High-tech

High-tech
Light

Saturday, June 21, 2014

This IT worker had to train an H-1B replacement

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jun 11, 2014 8:14 AM
Subject: This IT worker had to train an H-1B replacement
To: <aquarianm@gmail.com>
Cc:

Coolest house in the world: A Boeing 727

iOS 8 MAC randomizing just one part of Apple's new privacy push

Network World Daily News AM
June 11, 2014
Share this email

This IT worker had to train an H-1B replacement

U.S. workers protested job losses to foreign workers by displaying American flags in their cubicles

READ MORE
 

Issue highlights

1. Coolest house in the world: A Boeing 727

2. iOS 8 MAC randomizing just one part of Apple's new privacy push

3. Gartner Magic Quadrant shifts focus from MDM to Enterprise Mobility Management

4. Stretchable electronics could lead to robotic skin, computerized clothes

5. Nokia shows off foldable, flexible displays

6. Microsoft addresses IE zero-day exploit, 58 others with Patch Tuesday release

7. Food chain, PF Chang's, investigates possible card breach

8. HP assembles 'federation' of Helion cloud providers

9. Evernote hit by denial of service attack

10. HP has lots to Discover

ARTICLE: SAS

Click to continue

Coolest house in the world: A Boeing 727

Big old jet airliner now large nerdy home READ MORE

iOS 8 MAC randomizing just one part of Apple's new privacy push

The new MAC address randomization feature in iOS 8 is just one of a battery of new privacy features Apple is introducing. It's part of an Apple push to make mobile app developers more aware of enduser privacy and to give them iOS tools to make privacy-related app actions clearer, so that users can allow them or not. A young Swiss security researcher, Frederic Jacobs (@FredericJacobs) apparently was the first to tweet about one of the new privacy features: a change in iOS that lets the device's radio use, in effect, fake MAC addresses when scanning for nearby Wi-Fi networks. When the user decides to associate with a specific network, the device uses its true MAC address.To read this article in full or to leave a comment, please click here READ MORE

Gartner Magic Quadrant shifts focus from MDM to Enterprise Mobility Management

Gartner has overhauled its annual mobility management Magic Quadrant report to focus on what's known as "enterprise mobility management" (EMM) rather than the previous "mobile device management," (MDM) a distinction it says is needed due to fast-moving market forces. Gartner's new report for EMM, which sizes up the vendors, is making a few of them upset. According to Gartner, EMM has evolved out of the older notion of MDM, and is distinguished by three basic functional roles for mobile content management and security. By Gartner's definition, EMM content management includes a "secure container" that lets the user store content securely on a mobile device; "content push" that allows for push-based delivery; and "content access" as a connection to a back-end repository where users can pull content to their devices. Gartner's new "Magic Quadrant for Enterprise Mobility Management Suites" report describes all this and puts a few fortunate vendors in the much-coveted "leaders," "visionaries" and "challengers" categories, consigning others as "niche players."To read this article in full or to leave a comment, please click here READ MORE

WEBCAST: VMware | IBM

Enhance Your Virtualization Infrastructure

Virtualization technology is now expanding beyond the server compute elements to encompass networking and storage aspects as well. Learn More

Stretchable electronics could lead to robotic skin, computerized clothes

Researchers at Purdue University have made an advance in stretchable electronics that could lead to computerized clothing and robots with humanlike skin that can "feel."The issue has been how to create stretchable electronics, but the Purdue scientists have found a simple answer -- a sewing machine.The same sewing machine that you use to make your child's Halloween costume or to stitch together a pair of curtains is the same machine that can make what scientists call ultra-stretchable interconnects out of conventional wire.12 most powerful Internet of Things companies Researchers at Purdue University have used a standard sewing machine to create stretchable electronics that could lead to more advanced robotic skin, wearable electronics and implantable medical systems. (Image: Babak Ziaie/Purdue)To read this article in full or to leave a comment, please click here READ MORE

Nokia shows off foldable, flexible displays

Unfortunately for Microsoft, this branch of Nokia isn't heading to Redmond. READ MORE

Microsoft addresses IE zero-day exploit, 58 others with Patch Tuesday release

Microsoft's June 2014 Patch Tuesday addresses 59 vulnerabilities total, including a zero-day exploit in Internet Explorer that it has known about for months. READ MORE

WHITE PAPER: Network Instruments

4 Key Survival Tips for Planning Your Next Big Data Project

Big Data projects slam network performance. This paper offer survival tips to prepare your network before the Big Data projects hit, not after. Learn how to monitor and manage network performance for bandwidth, consistent low latency, scalable storage, processing power and security. Learn More

Food chain, PF Chang's, investigates possible card breach

A large batch of stolen credit card numbers for sale on an underground forum may have come from a breach at P.F. Chang's China Bistro, a restaurant chain that said on Tuesday it is investigating.Those selling the stolen data are claiming all of the card numbers are still valid, meaning the data is fairly fresh and that banks haven't yet canceled the accounts, said Alex Holden, CTO of Hold Security, a Wisconsin-based consultancy that monitors secret forums where stolen data is sold.The company is investigating and law enforcement has been contacted, said a P.F. Chang's representative, Anne Deanovic, via email. "We will provide an update as soon as we have additional information," she wrote.To read this article in full or to leave a comment, please click here READ MORE

HP assembles 'federation' of Helion cloud providers

Hoping to get a hand from partners, Hewlett-Packard is assembling a network of service providers that will offer hosted services based on the company's Helion software.The HP Helion Network will provide organizations with a set of infrastructure services for hosting servers or applications.The network will differ from others that include partner services, such as Microsoft Azure and VMware's vCloud, in that the HP partners will join a governing body that has a say in how Helion and related software are developed, according to Steven Dietch, HP's vice president of cloud marketing.+ ALSO ON NETWORK WORLD HP has lots to Discover +To read this article in full or to leave a comment, please click here READ MORE

Evernote hit by denial of service attack

Evernote was resuming operations early Wednesday following a denial of service attack.The archiving software and services company said its online services had been unavailable and that users may experience problems accessing their accounts."We're actively working to neutralize a denial of service attack," the company wrote on Twitter early Wednesday.DOS attacks bombard a server with traffic, which can slow it down or cause it go offline altogether.Launched in 2008, Evernote has grown to over 100 million users, a milestone it announced last month. The incident marked the first successful DOS attack on the company in years.To read this article in full or to leave a comment, please click here READ MORE

HP has lots to Discover

Image by HPHP is launching a raft of new products at its annual Discover conference this week that explore the mysteries of unchartered IT territory in network, server, storage and application areas. Image by HPTo read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: LogMeIn

The State of the Web Conferencing Market

Businesses today are experiencing landmark shifts. The emergence of mobile, social, and virtual communications is creating more distributed and real-time work environments. User demand for collaborative tools is growing exponentially. The adoption of Web conferencing is triggered by three key drivers. Read this Frost&Sullivan report to learn more. Read Now

SLIDESHOWS

Network World's 2014 State of the Network survey

Exclusive research from Network World shows that cloud and mobility are gaining in importance.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. What's the best approach to building next-generation data center networks?

2. HP unveils Cisco-like SDN switch

3. Rack-mount? ... We don't need no stinkin' rack-mount

4. How to change Windows 8.1 to local account with no Microsoft email account required

5. The SAN is dead! Long live the storage fabric!

6. Cisco takes early lead in SDN thought leadership

7. Daunting photos of a village built to handle electronic waste

8. 10 great new features in Microsoft Azure

9. TrueCrypt's abrupt demise 'puzzling, bizarre'

10. 12 most powerful Internet of Things companies

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment