Network World Daily News AM | | U.S. workers protested job losses to foreign workers by displaying American flags in their cubicles | | Issue highlights 1. Coolest house in the world: A Boeing 727 2. iOS 8 MAC randomizing just one part of Apple's new privacy push 3. Gartner Magic Quadrant shifts focus from MDM to Enterprise Mobility Management 4. Stretchable electronics could lead to robotic skin, computerized clothes 5. Nokia shows off foldable, flexible displays 6. Microsoft addresses IE zero-day exploit, 58 others with Patch Tuesday release 7. Food chain, PF Chang's, investigates possible card breach 8. HP assembles 'federation' of Helion cloud providers 9. Evernote hit by denial of service attack 10. HP has lots to Discover | ARTICLE: SAS Click to continue | Big old jet airliner now large nerdy home READ MORE | The new MAC address randomization feature in iOS 8 is just one of a battery of new privacy features Apple is introducing. It's part of an Apple push to make mobile app developers more aware of enduser privacy and to give them iOS tools to make privacy-related app actions clearer, so that users can allow them or not. A young Swiss security researcher, Frederic Jacobs (@FredericJacobs) apparently was the first to tweet about one of the new privacy features: a change in iOS that lets the device's radio use, in effect, fake MAC addresses when scanning for nearby Wi-Fi networks. When the user decides to associate with a specific network, the device uses its true MAC address.To read this article in full or to leave a comment, please click here READ MORE | Gartner has overhauled its annual mobility management Magic Quadrant report to focus on what's known as "enterprise mobility management" (EMM) rather than the previous "mobile device management," (MDM) a distinction it says is needed due to fast-moving market forces. Gartner's new report for EMM, which sizes up the vendors, is making a few of them upset. According to Gartner, EMM has evolved out of the older notion of MDM, and is distinguished by three basic functional roles for mobile content management and security. By Gartner's definition, EMM content management includes a "secure container" that lets the user store content securely on a mobile device; "content push" that allows for push-based delivery; and "content access" as a connection to a back-end repository where users can pull content to their devices. Gartner's new "Magic Quadrant for Enterprise Mobility Management Suites" report describes all this and puts a few fortunate vendors in the much-coveted "leaders," "visionaries" and "challengers" categories, consigning others as "niche players."To read this article in full or to leave a comment, please click here READ MORE | WEBCAST: VMware | IBM Virtualization technology is now expanding beyond the server compute elements to encompass networking and storage aspects as well. Learn More | Researchers at Purdue University have made an advance in stretchable electronics that could lead to computerized clothing and robots with humanlike skin that can "feel."The issue has been how to create stretchable electronics, but the Purdue scientists have found a simple answer -- a sewing machine.The same sewing machine that you use to make your child's Halloween costume or to stitch together a pair of curtains is the same machine that can make what scientists call ultra-stretchable interconnects out of conventional wire.12 most powerful Internet of Things companies Researchers at Purdue University have used a standard sewing machine to create stretchable electronics that could lead to more advanced robotic skin, wearable electronics and implantable medical systems. (Image: Babak Ziaie/Purdue)To read this article in full or to leave a comment, please click here READ MORE | Unfortunately for Microsoft, this branch of Nokia isn't heading to Redmond. READ MORE | Microsoft's June 2014 Patch Tuesday addresses 59 vulnerabilities total, including a zero-day exploit in Internet Explorer that it has known about for months. READ MORE | WHITE PAPER: Network Instruments Big Data projects slam network performance. This paper offer survival tips to prepare your network before the Big Data projects hit, not after. Learn how to monitor and manage network performance for bandwidth, consistent low latency, scalable storage, processing power and security. Learn More | A large batch of stolen credit card numbers for sale on an underground forum may have come from a breach at P.F. Chang's China Bistro, a restaurant chain that said on Tuesday it is investigating.Those selling the stolen data are claiming all of the card numbers are still valid, meaning the data is fairly fresh and that banks haven't yet canceled the accounts, said Alex Holden, CTO of Hold Security, a Wisconsin-based consultancy that monitors secret forums where stolen data is sold.The company is investigating and law enforcement has been contacted, said a P.F. Chang's representative, Anne Deanovic, via email. "We will provide an update as soon as we have additional information," she wrote.To read this article in full or to leave a comment, please click here READ MORE | Hoping to get a hand from partners, Hewlett-Packard is assembling a network of service providers that will offer hosted services based on the company's Helion software.The HP Helion Network will provide organizations with a set of infrastructure services for hosting servers or applications.The network will differ from others that include partner services, such as Microsoft Azure and VMware's vCloud, in that the HP partners will join a governing body that has a say in how Helion and related software are developed, according to Steven Dietch, HP's vice president of cloud marketing.+ ALSO ON NETWORK WORLD HP has lots to Discover +To read this article in full or to leave a comment, please click here READ MORE | Evernote was resuming operations early Wednesday following a denial of service attack.The archiving software and services company said its online services had been unavailable and that users may experience problems accessing their accounts."We're actively working to neutralize a denial of service attack," the company wrote on Twitter early Wednesday.DOS attacks bombard a server with traffic, which can slow it down or cause it go offline altogether.Launched in 2008, Evernote has grown to over 100 million users, a milestone it announced last month. The incident marked the first successful DOS attack on the company in years.To read this article in full or to leave a comment, please click here READ MORE | Image by HPHP is launching a raft of new products at its annual Discover conference this week that explore the mysteries of unchartered IT territory in network, server, storage and application areas. Image by HPTo read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: LogMeIn Businesses today are experiencing landmark shifts. The emergence of mobile, social, and virtual communications is creating more distributed and real-time work environments. User demand for collaborative tools is growing exponentially. The adoption of Web conferencing is triggered by three key drivers. Read this Frost&Sullivan report to learn more. Read Now | | | | | | | |
No comments:
Post a Comment