High-tech

High-tech
Light

Saturday, August 2, 2014

15 great apps for Android Wear

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Aug 1, 2014 1:50 PM
Subject: 15 great apps for Android Wear
To: <aquarianm@gmail.com>
Cc:

HP agrees to settle allegations it overbilled US Postal Service

Microsoft ordered to turn over customer data stored in the cloud

Network World Daily News PM
August 01, 2014
Share this email

15 great apps for Android Wear

All Android Wear apps are not created equal. Here are 15 standout selections that actually add value to the smartwatch form.

READ MORE
 

Issue highlights

1. HP agrees to settle allegations it overbilled US Postal Service

2. Microsoft ordered to turn over customer data stored in the cloud

3. Amazon's four tips to make sure your cloud is secure

4. German copyright law is unconstitutional, Yahoo says in complaint

5. Android vulnerability still a threat to many devices nearly two years later

6. Apple welcomes Beats "to the family"

7. 'Right to be forgotten' goes predictably wrong

8. Cisco revamps CCNP for IoT, other market transitions

9. Attackers can easily create dangerous file-encrypting malware, new threat suggests

10. One of Google's mysterious barges is on the move

11. How to troubleshoot Mac Wi-Fi problems

12. Austrian privacy campaigner files 'class action' suit against Facebook over privacy policy

WHITE PAPER: Smartling

Selecting the Best Translation Options for Your Business

Smartling's guide reviews the advantages and disadvantages of common translation options and provides guidance on optimal use cases. There are many translation options to consider including professional human translation, computer-generated translation with human editing, and more. Learn More

HP agrees to settle allegations it overbilled US Postal Service

Hewlett-Packard has agreed to pay US$32.5 million to settle allegations that it overbilled the U.S. Postal Service on a IT hardware contract.The U.S. Department of Justice had alleged that HP overbilled the Postal Service for a government contract called Acquisition of Desktop Extended Processing Technology (ADEPT) II, which ran between October 2001 and December 2010. HP allegedly failed to comply with pricing terms of the contract that required the company to offer the Postal Service prices that were not higher than offered to HP customers with comparable contracts, the DOJ said in a news release.The DOJ also alleged that HP misrepresented its prices.To read this article in full or to leave a comment, please click here READ MORE

Microsoft ordered to turn over customer data stored in the cloud

In a decision that could have broad privacy implications, a federal court in New York Thursday ordered Microsoft to comply with a U.S. government demand for a customer's emails stored on a company server in Dublin, Ireland. The decision upholds an earlier magistrate court decision.In an oral ruling, District Court Judge Loretta Preska rejected Microsoft's argument that a U.S search warrant does not extend beyond the country's borders."The production of that information is not an intrusion on the foreign sovereign," Courthouse News reported Judge Preska as saying. "It is incidental at best," Preska noted, adding that the magistrate court order was not an extra territorial application of U.S. law.To read this article in full or to leave a comment, please click here READ MORE

Amazon's four tips to make sure your cloud is secure

Amazon Web Services has a program named Trusted Advisor that provides customers with advice on the best way to use the company's IaaS cloud services. Today, the company made four checks that Trusted Advisor performs free for all users.MORE ON NETWORK WORLD: 10 Most Powerful IaaS Companies Trusted Advisor has 33 tests that it performs on customers' AWS cloud deployments, and it adds to those occasionally. These range from setting up notifications from Trusted Advisor, to setting access management policies, reviewing recent changes and usage, ensuring AWS virtual machines are appropriately sized to providing visual breakdowns of AWS usage.To read this article in full or to leave a comment, please click here READ MORE

German copyright law is unconstitutional, Yahoo says in complaint

A German copyright law that gives publishers the exclusive right to the commercial use of their content online is unconstitutional according to Yahoo, which has filed a complaint with Germany's Federal Constitutional Court.The law, which came into effect last August, gives publishers exclusive commercial rights over their content online except in the case of single words or small text snippets.The exemption for small text snippets was added to allow search engines and aggregators to continue to show parts of news articles without infringing on copyright. However, publishers interpret the law differently and are demanding compensation from search engines.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Riverbed Technology

Riverbed Optimization System: Technical Overview

The Riverbed Optimization System (RiOS™) powers Riverbed's unique line of SteelHead™ application acceleration appliances and Steelhead Mobile client software. RiOS is based on technologies that solve a range of problems affecting wide area networks (WANs) and application performance. View now>>

Android vulnerability still a threat to many devices nearly two years later

Many apps that use the Android addJavascriptInterface API are still vulnerable to JavaScript code injection, researchers from Bromium said READ MORE

Apple welcomes Beats "to the family"

Apple updated its website today with a new section welcoming Beats "to the Apple family." READ MORE

'Right to be forgotten' goes predictably wrong

Google says lots of Europeans are not telling the truth, the whole and or anything resembling the truth when they ask to have search results about themselves "forgotten."Who could have predicted such an outcome? I mean who besides anyone with a modicum of common sense.From a story by our IDG New Service: In a letter to European data regulators, Google listed some of the challenges it faces in complying with the ruling, which allows people to compel search engines like Google and Bing to remove links to pages that mention their name, if the references are "inadequate," "irrelevant" or "excessive."To read this article in full or to leave a comment, please click here READ MORE

Cisco revamps CCNP for IoT, other market transitions

There's no company in technology that's taken advantage of market transitions more often than Cisco. In almost every presentation that CEO John Chambers gives, he opines about how catching market transitions at the right time has been the primary vehicle for Cisco's growth over the past few decades. In fact, one of my key research principals is that significant share gain can only be achieved during moments of market transition. For example, had Cisco tried to enter the legacy PBX market, I'm not sure they would have had any success. However, they hit the shift to VoIP at the right time and now they're the market leader in telephony.Catching market transitions has more to do with products, though. It's about creating an ecosystem of support around the products. Cisco's certification program is the best in the industry and has created an army of engineers that understand how to build networks "the Cisco way." One of the staple certifications is the Cisco Certified Network Professional (CCNP), which is a stepping stone towards the highly coveted Cisco Certified Internetworking Engineer (CCIE).To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Riverbed Technology

2014 Gartner Magic Quadrant Report

For the 7th year in a row, Riverbed is in the "Leaders" Quadrant of the 2014 Magic Quadrant for WAN Optimization Controllers. In this report, Gartner evaluates vendors based on their ability to execute and completeness of vision. Get Report Now>>

Attackers can easily create dangerous file-encrypting malware, new threat suggests

A new program that encrypts files to extort money from users highlights that attackers don't need advanced programming skills to create dangerous and effective ransomware threats, especially when strong encryption technology is freely available.Researchers from antivirus vendor Symantec recently came across a Russian-language—for now—ransomware program of which the core component is a simple batch file—a command-line script file.This development choice allows the attacker to easily control and update the malware, said Symantec researcher Kazumasa Itabashi in a blog post Thursday. The batch file downloads a 1024-bit RSA public key from a server and imports it into GnuPG, a free encryption program that also runs from the command line. GnuPG, which is an open-source implementation of the OpenPGP encryption standard, is used to encrypt the victim's files with the downloaded key. "If the user wants to decrypt the affected files, they need the private key, which the malware author owns," Itabashi said. In public-key cryptography, which OpenPGP is based on, users generate a pair of associated keys, one that is made public and one that is kept private. Content encrypted with a public key can only be decrypted with its corresponding private key. The new ransomware threat that Symantec calls Trojan.Ransomcrypt.L encrypts files with the following extensions: .xls, .xlsx, .doc, .docx, .pdf, .jpg, .cd, .jpeg, .1cd, .rar, .mdb and .zip. Victims are asked to pay a ransom of €150 (around US$200) to recover them. What sets Trojan.Ransomcrypt.L apart is not its use of public-key cryptography for encryption—other threats do the same—but its simplicity and the fact that the author chose to use a legitimate and open-source encryption program instead of creating his own implementation, which malware authors often do. There are some complex ransomware programs with advanced features that are developed with the primary goal of being sold to other cybercriminals who lack the skills to create their own.To read this article in full or to leave a comment, please click here READ MORE

One of Google's mysterious barges is on the move

The Maine-docked Google barge, which created so much curiosity and brouhaha last fall, is on the move.A spokesman for the U.S. Coast Guard station in South Portland, Maine, confirmed that the barge , named BAL0011, was moved from where it's been docked in Portland harbor since last fall to South Portland. The move happened on Wednesday.Google's mysterious barge in Portland, Maine, seen in this photo from 2013, has moved to South Portland and has reportedly been sold. (Photo: Sharon Gaudin/Computerworld)While the barge's owner is not required to notify the Coast Guard about a move, the spokesman said it's believed that the barge will be leaving the area.To read this article in full or to leave a comment, please click here READ MORE

How to troubleshoot Mac Wi-Fi problems

It happens to all of us: Suddenly, the wireless connection to your Mac slows down or disappears completely. When that happens, here's what to do. READ MORE

Austrian privacy campaigner files 'class action' suit against Facebook over privacy policy

Privacy campaign group Europe-v-Facebook is inviting Facebook users outside the U.S. and Canada to join a lawsuit against the company, which it alleges violates privacy laws.Europe-v-Facebook's front man Max Schrems filed suit with the commercial court in Vienna, Austria, where he lives, the group said Friday on a website devoted to the case, fbclaim.com.Schrems sued Facebook Ireland, which is responsible for processing the data of users outside the U.S. and Canada. Under EU law, consumers can always sue businesses at the relevant court of their home country. Moreover, the Austrian courts have reasonable fees compared to other countries, the group explained.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Riverbed Technology

Riverbed Optimization System: Technical Overview

The Riverbed Optimization System (RiOS™) powers Riverbed's unique line of SteelHead™ application acceleration appliances and Steelhead Mobile client software. RiOS is based on technologies that solve a range of problems affecting wide area networks (WANs) and application performance. View now>>

SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Why TCP/IP is on the way out

2. Linux will not become a gaming platform, it already is one

3. 20 cool things you can do with a Raspberry Pi

4. Some are twisting the facts in requests to be forgotten, Google says

5. Top 20 colleges for computer science majors, based on earning potential

6. The best cities for landing top pay for your tech skills

7. Black Hat 2014: How to crack just about everything

8. Federal court system warns of new e-mail jury scam

9. 10 disturbing attacks at Black Hat USA 2014

10. Half of surveyed US businesses shun SDNs

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment