High-tech

High-tech
Light

Monday, July 7, 2014

Larry Page: We should all work a lot less

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Jul 7, 2014 9:00 PM
Subject: Larry Page: We should all work a lot less
To: <aquarianm@gmail.com>
Cc:

  Open source tool could sniff out most heavily censored websites | Could a quadcopter land rovers on Mars?

 
  Network World After Dark

Forward this to a Friend >>>


Larry Page: We should all work a lot less
  When I read the quotes attributed to Google CEO Larry Page, I thought perhaps they were taken out of context. But you can listen for yourself starting at minute 16 of the video, or skip to the excerpts below. To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: APC by Schneider Electric

Data Center Projects: Advantages of Using a Reference Design
It is no longer practical or cost-effective to completely engineer all aspects of a unique data center. Re-use of proven, documented subsystems or complete designs is a best practice for both new data centers and for upgrades to existing data centers. In this paper reference designs are defined and their benefits are explained. Learn more

WHITE PAPER: F5 Networks
 
Where You Mitigate Heartbleed Matters
Read this article to learn more about why customers must choose the most strategic point in the network at which to deploy their selected mitigation. Learn more >>

Open source tool could sniff out most heavily censored websites
  Georgia Tech researchers are seeking the assistance of website operators to help better understand which sites are being censored and then figure out how to get around such restricted access by examining the data collected. The open source Encore [Enabling Lightweight Measurements of Censorship with Cross-Origin Requests] tool involves website operators installing a single line of code onto their sites, and that in turn will allow the researchers to determine whether visitors to these sites are blocked from visiting other sites around the world known to be censored. The researchers are hoping to enlist a mix of small and big websites, and currently it is running on about 10 of them.To read this article in full or to leave a comment, please click here Read More
 

Could a quadcopter land rovers on Mars?
  ESA Taking a page from NASA's rocket powered landing craft from it most recent Mars landing mission, the European Space Agency is showing off a quadcopter that the organization says can steer itself to smoothly lower a rover onto a safe patch of the rocky Martian surface.The ESA said its dropship, known as the StarTiger's Dropter is indeed a customized quadcopter drone that uses a GPS, camera and inertial systems to fly into position, where it then switches to vision-based navigation supplemented by a laser range-finder and barometer to lower and land a rover autonomously.To read this article in full or to leave a comment, please click here Read More
 

Google adds 13 more languages to Gmail
  The languages change Gmail's display, not individual messages Read More
 

IDC: Apps will drive public cloud spending to sustained double-digit growth
Global spending on public cloud services reached US$45.7 billion last year and will experience a 23 percent compound annual growth rate through 2018, according to analyst firm IDC.Some 86 percent of the 2013 total came from cloud software, which encompasses both SaaS (software as a service) applications and PaaS (platform as a service) offerings, with the remaining 14 percent generated by cloud infrastructure, IDC said Monday.ERM (enterprise resource management) application software accounted for $10.8 billion in public cloud revenue last year, followed by CRM (customer relationship management) products with $8.1 billion, according to IDC. Server and collaboration software came next with about $4 billion and $3.4 billion, respectively, with the remainder of the total spread over security and other markets, IDC said.To read this article in full or to leave a comment, please click here Read More
 

Accused Russian point-of-sale hacker arrested, faces US charges
The 30-year-old is also accused of hosting credit card selling forums online Read More
 

How to protect against watering hole attacks
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach. Watering hole attacks are a relatively new phenomenon that have been successfully employed in a number of recent high profile attacks. What is a watering hole attack? Just as lions lie in wait knowing their prey must come to drink, in the cyber version, rather than going after a target directly, the attacker instead infects a trusted resource that potential victims will eventually come to. The indirect nature of the attack could be driven by a desire to ultimately infect a specific but diverse set of victims, or it could be the weak link in the security chain.To read this article in full or to leave a comment, please click here Read More
 

Oculus buys RakNet, whose engine revved up 'Minecraft,' 'Lego Universe'
Virtual reality headset maker Oculus VR, which is being bought by Facebook, has acquired RakNet, an open-source C++ coding engine for games, as part of its plan to develop more software for its head-mounted device ahead of a consumer launch.The deal was the second announced by Oculus in the last two weeks and comes after Facebook said in March that it would acquire Oculus for $US2 billion.RakNet's C++ system is aimed at programmers who build software across a range of platforms including iOS, Mac, Android and Xbox 360. Some of its customers include the developers of popular games like "Minecraft" and "Lego Universe." Companies such as Sony Online Entertainment and the 3D game engine Unity have also licensed its technology.To read this article in full or to leave a comment, please click here Read More
 

If Office comes to Android, will anyone want it?
A help-wanted ad sparks talk of an Android port, but is Android big in the enterprise? Read More
 

US open to discussion about German accused of being a double agent
A German intelligence employee is accused of passing information to a US contact Read More
 

Police dog sniffs out hidden memory cards & flash drives
If you've ever built a gaming PC, then you know how each unboxed component has its own "new tech" scent. That's similar to new car smell, only geekier and less expensive. Although it depends upon your sense of smell, it's much more difficult to catch the scent of "tech" when you open a new SD card, USB drive or other hard drive. Take away the "new" factor and change it to previously-used memory filled with child porn and then hidden away; that is what a new type of police dog is supposedly detecting.You may have heard of memory sniffing attacks, but it likely did not include a dog as part of the scenario. While discussing new methods police are using to fight child porn in Rhode Island, the Providence Journal reported that includes police dogs allegedly capable of sniffing out memory cards holding kiddie porn. Be careful as some of the details the cops gave the Journal about pedophiles might make you puke, such as, "Often offenders work to build collections that can be traded, authorities say. A dozen images of a 5-year-old girl might be traded for one of an infant rape."To read this article in full or to leave a comment, please click here Read More
 

 

SLIDESHOWS

10 disturbing attacks at Black Hat USA 2014

Attacking car systems, Google Glass for password theft, using free cloud trials to launch botnets, more.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 disturbing attacks at Black Hat USA 2014

2. FixIt giving away 15K iPhone 'liberation kits'

3. Tools catch security holes in open source code

4. Wzor's return brings Windows 9 rumors

5. 4 key features coming to Windows 9 (hopefully)

6. Google is killing off Orkut

7. 10 Bad Coding Practices That Wreck Software Development Projects

8. 10 security start-ups to watch

9. HP's giant Proliant challenges big iron from IBM, Oracle

10. Netflix open sources its Amazon cloud security enforcer


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment