Network World Daily News PM | | Our roundup of intriguing new products from companies such as Fleetmatics and Array Networks | | Issue highlights 1. Delaware whacks $1B data center/power supply project 2. Oracle to release 115 security patches 3. Current bands with the techiest names 4. INSIDER Special report: The triumph of JavaScript 5. Looking for movie times? Bing beats Google 6. The Gameover Trojan program is back, with some modifications 7. Government Cloud Use Requires a Culture Shift 8. Court case offers a peek at how H-1B-fueled discrimination works 9. Infosys revenue and profit rise ahead of CEO change 10. Microsoft 3.0: Satya Nadella is now fully in charge 11. Lenovo ships first 4K laptop, challenging Toshiba 12. iWatch production may be delayed until November 13. Time to dress up my iPhone? 14. The biggest data breaches of 2014 (so far) | WHITE PAPER: Dell Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet to safeguard an organization from today's ever-evolving threats, NGFWs must be able to deliver an even deeper level of network security. View Now | University of Delaware The University of Delaware data center project The University of Delaware this week killed off a plan to develop a 900,000 sq. ft. data center project that included a 279-megawatt cogeneration power plant. READ MORE | Oracle is planning to release 115 security patches for vulnerabilities affecting a wide array of its products, including its flagship database, Java SE, Fusion Middleware and business applications.The update includes fixes for 20 weaknesses in Java SE, all of which can be exploited by an attacker remotely, without the need for login credentials, Oracle said in an announcement prior to Tuesday's patch release.Some 29 fixes are for Oracle's Fusion Middleware suite, with 27 able to be exploited over a network without the need for authentication. Affected middleware components include BI Publisher, GlassFish Server, HTTP Server, JDeveloper, WebCenter Portal and WebLogic Server.To read this article in full or to leave a comment, please click here READ MORE | A simple question: What are the techiest/geekiest band names going these days?I've started a list and would love your help building it out...*Big Data: "a paranoid electronic music project from the Internet, formed out of a general distrust for technology and The Cloud (despite a growing dependence on them)." *Dot Commies: A 90's cover band from Nashville.To read this article in full or to leave a comment, please click here READ MORE | JavaScript is the reigning programming language across platforms and devices. Harness that power with the right frameworks and tools READ MORE | WHITE PAPER: Netscout Systems Inc. This EMA whitepaper examines the move towards application/service performance visibility within IT operations, and in particular the network-based delivery of those applications and services and the role that network-based visibility can and should play. Learn More | What times are that movie you want to see being shown at the local cinema? Finding out constitutes one of the more common of Web searches and one I've always conducted using Google.But maybe I should be using Bing, at least according to a quick side-by-side survey undertaken by Search Engine Land. Both Bing and Google strive to provide local movie times within the first result returned on a title search, as the screen shot above shows for "Deliver Us From Evil" on Bing. Search Engine Land found: After performing movie title searches for last weekend's top box office hits on both search engines, we discovered Bing returned movie showtimes for 100 percent of the searches, while Google was successful only 70 percent of the time.To read this article in full or to leave a comment, please click here READ MORE | Cybercriminals are trying to create a new botnet based on what is likely a modification of Gameover Zeus, a sophisticated Trojan program whose command-and-control infrastructure was taken over by law enforcement agencies at the beginning of June.The Gameover Zeus malware is designed to steal log-in credentials, as well as personal and financial information from users when they access banking and other popular websites.According to the U.S. Federal Bureau of Investigation, which took part in the Gameover botnet takedown, the Trojan program infected more than a million computers globally and led to losses of over US$100 million.To read this article in full or to leave a comment, please click here READ MORE | WASHINGTON – If the government is to realize its goal of running an agile, largely cloud-based technology operation, it will require buy-in from all corners of the agency, senior technology executives said at a government IT conference on Wednesday.Barry West, CIO of the Pension Benefits Guaranty Corporation, describes that process as "socializing cloud on the business side," and it can be a lonely fight without support at the highest reaches of the agency.10 of the Most Useful Cloud Databases "You have to really have a sponsor in your organization that believes in cloud and is willing to take some risk into new areas that they may not have been in before," West says. That executive sponsor should sit at the CIO level or higher (director, administrator, secretary, deputy secretary, chief management officer or the like), he adds.To read this article in full or to leave a comment, please click here READ MORE | The passage of the Affordable Care Act brought with it a burst of IT spending and hiring. The District of Columbia, for instance, hired offshore outsourcing firm Infosys for $49.5 million to build its Healthcare Exchange.The India-based Infosys brought in H-1B visa holders to work on the government project. And of the approximately 100 Infosys employees working on the healthcare project, only three were American, according to a civil lawsuit filed in federal court.The IT professional making the claim, Layla Bolten, has a degree in computer science and has been in IT since 1996. An experienced tester, which is what she was hired for, Bolten often helped less-experienced staff.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: HP Security breaches can happen anywhere in an organization, and having the ability to analyze any form of data can give you the edge against fraud, theft, and infiltration by pinpointing abnormal behavior patterns. Learn More | SAP's former technology chief Vishal Sikka will take over as CEO of Infosys on Aug. 1 READ MORE | The open letter from Microsoft CEO Satya Nadella shows that the Ballmer era is indeed over and he's ready to shake some trees, rock some boats, insert your favorite cliché here, to change course at that company.The letter makes it pretty clear that Nadella is looking to reverse course on what Ballmer was doing, particularly at the end of his run. It doesn't get clearer than in this statement: "More recently, we have described ourselves as a 'devices and services' company. While the devices and services description was helpful in starting our transformation, we now need to hone in on our unique strategy."To read this article in full or to leave a comment, please click here READ MORE | Lenovo's first 4K laptop, the IdeaPad Y50 UHD, starts at $1,299.99 READ MORE | The second half of 2014 promises to be huge for Apple. Not only will Apple likely release two new iPhone models with larger screen sizes, but the company's somewhat mythical iWatch is also slated for release before year's end.That said, the intricacies involved in getting the iWatch to market will reportedly lead to some delays. According to in-the-know analyst Ming-Chi Kuo, mass production on the iWatch has been pushed back to November. Previously, it was believed that production would commence sometime in September or October at the latest.AppleInsider relayed some of Kuo's statements on the iWatch, noting that the device "represents a new level of difficulty for Apple in regard to both hardware and software development."To read this article in full or to leave a comment, please click here READ MORE | Penn State University researchers have found that decorating your mobile phone is largely a cultural thing, and it looks like I'm behaving pretty darn American on this front.The study involved surveys of American and South Korean students, and found that the South Koreans were more likely to customize their phones, whether it be with charms, special ringtones, stickers or cases. "People who live in collectivist cultures are often more other-directed,"said S. Shyam Sundar, Distinguished Professor of Communications and co-director of the Media Effects Research Laboratory at Penn State, in a statement. "They want to know how others might look at them and also look to others as a way of influencing their own behaviors."To read this article in full or to leave a comment, please click here READ MORE | In the battle to keep your personal information private, it's not just hackers you have to worry about but lax security and stupidity.A survey of data breaches in the first six months of this year shows an increasing number of incidents in which data, including names and addresses, credit card and Social Security numbers, and medical records was lost to criminals or exposed.In many of the cases, the breaches were put down to poor data security practices or simple errors: like St. Vincent Breast Center in Indianapolis sending 63,000 letters containing information on upcoming appointments to the wrong people, or Stanford Federal Credit Union accidentally attaching a file with information on 18,000 customers to an email, or the thousands of paper medical records dumped at a public incineration site in York, Pennsylvania.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: Infortrend Did you know that Infortrend's EonStor DS systems are ideal solutions for storage infrastructure consolidation, high-availability clusters, server virtualization and green datacenters? And now, they're 16Gb Fibre Channel-ready. Learn more >> | | | | | |
No comments:
Post a Comment