High-tech

High-tech
Light

Tuesday, July 15, 2014

Say goodbye to desktop phones

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jul 15, 2014 2:33 PM
Subject: Say goodbye to desktop phones
To: <aquarianm@gmail.com>
Cc:

Rackspace rolls out new hosted computing tier: Managed cloud

Would Microsoft really cut its QA department?

Network World Daily News PM
July 15, 2014
Share this email

Say goodbye to desktop phones

"When are we going to get rid of these things?" said Ken Henderson's boss as he pointed at the corded desktop telephone that has been emblematic of the American office for decades."I'm glad you asked that," replied Henderson, the assistant vice president for technical infrastructure at American Fidelity Assurance in Oklahoma City. He outlined to his boss, AFA President David Carpenter, a plan that had been gestating for a while. The recent purchase of a new headquarters building was the spark to put it into action.The insurer's IT group is shifting hundreds of employees to voice-over-IP "softphones" on Windows 7 laptops and Apple iPad tablets, all clients to Microsoft Lync Server, for IM and video conferencing and now for VoIP calls, over an 802.11ac wireless LAN from Aruba Networks.To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. Rackspace rolls out new hosted computing tier: Managed cloud

2. Would Microsoft really cut its QA department?

3. Overreliance on the NSA led to weak crypto standard, NIST advisers find

4. Russian hackers breach CNET, steal one million usernames, passwords & email addresses

5. Google sets up cybercrime-busting task force

6. DARPA initiates reusable, aircraft-like spaceship development

7. Box lifts storage limit on Business edition, integrates service with Office

8. How the Internet of Things will – and won't – change IT

9. Feds declare big win over Cryptolocker ransomware

10. Threat intelligence lifecycle maturation in the enterprise market

11. Zimbra buys its way into cloud storage market

12. Y2K bug resurfaces and sends draft notices to 14,000 men born in the 1800s

13. Google's smart contact lens is not what it sounds like

14. Oracle hopes to make SQL a lingua franca for big data

WHITE PAPER: HP

Protecting Your Mid-Size Business from Security Threats

Security breaches in large enterprises make the headlines, but 55% of small and mid-size businesses have also experienced a data breach. And 60% of small businesses fail within six months of falling victim to a cyber attack. Learn More

Rackspace rolls out new hosted computing tier: Managed cloud

Rackspace Tuesday announced a Managed Cloud offering, which combines the benefits of a managed service with the elastic scalability of a cloud. The San Antonio company's move represents an attempt to differentiate itself within an increasingly competitive public cloud computing market that has evolved from services such as co-location and managed services. + MORE AT NETWORK WORLD: This is what the new hybrid cloud looks like | Say goodbye to desktop phones +To read this article in full or to leave a comment, please click here READ MORE

Would Microsoft really cut its QA department?

Bloomberg says Microsoft's quality assurance team might be the target of cuts, but that borders on the unthinkable. READ MORE

Overreliance on the NSA led to weak crypto standard, NIST advisers find

The National Institute of Standards and Technology needs to hire more cryptographers and improve its collaboration with the industry and academia, reducing its reliance on the U.S. National Security Agency for decisions around cryptographic standards.Lack of internal expertise in certain areas of cryptography and too much trust in the NSA led NIST to ignore security concerns about a pseudorandom number generator called Dual_EC_DRBG (Dual Elliptic Curve Deterministic Random Bit Generator) in 2006, technical experts who reviewed the organization's standards development process said in a report released Monday.To read this article in full or to leave a comment, please click here READ MORE

Russian hackers breach CNET, steal one million usernames, passwords & email addresses

The Russian hacker group that goes by w0rm breached CNET and pilfered a database containing usernames, emails, and encrypted passwords for more than a million registered users.On Saturday, @rev_priv8 tweeted "proof" of the hack. https//w0rm.in/cnet.com.tar.gz cnet hacked, here is src of www. pic.twitter.com/ggkaNF3VfE— w0rm (@rev_priv8) July 12, 2014 rev_priv8 for w0rm Janne Ahlberg, a product security professional and pentester who works at Microsoft, pointed out that the leaked source code package contained an offer to sell the CNET database for one bitcoin, which equaled $624.04 at the time of writing this post. CNET later said the group will not "distribute" its source code.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: BMC Software

Meeting the Exploding Demand for New IT Services

In this eBook, explore the top trends driving the New IT for IT Service Management, and how leading organizations are evolving to focus on end-user experience. Learn More

Google sets up cybercrime-busting task force

Google has set up an internal task force that will work to expose the activities and techniques of malicious Internet wrongdoers, aiming to cut down on the number of targeted cyberattacks."You should be able to use the Web without fear that a criminal or state-sponsored actor is exploiting software bugs to infect your computer, steal secrets or monitor your communications," wrote Chris Evans, a Google security researcher, in a blog post Tuesday announcing the initiative, called Project Zero. "Yet in sophisticated attacks, we see the use of 'zero-day' vulnerabilities to target, for example, human rights activists or to conduct industrial espionage. This needs to stop. We think more can be done to tackle this problem."To read this article in full or to leave a comment, please click here READ MORE

DARPA initiates reusable, aircraft-like spaceship development

Looking to build a hypersonic transport would be the heart of less expensive satellite launch system, the Defense Advanced Research Projects Agency (DARPA) said it awarded three contracts to being work on the spacecraft.DARPA said Boeing (working with Blue Origin) Masten Space Systems (working with XCOR Aerospace) and Northrop Grumman Corporation (working with Virgin Galactic) would begin phase 1 work on the agency's Experimental Spaceplane (XS-1) program that aims to design, build, and demonstrate a reusable Mach 10 aircraft capable of carrying and deploying an upper stage that can place 3,000- 5,000 lb. satellite into low earth orbit (LEO) at a target cost of less than $5M per launch.To read this article in full or to leave a comment, please click here READ MORE

Box lifts storage limit on Business edition, integrates service with Office

Box has integrated its cloud storage and file share service with Microsoft's Office productivity apps suite, and will offer unlimited capacity to customers of its Business edition, as the company waits for the right time to go public.The online storage provider already offers unlimited storage with its Enterprise plan, which costs US$35 per user/month, but the capacity was capped at 1TB for the Business edition, which costs $15 per user/month.That 1TB of storage had to be shared among the users in the Business account, and this was a problem for customers who want to roll out Box at a large, company-wide scale using the plan."Enterprises shouldn't worry about storage when using Box," said CEO Aaron Levie.To read this article in full or to leave a comment, please click here READ MORE

How the Internet of Things will – and won't – change IT

A new survey indicates IT folks are worried about the impact of the IoT, but aren't doing much about it. That may be OK. READ MORE

WHITE PAPER: APC by Schneider Electric

Types of Prefabricated Modular Data Centers

There are important distinctions between the types of data center factory-built building blocks on the market. This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, and compares their key attributes. View more

Feds declare big win over Cryptolocker ransomware

'Neutralized' the extortion software; but hacker gang is already spewing new malware, experts say READ MORE

Threat intelligence lifecycle maturation in the enterprise market

A plethora of intelligence feeds are driving new products, services, and enterprise threat intelligence strategy. READ MORE

Zimbra buys its way into cloud storage market

Cloud storage and file-sharing fever has hit Zimbra.The company has acquired Mezeo to expand its product lineup, which includes the Zimbra Collaboration email and calendaring system and the Zimbra Community enterprise social networking (ESN) suite.MezeoFile, a file-sync and -share application, and MezeoCloud, a storage platform, include enterprise-grade IT controls, compliance and security, according to Zimbra.Zimbra's products already have light file sharing and storage, but the capabilities aren't as robust as those in the Mezeo wares, said Patrick Brandt, CEO of Zimbra.In addition, the file-sharing and storage components of Zimbra's existing products are hardwired and can't act as stand-alone storage repositories for other products. Moreover, the Mezeo products are architected to scale up for massive workloads.To read this article in full or to leave a comment, please click here READ MORE

Y2K bug resurfaces and sends draft notices to 14,000 men born in the 1800s

That Y2K bug that made life miserable for so many IT professionals in the late 1990s has proven to be problematic just recently for the next of kin of some 14,000 men who were born in the 1800's.From an AP report: The Selective Service System mistakenly sent notices to more than 14,000 Pennsylvania men born between 1893 and 1897, ordering them to register for the nation's military draft and warning that failure to do so is ''punishable by a fine and imprisonment.''The glitch originated with the Pennsylvania Department of Motor Vehicles during an automated data transfer of nearly 400,000 records to the Selective Service. The records of males born between 1993 and 1997 were mixed with those of men born a century earlier, Selective Service spokesman Pat Schuback told The Associated Press on Thursday. The federal agency didn't know it because the state uses a two-digit code to indicate year of birth.To read this article in full or to leave a comment, please click here READ MORE

Google's smart contact lens is not what it sounds like

Google and Novartis are releasing a smart contact lens that measures glucose levels and corrects vision. READ MORE

Oracle hopes to make SQL a lingua franca for big data

Oracle is hoping to turn heads in the crowded data analysis market with Big Data SQL, a software tool that can run a single SQL query against Oracle's own database as well as Hadoop and NoSQL data stores.The software is an option for Oracle's Big Data Appliance, which incorporates Cloudera's Hadoop distribution, said Neil Mendelson, vice president of product development, big data and analytics.There's a lot of experimentation going on in enterprises around so-called big data, but certain factors are impeding customers from moving these projects into production mode, namely a lack of integration between Hadoop and other systems, difficulty obtaining the right talent and concerns about security, Mendelson said.To read this article in full or to leave a comment, please click here READ MORE

: F5 Networks

How CARFAX Consolidated Their Security Solutions

CARFAX needed to protect its website from attacks, ensure website availability, prevent data theft, and enhance the scalability of its infrastructure. Through a consolidated F5 solution, CARFAX cut site downtime to zero, secures its data, and deployed a high-performance infrastructure to support its rapid growth. Learn more >>

SLIDESHOWS

Worst data breaches of 2014…So far

We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Windows Phone 8.1 and its first update could appear this week

2. Ubuntu 14.04: Is Canonical taking on too much?

3. 10 changes CEO Nadella wants from Microsoft workers

4. Say goodbye to desktop phones

5. The Firewall: Questions abound about its future role in cloud, mobile and SDN environments

6. The worst security SNAFUs this year (so far!)

7. 20 cool things you can do with a Raspberry Pi

8. Cisco singing a different ACI tune

9. New products of the week 07.14.14

10. MIT invents T-1000 robot precursor technology, may have doomed us all

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment