High-tech

High-tech
Light

Friday, July 18, 2014

Cisco counterfeiter gets 37 months in prison, forfeits $700,000

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jul 18, 2014 2:18 PM
Subject: Cisco counterfeiter gets 37 months in prison, forfeits $700,000
To: <aquarianm@gmail.com>
Cc:

11 offbeat battery chargers: Portable power with a twist

Oracle saddles up with OpenStack distributor Mirantis

Network World Daily News PM
July 18, 2014
Share this email

Cisco counterfeiter gets 37 months in prison, forfeits $700,000

A company and its CEO has been whacked by a US federal court for conspiring to build and sell counterfeit Cisco gear.  According to U.S. Immigration and Customs Enforcement's (ICE) Homeland Security Investigations and court records, ConnectZone.com, LLC and owner, Daniel Oberholtzer conspired with a Chinese company to produce counterfeit Cisco Systems network products that were later sold on websites operated by ConnectZone as genuine products.  +More on Network World: The weirdest, wackiest and coolest sci/tech stories of 2014 (so far!)+To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. 11 offbeat battery chargers: Portable power with a twist

2. Oracle saddles up with OpenStack distributor Mirantis

3. Net neutrality a key battleground in growing fight over encryption, activists say

4. Oh, no, my 'Account Apple' has been frozen

5. Appcelerator gears up for the business world

6. INSIDER Developing a smart approach to SMAC security

7. Home router security to be tested in upcoming hacking contest

8. INSIDER Cisco takes early lead in SDN thought leadership

9. The weirdest, wackiest and coolest sci/tech stories of 2014 (so far!)

WHITE PAPER: HP and Intel®

Management Insight Technologies

Understanding evolving needs of IT infrastructure decision-makers from enterprise organizations in the converged infrastructure market and how CI vendors are meeting those needs. Learn More>>

11 offbeat battery chargers: Portable power with a twist

If you carry a smartphone or a tablet around with you (and if you're reading this, you probably do), you know that there's a good chance you're going to run out of power before it's time for bed. There are, of course, a whole slew of chargers to choose from that can get you through the day. (See our slideshow 12 portable battery chargers add life to your devices.) But some situations call for a more creative approach to charging your device on the go.To read this article in full or to leave a comment, please click here READ MORE

Oracle saddles up with OpenStack distributor Mirantis

Joining a plethora of other vendors to support the open source cloud computing platform, software giant Oracle this week announced a partnership with pure-play OpenStack distributor Mirantis, blessing this company's open source software to support Oracle Linux and Oracle VMs.This is not Oracle's first foray into the OpenStack community - in fact the company is a corporate sponsor of OpenStack and has its own distribution of the open source cloud management platform. But, it is one of the company's first alliances in this competitive, yet still nascent community.To read this article in full or to leave a comment, please click here READ MORE

Net neutrality a key battleground in growing fight over encryption, activists say

Plans to favor some Internet packets over others threaten consumers' hard-won right to use encryption, a digital privacy advocate says.Activists and tech companies fended off efforts in the U.S. in the 1990s to ban Internet encryption or give the government ways around it, but an even bigger battle over cryptography is brewing now, according to Sascha Meinrath, director of X-Lab, a digital civil-rights think tank launched earlier this year. One of the most contested issues in that battle will be net neutrality, Meinrath said.The new fight will be even more fierce than the last one, because Internet service providers now see dollars and cents in the details of packets traversing their networks. They want to charge content providers for priority delivery of their packets across the network, something that a controversial Federal Communications Commission proposal could allow under certain conditions. Friday is the filing deadline for the first round of public comments on that plan.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: BMC Software

Meeting the Exploding Demand for New IT Services

In this eBook, explore the top trends driving the New IT for IT Service Management, and how leading organizations are evolving to focus on end-user experience. Learn More

Oh, no, my 'Account Apple' has been frozen

Who knows what my kids might have done to get my Account Apple frozen. They're always using my iPad, which is married to my iPhone. Some phishing attempts are easier to spot than others. To read this article in full or to leave a comment, please click here READ MORE

Appcelerator gears up for the business world

The Appcelerator mobile development platform has been updated for better metric collection and building of APIs READ MORE

INSIDER

Developing a smart approach to SMAC security

Few security executives at global enterprises—or even at smaller organizations—have not had to deal with issues related to social media, mobile technology, big data/analytics, or cloud computing.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

WHITE PAPER: VCE

Rompetrol Case Study

After a successful acquisition and growth phase, Rompetrol turned its energy into improving global operations by consolidating IT operations and launching a series of IT initiatives including an SAP rollout and a move toward private cloud. Learn More

Home router security to be tested in upcoming hacking contest

Researchers are gearing up to hack an array of different home routers during a contest next month at the Defcon 22 security conference.The contest is called SOHOpelessly Broken—a nod to the small office/home office space targeted by the products—and follows a growing number of large scale attacks this year against routers and other home embedded systems.The competition is organized by security consultancy firm Independent Security Evaluators and advocacy group the Electronic Frontier Foundation (EFF), and will have two separate challenges.The first challenge, known as Track 0, will require researchers to demonstrate exploits for previously unknown, or zero-day, vulnerabilities in a number of popular off-the-shelf consumer wireless routers.To read this article in full or to leave a comment, please click here READ MORE

INSIDER

Cisco takes early lead in SDN thought leadership

Juniper, HP and VMware score well, but two-thirds of respondents in Network World's State of the Network survey say the jury is still out. READ MORE

The weirdest, wackiest and coolest sci/tech stories of 2014 (so far!)

2014 has featured crop circles, advanced toilet tech, flying saucers, wild software development READ MORE

WHITE PAPER: APC by Schneider Electric

Types of Prefabricated Modular Data Centers

There are important distinctions between the types of data center factory-built building blocks on the market. This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, and compares their key attributes. View more

SLIDESHOWS

Worst data breaches of 2014…So far

We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. 16 weirdest places you'll find Linux

2. 16 terrible computer pranks that could get you fired

3. Superclass: 14 of the world's best living programmers

4. 17 obscure Windows tools and tricks too powerful to overlook

5. 20 cool things you can do with a Raspberry Pi

6. 10 disturbing attacks at Black Hat USA 2014

7. 10 Linux distros to watch in 2014

8. Whatever happened to the IPv4 address crisis?

9. 20 top Android and iOS productivity apps for 2014

10. Top 10 security tools in Kali Linux 1.0.6

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment