companies to identify those at risk. It advised customers to monitor their statements for fraudulent activity.Card details believed to have come from P.F. Chang's have appeared on so-called "carding" forums, which are password-protected websites where cybercriminals sell data. The details are being offered for as little as US$18 up to $139 per set, according to Hold Security, a company that specializes in tracking where stolen data is sold.To read this article in full or to leave a comment, please click here READ MORE

Starbucks' new wireless charging won't work for most devices

Starbucks today announced the rollout of wireless charging nationwide, but nearly all mobile handsets and consumer devices currently in use that incorporate wireless charging technology won't be able to use it. READ MORE

13 geeky ways to celebrate Friday the 13th

You're in luck: We've cobbled together a slew of things for the geeky among you to do on Friday the 13th. And if you don't get around to all of them this time around, there's always Friday, June 13 to look forward to. READ MORE

WHITE PAPER: Netscout Systems Inc.

Enabling Unified Service Delivery Management With nGeniusONE

Today's IT organizations manage diverse business services comprising a host of applications running on many server farms within the data center. NetScout provides a highly scalable, unified approach to service delivery management that enables efficient, topdown performance management across complex application, server and network tiers. Learn More

SLIDESHOWS

Network World's 2014 State of the Network survey

Exclusive research from Network World shows that cloud and mobility are gaining in importance.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Chambers to retire this fall?

2. Behind the Great Firewall: What it's really like to log on from China

3. What's the best approach to building next-generation data center networks?

4. 13 geeky ways to celebrate Friday the 13th

5. Amazon AWS continues to use TrueCrypt despite project's demise

6. Hackers use pathetic passwords just like everyone else

7. Docker 101: What it is and why it's important

8. Microsoft developing smartphone batteries that can last a week

9. Biggest, baddest, boldest software backdoors of all time

10. Dell executive says HP's new Machine architecture is 'laughable'

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment