High-tech

High-tech
Light

Wednesday, July 30, 2014

Making the case for Amazon to release its cloud revenues

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Jul 30, 2014 9:01 PM
Subject: Making the case for Amazon to release its cloud revenues
To: <aquarianm@gmail.com>
Cc:

  Comcast's silly propaganda helped kill municipal broadband projects | Internet of things devices contain high number of vulnerabilities, study finds

 
  Network World After Dark

Forward this to a Friend >>>


Making the case for Amazon to release its cloud revenues
The past few weeks have been earnings season, meaning publicly-traded companies reveal their latest financial results for the second quarter of the year.In the cloud computing industry, some companies like Microsoft are flaunting their results. Microsost made just under $1 billion in the quarter from its cloud, and the company now expects to make up to $4.4B off its cloud practice this year.But other companies aren't as forthcoming with the financials behind their cloud products. And yes, we're talking about you Amazon.+MORE AT NETWORK WORLD: Amazon's warming up to hybrid clouds+To read this article in full or to leave a comment, please click here Read More
 


WEBCAST: Cisco Systems

Innovations that Protect Against Advanced Attackers
This webinar will explore new technologies and process for protecting endpoints from advanced attackers and how innovations like continuous data collection combined with big data analytics are pushing the envelope for what security teams can do during and after an advanced attacker puts them in their sights. Learn more >>

WHITE PAPER: EMC Corporation
 
The Big Data Security Analytics Era Is Here
Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution. Read this paper for key trends and conclusions in the big data security era. Learn more.

Comcast's silly propaganda helped kill municipal broadband projects
A little more than 10 years ago, Comcast stuffed mailboxes in Batavia, Illinois, in the weeks leading up to a vote on a referendum measure attempting to establish a municipal broadband network, warning of failed projects and other horror stories.The fliers, one of which can be seen above and others which are published at Motherboard, likened municipal broadband to "ghosts" and "goblins," claimed that the referendum proponents didn't even have a business plan for the project, and, strangely, implied that the local women who voted in favor of it didn't understand their priorities.To read this article in full or to leave a comment, please click here Read More
 

Internet of things devices contain high number of vulnerabilities, study finds
Security researchers from Hewlett-Packard found 250 security issues when analyzing 10 popular IoT devices Read More
 

64-bit Google Chrome browser moves into beta
Google's 64-bit Chrome browser took the last step before being formally released, as Google published a 64-bit beta of the browser on Wednesday morning.If you'd like, you can visit Google's 64-bit Chrome beta page and download the new browser; Google promises that all of your saved information (passwords, bookmarks and the like) will migrate over. (Google announced 64-bit versions of the browser in its Dev and Canary channels in June.)Google Graveyard: Here's what Google has killed so far in 2014 Why do you need a 64-bit Chrome browser? At this point, that's a bit of an open question. Chances are that your PC's microprocessor and operating system (Mac, Windows, or Linux) shifted over to 64-bit technology years ago. In general, 64-bit addressing opens up the ability for software to use more than 4 gigabytes of RAM—the maximum a 32-bit application can address—plus some performance improvements.To read this article in full or to leave a comment, please click here Read More
 

Red Hat aims at standardization with Linux for 64-bit ARM servers
Red Hat has developed a version of the Linux operating system that can be used to test chips and associated hardware based on the ARMv8-A 64-bit architecture for servers with the aim of standardizing that market.Based on the company's Red Hat Enterprise Linux (RHEL), the Linux distribution is part of a partner program that Red Hat launched Wednesday for potential ARM hardware vendors."We don't call it RHEL, but it is a functional, unsupported, operating system for partners to use in their development activities," said Mark Coggin, Red Hat senior director of platform product marketing.To read this article in full or to leave a comment, please click here Read More
 

Tor hints at possible U.S. government involvement in recent attack
Hackers attacked the infrastructure of Tor, the anonymizing service, earlier this month in an incident that may have compromised a number of hidden services, according to an announcement posted today by the Tor Project's director, Roger Dingledine. Dingledine said that it's possible the attack wasn't carried out with malicious intent, although the effect is harmful in any case, potentially weakening Tor's encryption and making it more vulnerable to a state actor attempting to compromise it. +MORE ON NETWORK WORLD: Superclass: 14 of the world's best living programmers | Zero-day flaws found in Symantec's Endpoint Protection +To read this article in full or to leave a comment, please click here Read More
 

Dept. of Energy hunting fault tolerance for extreme scale systems
The immensely powerful supercomputers of the not too distant future will need some serious fault tolerance technology if they are to fulfill their promise of ingenious research.That's why the U.S. Department of Energy 's Office of Advanced Scientific Computing Research this week said it is looking for "basic research that significantly improves the resiliency of scientific applications in the context of emerging architectures for extreme scale computing platforms. Extreme scale is defined as approximately 1,000 times the capability available today. The next-generation of scientific discovery will be enabled by research developments that can effectively harness significant or disruptive advances in computing technology."To read this article in full or to leave a comment, please click here Read More
 

10 technologies that will transform PCs in 2015 and beyond
The PC's future is so bright, you gotta wear shadesYou might write off PCs as archaic or boring. You might take for granted that they'll get faster, lighter, more power-efficient and more convenient to use over time.But if you stop and consider all the things that go into making a computer better, there's actually a lot to be excited about. Here are 10 PC advancements that will transform PCs over the next several years.To read this article in full or to leave a comment, please click here Read More
 

Antivirus products riddled with security flaws, researcher says
It's generally accepted that antivirus programs provide a necessary protection layer, but organizations should audit such products before deploying them on their systems because many of them contain serious vulnerabilities, a researcher warned.According to Joxean Koret, a researcher at Singapore security firm COSEINC, antivirus programs are as vulnerable to attacks as the applications they're trying to protect and expose a large attack surface that can make computers even more vulnerable.Koret spent the last year analyzing antivirus products and their engines in his spare time and claims to have found dozens of remotely and locally exploitable vulnerabilities in 14 of them. The vulnerabilities ranged from denial-of-service issues to flaws that allow potential attackers to elevate their privileges on systems or to execute arbitrary code. Some bugs were located in antivirus engines—the core parts of antivirus products—and some in various other components.To read this article in full or to leave a comment, please click here Read More
 

'Right to be forgotten' ruling is unworkable and misguided, UK Lords say
The UK government should fight to keep the 'right to be forgotten' out of future EU data protection regulation, the Lords said Read More
 

Microsoft reveals Windows Phone 8.1's first update, with welcome new features
Microsoft formally unveiled Windows Phone 8.1 Update early Wednesday morning, confirming features such as Start screen folders, sandboxed apps, and even a handy VPN function for surfing over public Wi-Fi connections.Those who opted in to the Developer Preview will be able to download the update next week; otherwise, consumers with stock Windows Phone 8.1 devices will have to wait a couple of months until it can be formally tested and deployed by carriers. Sources had revealed previously that the update, known formerly as Windows Phone 8.1 GDR1, wouldn't be earth-shattering. But there's enough there that it should be a must-have for Windows Phone owners, as evidenced by a blog post authored by Joe Belfiore, the Microsoft vice president in charge of Windows Phone.To read this article in full or to leave a comment, please click here Read More
 

 

SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. About those alleged backdoors in Microsoft products...

2. Apple iWatch launch may be pushed back until December

3. A breakdown of Cisco ACI pricing

4. Black Hat 2014: How to crack just about everything

5. Abuse of Larry Ellison continues unabated

6. Zero-day flaws found in Symantec's Endpoint Protection

7. 20 cool things you can do with a Raspberry Pi

8. Windows 9 in November? Don't believe it

9. Guns, vandals and thieves: Data shows US networks under attack

10. 10 disturbing attacks at Black Hat USA 2014


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment