High-tech

High-tech
Light

Monday, August 4, 2014

How cellphone calling is going all Internet

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Aug 3, 2014 7:53 AM
Subject: How cellphone calling is going all Internet
To: <aquarianm@gmail.com>
Cc:

Anticipating Black Hat

Oregon's move from Oracle-developed site to Healthcare.gov on track, official says

Network World Daily News AM
August 03, 2014
Share this email

How cellphone calling is going all Internet

Wireless carrier EE, in the UK, recently announced that it is about to let customers make regular mobile calls over Wi-Fi. Big deal, you may say: we've been making app-driven VoIP calls over mobiles for years, with Skype, and the like.Well what's interesting is that EE's solution will be seamless. For the first time in the UK, you won't need an app. It'll just happen — using the phone's stock dialer.The idea is aimed at providing voice service in spotty coverage areas.In the U.S., T-Mobile already has a virtually seamless Wi-Fi calling option on some phones, like the Samsung Galaxy S5. The idea is that you can select defaulting options in a Wi-Fi Calling Settings menu to use Wi-Fi for calls if cellular connectivity is unavailable.To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. Anticipating Black Hat

2. Oregon's move from Oracle-developed site to Healthcare.gov on track, official says

3. 'Right to be forgotten' goes predictably wrong

4. Cisco revamps CCNP for IoT, other market transitions

5. 15 great apps for Android Wear

6. One of Google's mysterious barges is on the move

7. Microsoft ordered to turn over customer data stored in the cloud

8. These old-timey Radio Shack photos prove techies have been nerding out since 1931

9. Half of surveyed US businesses shun SDNs

WHITE PAPER: Riverbed Technology

Riverbed Optimization System: Technical Overview

The Riverbed Optimization System (RiOS™) powers Riverbed's unique line of SteelHead™ application acceleration appliances and Steelhead Mobile client software. RiOS is based on technologies that solve a range of problems affecting wide area networks (WANs) and application performance. View now>>

Anticipating Black Hat

RSA 2014 seems like ancient history and the 2015 event isn't until next April.  No worries however, the industry is set to gather in the Las Vegas heat next week for cocktails, sushi bars, and oh yeah – Black Hat.Now Black Hat is an interesting blend of constituents consisting of government gum shoes, Sand Hill Rd. Merlot drinking VCs, cybersecurity business wonks, "beautiful mind" academics, and tattooed hackers – my kind of crowd!  As such, we aren't likely to hear much about NIST frameworks, GRC, or CISO strategies.  Alternatively, I am looking forward to deep discussions on: Advanced malware tactics.  Some of my favorite cybersecurity researchers will be in town to describe what they are seeing "in the wild."  These discussions are extremely informative and scary at the same time.  This is where industry analysts like me learn about the latest evasion techniques, man-in-the-browser attacks, and whether mobile malware will really impact enterprise organizations.  The anatomy of various security breaches.  Breaches at organizations like the New York Times, Nordstrom, Target, and the Wall Street Journal receive lots of media attention, but the actual details of attacks like these are far too technical for business publications or media outlets like CNN and Fox News.  These "kill chain" details are exactly what we industry insiders crave as they provide play-by-play commentary about the cybersecurity cat-and-mouse game we live in. Threat intelligence.  All of the leading infosec vendors (i.e. Blue Coat, Cisco, Check Point, HP, IBM, Juniper, McAfee, RSA, Symantec, Trend Micro, Webroot etc.) have been offering threat intelligence for years, yet threat intelligence will be one of the major highlights at Black Hat.  Why?  Because not all security and/or threat intelligence is created equally.  Newer players like BitSight, Crowdstrike, iSight Partners, Norse, RiskIQ, and Vorstack are slicing and dicing threat intelligence and customizing it for specific industries and use cases.  Other vendors like Fortinet and Palo Alto Networks are actively sharing threat intelligence and encouraging other security insiders to join.  Finally, there is a global hue and cry for intelligence sharing that includes industry standards (i.e. CybOX, STIX, TAXII, etc.) and even pending legislation.  All of these things should create an interesting discourse.  Big data security analytics.  This is an area I follow closely that is changing on a daily basis.  It's also an interesting community of vendors.  Some (i.e. 21CT, ISC8, Leidos, Lockheed-Martin, Norse, Palantir, Raytheon, etc.), come from the post 9/11 "total information access" world, while others (Click Security, HP, IBM, Lancope, LogRhythm, RSA, etc.) are firmly rooted in the infosec industry.  I look forward to a lively discussion about geeky topics like algorithms, machine learning, and visual analytics.  Las Vegas is simultaneously one of the most fun and banal places on earth, but next week it will become a hotbed of cybersecurity intrigue, intelligence, and brainpower.  It's likely to be 115 degrees in the shade, but I can't wait to get there. To read this article in full or to leave a comment, please click here READ MORE

Oregon's move from Oracle-developed site to Healthcare.gov on track, official says

Oregon's effort to transition its health insurance exchange from a problem-wracked website originally developed by Oracle to the federal Healthcare.gov platform is going according to schedule and expectations, state officials said this week."We're tracking as we should be tracking," said project head Tina Edlund during a press conference late Thursday, according to news reports. "We're making the progress we should be making."To read this article in full or to leave a comment, please click here READ MORE

'Right to be forgotten' goes predictably wrong

Google says lots of Europeans are not telling the truth, the whole and or anything resembling the truth when they ask to have search results about themselves "forgotten."Who could have predicted such an outcome? I mean who besides anyone with a modicum of common sense.From a story by our IDG New Service: In a letter to European data regulators, Google listed some of the challenges it faces in complying with the ruling, which allows people to compel search engines like Google and Bing to remove links to pages that mention their name, if the references are "inadequate," "irrelevant" or "excessive."To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: RES Software

Beyond the Enterprise App Store

Leverage proactive, secure and automated IT Service delivery to move beyond the traditional App Store and empower your users. Read the white paper to learn how Learn more

Cisco revamps CCNP for IoT, other market transitions

This week, Cisco announced some updates to its CCNP for Routing and Switching to bring it in line with current market transitions. The company has added new topics to the curriculum, such as mobility, IPv6, and scaling the network to support IoE, as well as how to leverage APIs. READ MORE

15 great apps for Android Wear

Expand your Android Wear horizons Google's Android Wear platform is pretty powerful out of the box -- but with the right set of apps, it can be made even more useful.To read this article in full or to leave a comment, please click here READ MORE

One of Google's mysterious barges is on the move

The Maine-docked Google barge, which created so much curiosity and brouhaha last fall, is on the move.A spokesman for the U.S. Coast Guard station in South Portland, Maine, confirmed that the barge , named BAL0011, was moved from where it's been docked in Portland harbor since last fall to South Portland. The move happened on Wednesday.Google's mysterious barge in Portland, Maine, seen in this photo from 2013, has moved to South Portland and has reportedly been sold. (Photo: Sharon Gaudin/Computerworld)While the barge's owner is not required to notify the Coast Guard about a move, the spokesman said it's believed that the barge will be leaving the area.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Red Hat

The Role of Linux in Datacenter Modernization

This IDC whitepaper examines how today's datacenters are adapting to and leveraging changing technologies and how Linux can act as an enabler for this evolution. Read on and learn more about Linux's evolving role in the datacenter now and in the future. Read Now

Microsoft ordered to turn over customer data stored in the cloud

Federal court says warrant for info stored in Ireland is not an extra-territorial application of U.S law; decision has privacy implications READ MORE

These old-timey Radio Shack photos prove techies have been nerding out since 1931

Just as Radio Shack moves to reinvent itself for 2014, we look at the most adorable photos from the company's archives. READ MORE

Half of surveyed US businesses shun SDNs

Juniper query of 400 finds 52.5% yay, 47.5% nay READ MORE

WHITE PAPER: BMC Software

Deliver Better Service and Support, More Efficiently

People and businesses can do amazing things when technology runs at its best. Changing requirements and expectations have placed new demands on IT; now it's time for a new approach to service and support. Learn More

SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Why TCP/IP is on the way out

2. Linux will not become a gaming platform, it already is one

3. 20 cool things you can do with a Raspberry Pi

4. Some are twisting the facts in requests to be forgotten, Google says

5. Top 20 colleges for computer science majors, based on earning potential

6. The best cities for landing top pay for your tech skills

7. Black Hat 2014: How to crack just about everything

8. Federal court system warns of new e-mail jury scam

9. 10 disturbing attacks at Black Hat USA 2014

10. Half of surveyed US businesses shun SDNs

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment