High-tech

High-tech
Light

Thursday, July 31, 2014

Telecom Ramblings: “With Level 3 In the Wings, tw telecom Posts Solid Q2 Growth” plus 2 more

---------- Forwarded message ----------
From: "Telecom Ramblings" <webmaster@telecomramblings.com>
Date: Jul 31, 2014 4:01 AM
Subject: Telecom Ramblings: "With Level 3 In the Wings, tw telecom Posts Solid Q2 Growth" plus 2 more
To: <aquarianm@gmail.com>
Cc:

Telecom Ramblings: "With Level 3 In the Wings, tw telecom Posts Solid Q2 Growth" plus 2 more

Link to Telecom Ramblings

With Level 3 In the Wings, tw telecom Posts Solid Q2 Growth

Posted: 30 Jul 2014 07:08 PM PDT

A week or so earlier than usual and a day and a half after its prospective acquirer did so, tw telecom posted its second quarter results.  They saw revenue growth pick up a little bit over the past few quarters, moving up 2.8% sequentially and beating estimates slightly.  Earnings per share seems to have been inline after excluding merger-related costs.  Here are their numbers in some context: … [visit site to read more]

Has Reliance Found a Buyer At Last For Its Submarine Cables?

Posted: 30 Jul 2014 04:44 AM PDT

For quite a few years now, the Indian telecommunications giant Reliance Communications has been looking for a way to monetize its international networking assets.  According to Telegeography, China's CITIC Telecom is said to be preparing a bid, at least for the submarine cable part.   Have they finally found a buyer? … [visit site to read more]

It's AT&T's Turn, Netflix Signs Another Interconnection Agreement

Posted: 30 Jul 2014 04:21 AM PDT

Netflix and AT&T have apparently made an interconnection pact, following the same path as we have seen over the past two quarters with Comcast and Verizon. Perhaps this time will be a little less acrimonious, as the two plan to have the necessary connections in place 'over the coming days'. … [visit site to read more]

You are subscribed to email updates from Telecom Ramblings
To stop receiving these emails, you may unsubscribe now.
Email delivery powered by Google
Google Inc., 20 West Kinzie, Chicago IL USA 60610

Wednesday, July 30, 2014

Making the case for Amazon to release its cloud revenues

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Jul 30, 2014 9:01 PM
Subject: Making the case for Amazon to release its cloud revenues
To: <aquarianm@gmail.com>
Cc:

  Comcast's silly propaganda helped kill municipal broadband projects | Internet of things devices contain high number of vulnerabilities, study finds

 
  Network World After Dark

Forward this to a Friend >>>


Making the case for Amazon to release its cloud revenues
The past few weeks have been earnings season, meaning publicly-traded companies reveal their latest financial results for the second quarter of the year.In the cloud computing industry, some companies like Microsoft are flaunting their results. Microsost made just under $1 billion in the quarter from its cloud, and the company now expects to make up to $4.4B off its cloud practice this year.But other companies aren't as forthcoming with the financials behind their cloud products. And yes, we're talking about you Amazon.+MORE AT NETWORK WORLD: Amazon's warming up to hybrid clouds+To read this article in full or to leave a comment, please click here Read More
 


WEBCAST: Cisco Systems

Innovations that Protect Against Advanced Attackers
This webinar will explore new technologies and process for protecting endpoints from advanced attackers and how innovations like continuous data collection combined with big data analytics are pushing the envelope for what security teams can do during and after an advanced attacker puts them in their sights. Learn more >>

WHITE PAPER: EMC Corporation
 
The Big Data Security Analytics Era Is Here
Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution. Read this paper for key trends and conclusions in the big data security era. Learn more.

Comcast's silly propaganda helped kill municipal broadband projects
A little more than 10 years ago, Comcast stuffed mailboxes in Batavia, Illinois, in the weeks leading up to a vote on a referendum measure attempting to establish a municipal broadband network, warning of failed projects and other horror stories.The fliers, one of which can be seen above and others which are published at Motherboard, likened municipal broadband to "ghosts" and "goblins," claimed that the referendum proponents didn't even have a business plan for the project, and, strangely, implied that the local women who voted in favor of it didn't understand their priorities.To read this article in full or to leave a comment, please click here Read More
 

Internet of things devices contain high number of vulnerabilities, study finds
Security researchers from Hewlett-Packard found 250 security issues when analyzing 10 popular IoT devices Read More
 

64-bit Google Chrome browser moves into beta
Google's 64-bit Chrome browser took the last step before being formally released, as Google published a 64-bit beta of the browser on Wednesday morning.If you'd like, you can visit Google's 64-bit Chrome beta page and download the new browser; Google promises that all of your saved information (passwords, bookmarks and the like) will migrate over. (Google announced 64-bit versions of the browser in its Dev and Canary channels in June.)Google Graveyard: Here's what Google has killed so far in 2014 Why do you need a 64-bit Chrome browser? At this point, that's a bit of an open question. Chances are that your PC's microprocessor and operating system (Mac, Windows, or Linux) shifted over to 64-bit technology years ago. In general, 64-bit addressing opens up the ability for software to use more than 4 gigabytes of RAM—the maximum a 32-bit application can address—plus some performance improvements.To read this article in full or to leave a comment, please click here Read More
 

Red Hat aims at standardization with Linux for 64-bit ARM servers
Red Hat has developed a version of the Linux operating system that can be used to test chips and associated hardware based on the ARMv8-A 64-bit architecture for servers with the aim of standardizing that market.Based on the company's Red Hat Enterprise Linux (RHEL), the Linux distribution is part of a partner program that Red Hat launched Wednesday for potential ARM hardware vendors."We don't call it RHEL, but it is a functional, unsupported, operating system for partners to use in their development activities," said Mark Coggin, Red Hat senior director of platform product marketing.To read this article in full or to leave a comment, please click here Read More
 

Tor hints at possible U.S. government involvement in recent attack
Hackers attacked the infrastructure of Tor, the anonymizing service, earlier this month in an incident that may have compromised a number of hidden services, according to an announcement posted today by the Tor Project's director, Roger Dingledine. Dingledine said that it's possible the attack wasn't carried out with malicious intent, although the effect is harmful in any case, potentially weakening Tor's encryption and making it more vulnerable to a state actor attempting to compromise it. +MORE ON NETWORK WORLD: Superclass: 14 of the world's best living programmers | Zero-day flaws found in Symantec's Endpoint Protection +To read this article in full or to leave a comment, please click here Read More
 

Dept. of Energy hunting fault tolerance for extreme scale systems
The immensely powerful supercomputers of the not too distant future will need some serious fault tolerance technology if they are to fulfill their promise of ingenious research.That's why the U.S. Department of Energy 's Office of Advanced Scientific Computing Research this week said it is looking for "basic research that significantly improves the resiliency of scientific applications in the context of emerging architectures for extreme scale computing platforms. Extreme scale is defined as approximately 1,000 times the capability available today. The next-generation of scientific discovery will be enabled by research developments that can effectively harness significant or disruptive advances in computing technology."To read this article in full or to leave a comment, please click here Read More
 

10 technologies that will transform PCs in 2015 and beyond
The PC's future is so bright, you gotta wear shadesYou might write off PCs as archaic or boring. You might take for granted that they'll get faster, lighter, more power-efficient and more convenient to use over time.But if you stop and consider all the things that go into making a computer better, there's actually a lot to be excited about. Here are 10 PC advancements that will transform PCs over the next several years.To read this article in full or to leave a comment, please click here Read More
 

Antivirus products riddled with security flaws, researcher says
It's generally accepted that antivirus programs provide a necessary protection layer, but organizations should audit such products before deploying them on their systems because many of them contain serious vulnerabilities, a researcher warned.According to Joxean Koret, a researcher at Singapore security firm COSEINC, antivirus programs are as vulnerable to attacks as the applications they're trying to protect and expose a large attack surface that can make computers even more vulnerable.Koret spent the last year analyzing antivirus products and their engines in his spare time and claims to have found dozens of remotely and locally exploitable vulnerabilities in 14 of them. The vulnerabilities ranged from denial-of-service issues to flaws that allow potential attackers to elevate their privileges on systems or to execute arbitrary code. Some bugs were located in antivirus engines—the core parts of antivirus products—and some in various other components.To read this article in full or to leave a comment, please click here Read More
 

'Right to be forgotten' ruling is unworkable and misguided, UK Lords say
The UK government should fight to keep the 'right to be forgotten' out of future EU data protection regulation, the Lords said Read More
 

Microsoft reveals Windows Phone 8.1's first update, with welcome new features
Microsoft formally unveiled Windows Phone 8.1 Update early Wednesday morning, confirming features such as Start screen folders, sandboxed apps, and even a handy VPN function for surfing over public Wi-Fi connections.Those who opted in to the Developer Preview will be able to download the update next week; otherwise, consumers with stock Windows Phone 8.1 devices will have to wait a couple of months until it can be formally tested and deployed by carriers. Sources had revealed previously that the update, known formerly as Windows Phone 8.1 GDR1, wouldn't be earth-shattering. But there's enough there that it should be a must-have for Windows Phone owners, as evidenced by a blog post authored by Joe Belfiore, the Microsoft vice president in charge of Windows Phone.To read this article in full or to leave a comment, please click here Read More
 

 

SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. About those alleged backdoors in Microsoft products...

2. Apple iWatch launch may be pushed back until December

3. A breakdown of Cisco ACI pricing

4. Black Hat 2014: How to crack just about everything

5. Abuse of Larry Ellison continues unabated

6. Zero-day flaws found in Symantec's Endpoint Protection

7. 20 cool things you can do with a Raspberry Pi

8. Windows 9 in November? Don't believe it

9. Guns, vandals and thieves: Data shows US networks under attack

10. 10 disturbing attacks at Black Hat USA 2014


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


A breakdown of Cisco ACI pricing

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jul 30, 2014 8:11 AM
Subject: A breakdown of Cisco ACI pricing
To: <aquarianm@gmail.com>
Cc:

Zero-day flaws found in Symantec's Endpoint Protection

BlackBerry buying German firm for voice encryption

Network World Daily News AM
July 30, 2014
Share this email

A breakdown of Cisco ACI pricing

Software licensing, hardware costs, and bundles for starters and Catalyst 6500 upgrades

READ MORE
 

Issue highlights

1. Zero-day flaws found in Symantec's Endpoint Protection

2. BlackBerry buying German firm for voice encryption

3. Abuse of Larry Ellison continues unabated

4. Guns, vandals and thieves: Data shows US networks under attack

5. Amazon says $9.99 e-books will boost revenue, including for Hachette

6. Sight: Web content indexing the hard, user-unfriendly way

7. NASA breakthrough improves 3D printing in space

8. iPhone gets first free app for encrypting voice calls

9. Samsung, Apple still dominate smartphones, but their shares slip

10. Twitter more than doubles its sales, stock soars

11. The copper telephone line over time

WEBCAST: Cisco Systems

Evaluating Leading Breach Detection Systems

Today's constantly evolving advanced malware and Advanced Persistent Threats (APTs) can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to confront these advanced threats before, during and after attacks. Learn more >>

Zero-day flaws found in Symantec's Endpoint Protection

Offensive Security said the flaws could be used to gain full system access READ MORE

BlackBerry buying German firm for voice encryption

BlackBerry has always touted its mobile devices as secure. But now it plans to make them "more secure" by acquiring a German company that specializes in voice encryption. BlackBerry will acquire Secusmart GmbH, which offers encryption systems to scramble voice calls, and also data communications. The company was silent about the details of the transaction, except to say it hinges on regulatory approvals. + ALSO ON NETWORK WORLD Top tech mergers in 2014 + The company also announced a plan to automatically scan Android apps selected for download by BlackBerry smartphone users. BlackBerry Guardian already combines automated and manual app analysis with Trend Micro's Mobile App Reputation Service, and continuously monitors apps in the BlackBerry World online store. Starting with the release later this year of the square-shaped BlackBerry Passport "phablet," Guardian will autoscan any Android app that the device downloads from any source. Suspicious apps are flagged, and the user can cancel the installation or go forward with it. [CrackBerry has a pre-release hands-on with the Passport.]To read this article in full or to leave a comment, please click here READ MORE

Abuse of Larry Ellison continues unabated

How much of this abuse does the Oracle board of directors expect its rock star CEO Larry Ellison to endure?How much of this could any CEO endure?First, Ellison saw his total compensation slashed 18% in 2013 over 2012.And now on top of that humiliation comes word in a regulatory filing that Oracle will be awarding Ellison fewer than half the stock options he has received in previous years.Oh, sure, the heartless and the hate-mongers will harp on the fact that the 18% reduction still left Ellison with a total compensation package worth $78.4 million, highest in the tech industry. They'll note that the 3 million stock options he's in line to receive, while no 7 million, remain nothing to sneeze at. And that his net worth of $42 billion makes him the third richest American.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: BitSight Technologies

Utilizing Security Ratings for Enterprise IT Risk Mitigation

Businesses need actionable, objective and continuous intelligence in order to effectively address cyber threats. In this white paper, learn how BitSight Security Ratings help businesses streamline security operations, remediate threats and engage business executives in cyber security strategy. View now

Guns, vandals and thieves: Data shows US networks under attack

Early one morning in April last year, someone accessed an underground vault just south of San Jose, California, and cut through fiber-optic cables there. The incident blacked out phone, Internet and 911 service for thousands of people in Silicon Valley.Such incidents, often caused by vandals, seem fairly common, but exactly how often do they occur? Since 2007, the U.S. telecom infrastructure has been targeted by more than a thousand malicious acts that resulted in severe outages, according to data obtained by IDG from the Federal Communications Commission (FCC) under the Freedom of Information Act.The FCC requires carriers to submit reports when an outage affects at least 900,000 minutes of user calls, or when it impacts 911 service, major military installations, key government facilities, nuclear power plants or major airports.To read this article in full or to leave a comment, please click here READ MORE

Amazon says $9.99 e-books will boost revenue, including for Hachette

Amazon.com believes that pricing ebooks at US$9.99 will boost sales by over 74 percent as the books are highly price-elastic.If customers would buy 100,000 copies of a particular ebook at $14.99, then they would buy 174,000 copies of the same ebook at $9.99, boosting total revenue to $1.7 million from about $1.5 million if the book is sold at $14.99, Amazon said in a post Tuesday.The company said its estimates of the price-elasticity of ebooks were based on repeated measurements across many titles.To read this article in full or to leave a comment, please click here READ MORE

Sight: Web content indexing the hard, user-unfriendly way

I just got off the phone with startup called Landscape Mobile, that publishes an app called Sight, and which claims: Sight [is] an app that takes an image — a screenshot — and finds the article behind the image, retrieves the content, and then formats it for a better reading experience. Let me clarify that for you … when there's content displayed on your iOS screen that exists on the Web and you take a screenshot, the Sight app searches the Internet for that content and, if found, adds the page to a list that Sight keeps on your iDevice. Selecting  an item on the list displays the page content reformatted to be more readable with a link at the top that will take you to the target page.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Citrix Systems

Tolly Test Report - How NetScaler outperforms F5

Measurable performance is a key factor when selecting an Application Delivery Controller(ADC) solution for modern data centers. In this report, Tolly evaluates the performance of several Citrix NetScaler ADC models vs. that of comparable products. Learn how NetScaler fared and provided up to 480% the performance of F5. Learn more

NASA breakthrough improves 3D printing in space

NASA's new technique allows 3D printers to create one object composed of multiple types of materials. READ MORE

iPhone gets first free app for encrypting voice calls

An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers.Signal comes from Open Whisper Systems, which developed RedPhone and TextSecure, both Android applications that encrypt calls and text messages.The application is compatible with RedPhone and eventually RedPhone and TextSecure will be combined in a single Android application and called Signal as well, according to a blog post.To read this article in full or to leave a comment, please click here READ MORE

Samsung, Apple still dominate smartphones, but their shares slip

Vendors mainly from China are offering low-cost, high-quality alternatives, IDC says READ MORE

Twitter more than doubles its sales, stock soars

Shares were trading at around $52 in after-market hours, up more than 30 percent READ MORE

The copper telephone line over time

My daughter, Emma, soon to be 13, is in the office with me today and I had some fun sharing with her a couple of facts from this Alcatel-Lucent infographic about the history of the copper telephone line. Two examples: In 1918 it took an average of 15 minutes just to set up a call and it wasn't until 1940 that telephone numbers allowed for direct customer dialing.I'm glad she didn't ask if I remembered these milestones. To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: BMC Software

IT Friction and Your Organization

This report outlines key issues that cause friction between business users and IT. Learn More

SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Windows 9 in November? Don't believe it

2. 10 amazing (and bizarre) drone discoveries

3. About those alleged backdoors in Microsoft products...

4. 17 obscure Windows tools and tricks too powerful to overlook

5. BYOA: Bring Your Own Authentication

6. Top 25 free tools for every Windows desktop

7. Cisco ready to ship ACI controller

8. Say goodbye to desktop phones

9. New products of the week 07.28.2014

10. Malwarebytes questions poor showing in anti-malware protection-evaluation lab testing

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **