Network World Daily News AM | | Microsoft reportedly will announce the biggest round of layoffs in its history on Thursday as massive changes wrought by new CEO Satya Nadella start to take hold at the struggling IT giant.The layoffs, which have been expected amid Nadella's calls for transformation at Microsoft, will dwarf the 5,800 job cuts it announced in 2009, The New York Times reported Wednesday, citing unnamed sources briefed on the decision. It said human resources managers have reserved conference rooms for most of Thursday, presumably to meet with laid-off employees.To read this article in full or to leave a comment, please click here | | Issue highlights 1. Apple agrees to pay up to $400 million in e-books price-fixing case 2. Systems engineer arrested in massive data leak in Japan 3. Microsoft researchers: Re-use the same password across sites likely to be hacked 4. Microsoft's Bing follows Google in offering Europeans the 'right to be forgotten' 5. The 'Rickmote' shows no mercy when it finds someone using Chromecast 6. Chef cooks ups infrastructure testing tools 7. Polycom Showcases Video Collaboration Advances 8. Internet Society, university join forces to measure Internet access diversity 9. New products of the week 07.14.14 | WEBCAST: VMware | IBM For over a decade, IBM and VMware have collaborated to deliver integrated virtualization solutions to tens of thousands of customers around the globe. Learn More | The amount Apple pays out depends on the outcome of its appeal of a 2013 antitrust ruling READ MORE | At least 7 million names were stolen from the database of education firm Benesse READ MORE | Microsoft Researchers Cormac Herley and Dinei Florencio, the same guys who previously wrote "Sex, Lies and Cybercrime Surveys" to explain why cybercrime loss estimates are a bunch of bunk, are not afraid of directly challenging "accepted wisdom and conventional advice." The duo was joined by Carleton University's Paul Van Oorschot to explore "how to manage a portfolio of passwords." Their advice may surprise you since they claim "Password re-use can be part of a coping strategy." Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts (pdf) will be presented at the 23rd USENIX Security Symposium in August.To read this article in full or to leave a comment, please click here READ MORE | RESOURCE COMPLIMENTS OF: Data+ Conference IDC estimates that only 1% of the world's data is currently being analyzed. That's a lot of actionable business insight that's being left to die in the vine. It's easy to see why. These jewels of business insight are hidden inside terabytes of enterprise data. Explore the new strategies being used to bring valuable data to light at the Data+ Conference, September 7-9, 2014 in Phoenix, Arizona. Sign up to attend free at: http://www.dataplusconference.com/NL | Microsoft has started accepting requests from users in Europe who want to remove search links from Bing under a recent "right-to-be-forgotten" ruling by Europe's top court.The company has asked European residents, who want Microsoft to block search results that show on Bing in response to searches of their names, to fill up a four-part online form.Besides the name and country of residence of the person and the details of the pages to be blocked, the form also asks if the person is a public figure or has or expects a role that involves trust, leadership or safety.Microsoft does not guarantee removal of links after they are submitted for removal through the form. It will also consider other sources of information to verify or supplement what is provided in the form.To read this article in full or to leave a comment, please click here READ MORE | Google's online media streaming tool, Chromecast, can be "Rickrolled" with a single click of entertainer Rick Astley's mug shot.A security researcher has developed an amusing piece of hardware called the "Rickmote" that takes advantage of Chromecast's simplified Wi-Fi setup, hijacking a wireless connection to deliver a YouTube video of Astley's groan-worthy hit.Dan Petro, a senior security analyst with consultancy Bishop Fox, wrote Thursday on the company's blog that the Rickmote, which uses a Raspberry Pi mini-computer, automates finding potential Chromecast devices to play the prank and briefly disconnects the device from the Wi-Fi network it is using.To read this article in full or to leave a comment, please click here READ MORE | Borrowing a technique from the software development community, Chef, maker of a popular system configuration tool, has released the first commercial software to support a new and supposedly more effective approach to managing hardware and software, called test-driven infrastructure."This is something relatively new," Colin Campbell, Chef director of patterns and practices, said of test-driven infrastructure. "Treating infrastructure as code produces a workflow that effectively can use the same testing process used for other types of software."Chef's namesake software, which helps automate the management chores associated with enterprise hardware and software, is open source, with contributions from a global base of volunteers. Over the past several years, a number of tools have been built for finding bugs and other issues within complex systems, as if they are software programs.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: Symantec Through a unique, synergistic alliance, HDS and Symantec now deliver data protection, data management, retention and recovery solutions that leverage the complementary capabilities of both companies. Learn more! | During a recent visit to Polycom's executive briefing center in San Jose, we got to see some cool demos that are helping Polycom continue to differentiate its service. Polycom has been well known for its high-end video conferencing and collaboration room systems for some time, but we were reminded during the visit that the company also has a wide range of systems that are compatible with less-structured environments. Two demos were especially fun, showcasing what Polycom calls "audio bubbles" and "audio fences." Anyone who has been on a conference call or video bridge agrees that background noise is distracting, and it is hard to avoid when including a large room of people or in a room that may not be purpose-built to manage sound quality. To read this article in full or to leave a comment, please click here READ MORE | The Internet Society and Aalto University of Finland have rolled out a free service/phone app dubbed Netradar designed to show who the broadband haves and have nots are around the world.Smartphone users are encouraged to download the app, which works on iPhones, Android, Windows, BlackBerry and other devices, so that measurements of their Internet access (bandwidth and latency) can be consolidated anonymously with those of others to provide a big global picture. Netradar.org Color-coded Netradar map of Internet access diversity.To read this article in full or to leave a comment, please click here READ MORE | Our roundup of intriguing new products from companies such as Anturis and Apcon READ MORE | WHITE PAPER: HP and Intel® Understanding evolving needs of IT infrastructure decision-makers from enterprise organizations in the converged infrastructure market and how CI vendors are meeting those needs. Learn More>> | SLIDESHOWS Worst data breaches of 2014…So far We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn MOST-READ STORIES 1. Ubuntu 14.04: Is Canonical taking on too much 2. Microsoft COO tells partners to get with the cloud program now 3. Say goodbye to desktop phones 4. Apple, IBM join to make iOS the default mobile platform 5. Windows Phone 8.1 and its first update could appear this week 6. U.S. malware share rising, Amazon service No.1 in hosting it 7. 10 disturbing attacks at Black Hat USA 2014 8. Microsoft may lay off over 6,000 employees 9. Russian hackers breach CNET, steal one million usernames, passwords and email addresses 10. Microsoft rumored to be buying security firm that publicized Active Directory exploit | | | | | | | |
No comments:
Post a Comment