| Larry Page: We should all work a lot less When I read the quotes attributed to Google CEO Larry Page, I thought perhaps they were taken out of context. But you can listen for yourself starting at minute 16 of the video, or skip to the excerpts below. To read this article in full or to leave a comment, please click here Read More WHITE PAPER: APC by Schneider Electric
Data Center Projects: Advantages of Using a Reference Design It is no longer practical or cost-effective to completely engineer all aspects of a unique data center. Re-use of proven, documented subsystems or complete designs is a best practice for both new data centers and for upgrades to existing data centers. In this paper reference designs are defined and their benefits are explained. Learn more WHITE PAPER: F5 Networks Where You Mitigate Heartbleed Matters Read this article to learn more about why customers must choose the most strategic point in the network at which to deploy their selected mitigation. Learn more >> Open source tool could sniff out most heavily censored websites Georgia Tech researchers are seeking the assistance of website operators to help better understand which sites are being censored and then figure out how to get around such restricted access by examining the data collected. The open source Encore [Enabling Lightweight Measurements of Censorship with Cross-Origin Requests] tool involves website operators installing a single line of code onto their sites, and that in turn will allow the researchers to determine whether visitors to these sites are blocked from visiting other sites around the world known to be censored. The researchers are hoping to enlist a mix of small and big websites, and currently it is running on about 10 of them.To read this article in full or to leave a comment, please click here Read More Could a quadcopter land rovers on Mars? ESA Taking a page from NASA's rocket powered landing craft from it most recent Mars landing mission, the European Space Agency is showing off a quadcopter that the organization says can steer itself to smoothly lower a rover onto a safe patch of the rocky Martian surface.The ESA said its dropship, known as the StarTiger's Dropter is indeed a customized quadcopter drone that uses a GPS, camera and inertial systems to fly into position, where it then switches to vision-based navigation supplemented by a laser range-finder and barometer to lower and land a rover autonomously.To read this article in full or to leave a comment, please click here Read More Google adds 13 more languages to Gmail The languages change Gmail's display, not individual messages Read More IDC: Apps will drive public cloud spending to sustained double-digit growth Global spending on public cloud services reached US$45.7 billion last year and will experience a 23 percent compound annual growth rate through 2018, according to analyst firm IDC.Some 86 percent of the 2013 total came from cloud software, which encompasses both SaaS (software as a service) applications and PaaS (platform as a service) offerings, with the remaining 14 percent generated by cloud infrastructure, IDC said Monday.ERM (enterprise resource management) application software accounted for $10.8 billion in public cloud revenue last year, followed by CRM (customer relationship management) products with $8.1 billion, according to IDC. Server and collaboration software came next with about $4 billion and $3.4 billion, respectively, with the remainder of the total spread over security and other markets, IDC said.To read this article in full or to leave a comment, please click here Read More Accused Russian point-of-sale hacker arrested, faces US charges The 30-year-old is also accused of hosting credit card selling forums online Read More How to protect against watering hole attacks This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach. Watering hole attacks are a relatively new phenomenon that have been successfully employed in a number of recent high profile attacks. What is a watering hole attack? Just as lions lie in wait knowing their prey must come to drink, in the cyber version, rather than going after a target directly, the attacker instead infects a trusted resource that potential victims will eventually come to. The indirect nature of the attack could be driven by a desire to ultimately infect a specific but diverse set of victims, or it could be the weak link in the security chain.To read this article in full or to leave a comment, please click here Read More Oculus buys RakNet, whose engine revved up 'Minecraft,' 'Lego Universe' Virtual reality headset maker Oculus VR, which is being bought by Facebook, has acquired RakNet, an open-source C++ coding engine for games, as part of its plan to develop more software for its head-mounted device ahead of a consumer launch.The deal was the second announced by Oculus in the last two weeks and comes after Facebook said in March that it would acquire Oculus for $US2 billion.RakNet's C++ system is aimed at programmers who build software across a range of platforms including iOS, Mac, Android and Xbox 360. Some of its customers include the developers of popular games like "Minecraft" and "Lego Universe." Companies such as Sony Online Entertainment and the 3D game engine Unity have also licensed its technology.To read this article in full or to leave a comment, please click here Read More If Office comes to Android, will anyone want it? A help-wanted ad sparks talk of an Android port, but is Android big in the enterprise? Read More US open to discussion about German accused of being a double agent A German intelligence employee is accused of passing information to a US contact Read More Police dog sniffs out hidden memory cards & flash drives If you've ever built a gaming PC, then you know how each unboxed component has its own "new tech" scent. That's similar to new car smell, only geekier and less expensive. Although it depends upon your sense of smell, it's much more difficult to catch the scent of "tech" when you open a new SD card, USB drive or other hard drive. Take away the "new" factor and change it to previously-used memory filled with child porn and then hidden away; that is what a new type of police dog is supposedly detecting.You may have heard of memory sniffing attacks, but it likely did not include a dog as part of the scenario. While discussing new methods police are using to fight child porn in Rhode Island, the Providence Journal reported that includes police dogs allegedly capable of sniffing out memory cards holding kiddie porn. Be careful as some of the details the cops gave the Journal about pedophiles might make you puke, such as, "Often offenders work to build collections that can be traded, authorities say. A dozen images of a 5-year-old girl might be traded for one of an infant rape."To read this article in full or to leave a comment, please click here Read More | |
| SLIDESHOWS 10 disturbing attacks at Black Hat USA 2014 Attacking car systems, Google Glass for password theft, using free cloud trials to launch botnets, more. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn MOST-READ STORIES 1. 10 disturbing attacks at Black Hat USA 2014 2. FixIt giving away 15K iPhone 'liberation kits' 3. Tools catch security holes in open source code 4. Wzor's return brings Windows 9 rumors 5. 4 key features coming to Windows 9 (hopefully) 6. Google is killing off Orkut 7. 10 Bad Coding Practices That Wreck Software Development Projects 8. 10 security start-ups to watch 9. HP's giant Proliant challenges big iron from IBM, Oracle 10. Netflix open sources its Amazon cloud security enforcer |
No comments:
Post a Comment