High-tech

High-tech
Light

Thursday, July 3, 2014

10 videoconferencing tools for small groups

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Jul 2, 2014 9:00 PM
Subject: 10 videoconferencing tools for small groups
To: <aquarianm@gmail.com>
Cc:

  10 disturbing attacks at Black Hat USA 2014 | Avoid the gotchas of Office 365 migrations

 
  Network World After Dark

Forward this to a Friend >>>


FBI warns businesses "Man-in-the-E-Mail" scam escalating
The FBI and Internet Crime Complaint Center (IC3) are warning businesses to be on the lookout for growing scam that tricks them into paying invoices from established that look legitimate but in fact are fraudulent.The FBI says the scam is a tweak of the timeworn "man-in-the-middle" scam and usually involves chief technology officers, chief financial officers, or comptrollers, receiving an e-mail via their business accounts purportedly from a vendor requesting a wire transfer to a designated bank account, the FBI said. +More on Network World: The weirdest, wackiest and coolest sci/tech stories of 2013+To read this article in full or to leave a comment, please click here Read More
 




WHITE PAPER: APC by Schneider Electric

Types of Prefabricated Modular Data Centers
There are important distinctions between the types of data center factory-built building blocks on the market. This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, and compares their key attributes. View more

10 disturbing attacks at Black Hat USA 2014
Black Hat 2014: Is nothing safe?USING GOOGLE GLASS TO SNATCH PASSWORDSAn application that videos victims tapping passwords into touchscreens and analyzes it to steal the passwords with 90% accuracy from three meters. Applicable with Google Glass, Researchers Xinwen Fu and Qinggang Yue of UMass Lowell and Zhen Ling of Southeast University track the movement of the fingertip and use its position to recognize the input taking shadows, optical flow and other factors into account. Passwords can be stolen even if the person behind the camera can't read the victim's screen with the naked eye.To read this article in full or to leave a comment, please click here Read More
 

Avoid the gotchas of Office 365 migrations
Migrating to Microsoft's Office 365 from an on-premises Office suite requires help, experts say, in order to navigate the vagaries of moving apps smoothly to the cloud, a task made more challenging if the transition is from alternatives such as GroupWise and Lotus SmartSuite. Microsoft itself recommends in certain cases either hiring consultants or buying third-party tools to help the transition to Office 365, but some experts are more emphatic. + Also on Network World: Office 365 customer: Get the right help when moving email to the cloud; Tips on how to ace an Office 365 certification test +To read this article in full or to leave a comment, please click here Read More
 

IT spending growth to be slower than expected in 2014 due to pricing pressure, Gartner says
Enterprise software revenue will see the most growth, at 6.9 percent, according to the research firm Read More
 

California law removes ban on alternative currencies
The law paves the way for legal use of community currencies, bitcoin and other U.S. dollar alternatives Read More
 

Cisco, NetApp mark progress
Cisco and NetApp say their FlexPod integrated IT infrastructure reference architecture has generated $3 billion in joint sales since its launch in 2010. FlexPod unit shipments have grown 81% year-over-year, with demand reaching a $2 billion annualized run rate.This compares to Cisco's VCE IT converged infrastructure collaboration with EMC, which generated $1 billion in sales in 2013 and is also approaching a $2 billion annual demand run rate.To read this article in full or to leave a comment, please click here Read More
 

Mark Hurd lays out Oracle's cloud progress, plan to be number one
Hurd presented Oracle's cloud strategy and progress to analysts this week Read More
 

Smartwatches at work: Boon or bane for IT?
It's hard to assess how popular smartwatches will be for business users, much less for the IT staffers that need to protect the data running over them.Android Wear smartwatches will respond to the cue "OK, Google" in the same way Google's Voice Search does.One potential business use for a smartwatch centers on quick alerts for users, who would no longer need to fumble for a smartphone in a purse or pocket. A stockbroker, for example, could get an alert when a stock hits a certain price, or a doctor would know when a patient's condition turns critical.+ ALSO ON NETWORK WORLD 11 of today's (and tomorrow's) hottest smartwatches +To read this article in full or to leave a comment, please click here Read More
 

Advice for college students seeking a tech career: Turn to internships
IT internships give students the practical tech work experience employers are seeking Read More
 

The tablet's tortured past: 8 failures that led to the slates we use today
They were flat. Many had pens or touchscreens. And most of them died. Swipe back in time to see how tablets have evolved to the Surface, iPad, and Android slates we use today. Read More
 

 

SLIDESHOWS

10 disturbing attacks at Black Hat USA 2014

Attacking car systems, Google Glass for password theft, using free cloud trials to launch botnets, more.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 disturbing attacks at Black Hat USA 2014

2. FixIt giving away 15K iPhone 'liberation kits'

3. Tools catch security holes in open source code

4. Wzor's return brings Windows 9 rumors

5. 4 key features coming to Windows 9 (hopefully)

6. Google is killing off Orkut

7. 10 Bad Coding Practices That Wreck Software Development Projects

8. 10 security start-ups to watch

9. HP's giant Proliant challenges big iron from IBM, Oracle

10. Netflix open sources its Amazon cloud security enforcer


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment