Network World Daily News AM | | These folks won't migrate. The reason probably isn't what you're thinking. | | Issue highlights 1. 2014's Hottest IT Certification 2. VMware acquires CloudVolumes for faster virtual app delivery 3. Retired US airport body scanners fail to spot guns, knives 4. 17 ways to hate Microsoft Outlook 2013 less 5. Analysis of tweets around Ferguson shows Twitter's quick grip on the news 6. The UPS Store says malware found on systems of 51 stores 7. Tablets priced under $35 on the horizon 8. Plug-and-play Android security layer outlined by NC State researchers 9. LG's high-end smartphone features trickle down to new L series 10. Our 10 favorite techie Simpsons episodes and moments | WHITE PAPER: IBM Forrester has released its 2014 Dynamic Case Management Wave, and for the second consecutive time, IBM is a leader. View Now>> | In the world of technology, the certifications and skills that organizations need to keep pace is constantly shifting. To help you find the most valuable certifications to advance your tech career, CIO.com spoke with David Foote, Chief Analyst and Research Officer with Foote Partners, to find out what certifications are on fire in today's IT market. READ MORE | Extending its desktop virtualization stack, VMware has acquired CloudVolumes, a 3-year-old startup that developed software for delivering virtualized applications on the fly."Fundamentally customers are trying to move to a world where they can reduce complexity and cost not just by simplifying application management infrastructure, but by leveraging real-time application delivery to reduce support costs," wrote Harry Labana, CloudVolumes' senior vice president and chief product officer, explaining the potential appeal of his company's software, in a blog post announcing the acquisition.To read this article in full or to leave a comment, please click here READ MORE | Tests on the Rapiscan Secure 1000 shows weapons can be smuggled by exploiting weaknesses READ MORE | WHITE PAPER: CDW Here's what to consider when putting together a mobile policy designed to support a highly productive workforce. Read Now | Few software products draw such universal -- and deserved -- scorn as Outlook 2013. Here's how to tame the beast READ MORE | Is social media in general and Twitter in particular speeding up the news cycle?Twitter posts related to the shooting last week of Michael Brown in Ferguson, Missouri, started appearing a full two days before cable news outlets like MSNBC, CNN and Fox News put the story in prime time, according to a report published Wednesday by the Pew Research Center.Roughly 146,000 posts related to the shooting were published to Twitter on Saturday, Aug. 9, the day Brown was shot and killed by a police officer, Pew researchers found. MSNBC and Fox did not devote prime-time coverage to the shooting and the surrounding events until Monday, with 21 minutes and 6 minutes of coverage a piece, respectively. CNN began its prime-time coverage on Tuesday, with 24 minutes.To read this article in full or to leave a comment, please click here READ MORE | The UPS Store said Wednesday that malicious software was found on the systems of 51 of its franchises in 24 U.S. states, although no fraud has been detected yet.The subsidiary of United Parcel Service, which has 4,470 U.S. stores, said in a notice that customer names, postal and email addresses and payment card information may have been exposed.The earliest evidence of malware found on a system dates to Jan. 20, The UPS Store said. Most of the 51 stores were affected between March 26 and Aug. 11, when the malware was removed. The UPS Store said it is now safe to use payment cards at its franchises.To read this article in full or to leave a comment, please click here READ MORE | WEBCAST: IBM ING, one of the largest banks in Europe needed to reduce the high cost of isolated, inefficient application development. They chose IBM PureApplication System to move their IT infrastructure to a cloud-based shared service model. In this Webcast, ING executive, Mark Willemse, shares the lessons ING learned from this strategic initiative. Learn more | No-name tablets from China could deliver decent performance at a price of $35 or under READ MORE | A modified version of Android uses a system of modularized plugins to help make sure the latest security tools make it into the hands of end users as quickly as possible.The Android Security Modules framework, as outlined in a paper from researchers North Carolina State University and Germany's TU Darmstadt, is a programmable interface for deploying security updates in the field, without the need for root access to the Android device.+ ALSO ON NETWORK WORLD: Munich reverses course, may ditch Linux for Microsoft | 5 Cool Security Breakthroughs at USENIX Security event +To read this article in full or to leave a comment, please click here READ MORE | LG Electronics is bringing features from its more expensive smartphones into the hotly contested low-end segment of the market.On Thursday, the company announced the L Bello and L Fino, two 3G Android-based smartphones that echo some aspects of the design of LG's G3 flagship model.They have buttons on the back just like the G3, and the L Bello's plastic back is reminiscent of the texture used on the G3. The material is different but it has the same "metallic skin design" for a similar look and feel, an LG spokeswoman said via email. Both models look more sophisticated than their predecessors.The smartphones have also inherited the G3's QuickCircle cases, which give access to frequently used functions such as calling, text messaging, music and camera all from the window without opening the cover.To read this article in full or to leave a comment, please click here READ MORE | Homer, family and friends take on everything from The Internet to Apple and Google Glass. READ MORE | WHITE PAPER: Skyhigh Networks To minimize risk, organizations must employ a methodology to identify and select enterprise-ready cloud services. This 21 step checklist includes the five categories of attribute to evaluate and an audit framework from the Cloud Security Alliance View Now>> | | | | | | | |
No comments:
Post a Comment