High-tech

High-tech
Light

Sunday, July 20, 2014

Cisco customers are brutally consolidating too

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jul 16, 2014 2:18 PM
Subject: Cisco customers are brutally consolidating too
To: <aquarianm@gmail.com>
Cc:

9 Tips for CIOs as Summer Vacations Hit

Developing a smart approach to SMAC security

Network World Daily News PM
July 16, 2014
Share this email

Cisco customers are brutally consolidating too

CEO Chambers says only 1/3 of large enterprises will be around in 20 years

READ MORE
 

Issue highlights

1. 9 Tips for CIOs as Summer Vacations Hit

2. INSIDER Developing a smart approach to SMAC security

3. Apple-IBM deal threatens Android's enterprise push

4. The FBI is both worried and excited about driverless cars

5. Senate passes bill allowing mobile phone owners to unlock devices

6. Microsoft's future under Nadella less about Windows, more about mobile and cloud

7. SSL Blacklist project exposes certificates used by malware

8. There's almost a million fake apps targeting your phone

9. Would Jobs have made IBM deal? Not in '95

WHITE PAPER: HP

Protecting Your Mid-Size Business from Security Threats

Security breaches in large enterprises make the headlines, but 55% of small and mid-size businesses have also experienced a data breach. And 60% of small businesses fail within six months of falling victim to a cyber attack. Learn More

9 Tips for CIOs as Summer Vacations Hit

Have trouble leaving the office behind when you go on vacation? Here are nine tips to help give CIOs peace of mind when they (and their staff and fellow employees) head out for summer R&R. READ MORE

INSIDER

Developing a smart approach to SMAC security

Few security executives at global enterprises—or even at smaller organizations—have not had to deal with issues related to social media, mobile technology, big data/analytics, or cloud computing.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

Apple-IBM deal threatens Android's enterprise push

The new Apple-IBM partnership seems sure to help Apple sell more iPads and iPhones to businesses while extending the reach of IBM's big data and analytics software. The deal may also be setting off alarm bells at mobile device management companies large and small. Google is clearly one target of the new Apple-IBM partnership. The deal comes just weeks after Google announced an initiative to help business users adopt Android tablets and smartphones with new mobile device management software, including the ability to separate work and personal data. The business-related features are part of the coming Android update dubbed "L" announced in June.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: APC by Schneider Electric

Essential Elements of Data Center Facility Operations

This paper describes unique management principles and provides a comprehensive, high-level overview of the necessary program elements for operating a mission critical facility efficiently and reliably throughout its life cycle. Learn more!

The FBI is both worried and excited about driverless cars

In a report recently obtained by The Guardian, the FBI expressed both concern for driverless cars being used as weapons in drive-by shootings or unmanned bombings and excitement about its potential use for surveillance and pursuit of suspects. READ MORE

Senate passes bill allowing mobile phone owners to unlock devices

The House will still have to pass the Senate bill before it becomes law READ MORE

Microsoft's future under Nadella less about Windows, more about mobile and cloud

Microsoft's future will be less devoted to its Windows operating system as it continues to push into mobile and cloud services, CEO Satya Nadella said, using his keynote speech at the Worldwide Partner Conference to talk about where the company is headed."We are the company and the ecosystem that will build productivity experiences and platforms for the mobile-first, cloud first-world," he said Wednesday at the WPC in Washington, D.C. "We will reinvent productivity for the new generation. We will empower every individual and organization to achieve more. That is our singular mission."Achieving that goal may not always rely on Windows, he said.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: F5 Networks

Implementing an End-to-End Security with Less

Firewalls, WAFs, encryption, SSL VPN, and intrusion prevention systems all reduce the performance of web applications, and all exist solely to secure those applications. Learn how you can increase security with a single point of control without introducing more devices between applications and clients and degrading performance. View Now

SSL Blacklist project exposes certificates used by malware

Botnet tracking outfit Abuse.ch has launched a project to list SSL (Secure Sockets Layer) certificates used by some malware programs to hide their communications.A large number of Web services have added support for SSL encryption over the past couple of years and the technology has increasingly been adopted by privacy-conscious users, especially following revelations of large scale surveillance and bulk data collection by intelligence agencies.However, it's not just regular Internet users who rely on SSL to protect their communications. Some cybercriminals also use it to encrypt traffic between malware-infected computers and command-and-control servers in an attempt to bypass intrusion prevention and detection systems, the Abuse.ch maintainers said in a blog post to announce the new SSL Blacklist (SSLBL) project.To read this article in full or to leave a comment, please click here READ MORE

There's almost a million fake apps targeting your phone

Fake apps dressed up to look like official ones but actually designed to steal user data are increasingly targeting Android phone users, according to a study by Trend Micro.The company looked at the top 50 free apps in Google's Play Store and then searched Google's app store and others to see if fake versions existed. It found fake versions existed for 77 percent of the apps. The fake apps are often made to look like the real ones and have the same functions, but carry a dangerous extra payload."We've been tracking the activity of malicious or high-risk apps for nearly five years," said JD Sherry, vice president of technology and solutions at Trend Micro. "The potential for people to slip things past the gate and appear legitimate is much easier."To read this article in full or to leave a comment, please click here READ MORE

Would Jobs have made IBM deal? Not in '95

How might Steve Jobs have viewed the major enterprise partnership announced yesterday by Apple and IBM?No one can say for certain, of course, since the Apple co-founder has been gone going on three years. But Jobs was known to speak ill of Big Blue – here's a Bloomberg collection of quotes – not to mention the photo of him literally giving IBM the finger. Then there's an interview Jobs gave to Robert Cringely in 1995 in which even what seem to be compliments are in fact back-handed jabs.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: HootSuite Media, Inc.

5 Step Guide to Social Media Security

As businesses embrace social media, related security breaches are on the rise. Corporate Twitter hackings. Rogue employees on the company Facebook account. Executives sharing confidential info on their personal accounts. Learn More

SLIDESHOWS

Worst data breaches of 2014…So far

We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Ubuntu 14.04: Is Canonical taking on too much

2. Microsoft COO tells partners to get with the cloud program now

3. Say goodbye to desktop phones

4. Apple, IBM join to make iOS the default mobile platform

5. Windows Phone 8.1 and its first update could appear this week

6. U.S. malware share rising, Amazon service No.1 in hosting it

7. 10 disturbing attacks at Black Hat USA 2014

8. Microsoft may lay off over 6,000 employees

9. Russian hackers breach CNET, steal one million usernames, passwords and email addresses

10. Microsoft rumored to be buying security firm that publicized Active Directory exploit

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment