High-tech

High-tech
Light

Saturday, August 9, 2014

Top techs the CIA thinks are hot

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Aug 8, 2014 2:02 PM
Subject: Top techs the CIA thinks are hot
To: <aquarianm@gmail.com>
Cc:

Nadella leaves no doubt about who is in charge in first six months as CEO

IBM/DARPA turn out brain-like 5-billion transistor superchip

Network World Daily News PM
August 08, 2014
Share this email

Top techs the CIA thinks are hot

Through its investment firm called In-Q-Tel, the CIA funds companies, mostly start-ups, to push forward technologies deemed useful to government intelligence agencies. Here are the latest picks to get undisclosed amounts of IQT money; and for last year's summary of IQT picks, check here.To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. Nadella leaves no doubt about who is in charge in first six months as CEO

2. IBM/DARPA turn out brain-like 5-billion transistor superchip

3. Emerging tech used by Apple, Cisco will frustrate firewalls

4. T-Mobile could soon be bigger than Sprint

5. Security Primer: How malware is classified

6. The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

7. 10 tech pros who push their downtime to the limits

8. How to fix your Internet connection in Ubuntu Linux

9. The Internet of Things Brings Far-Reaching Security Threats

10. Rackspace clarifies its IaaS message

WHITE PAPER: Juniper Networks

Security in the Next-Generation Data Center

This white paper examines these trends, and it reveals the key capabilities that today's security teams require to effectively ensure that vital corporate assets remain secure, while at the same time optimizing access, cost, and administrative efficiency. View Now

Nadella leaves no doubt about who is in charge in first six months as CEO

He's had his share of hits and misses but he's made his presence felt from the start READ MORE

IBM/DARPA turn out brain-like 5-billion transistor superchip

DARPA-funded IBM researchers today said they have developed a human brain-inspired computer chip loaded with more than 5 billion transistors and 256 million "synapses," or programmable logic points, analogous to the connections between neurons in the brain.In addition to being one of the world's largest and most complex computer chips ever produced it requires only a fraction of the electrical power of conventional chips to operate, IBM and Defense Advanced Research Projects Agency (DARPA) stated.+More on Network World: The weirdest, wackiest and coolest sci/tech stories of 2014 (so far!); The weirdest, wackiest and coolest sci/tech stories of 2013+To read this article in full or to leave a comment, please click here READ MORE

Emerging tech used by Apple, Cisco will frustrate firewalls

Today's security software is ineffective against an emerging networking technology already in use by Apple for its Siri voice-recognition software, according to research presented at the Black Hat hacking conference this week. READ MORE

WHITE PAPER: HP

Why you need a next-generation firewall

This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations. Learn More

T-Mobile could soon be bigger than Sprint

Subscriber gains could make T-Mobile the third-biggest U.S. carrier later this year, a new report says READ MORE

Security Primer: How malware is classified

The security industry was born at a time when the threat landscape consisted primarily of computer viruses that were spread by floppy disks. Antivirus was the name of the game, and the term "computer virus" was a common topic of conversation everywhere from boardrooms to dining rooms.Today, the threat landscape has evolved immensely. The security industry has grown to address many different kinds of malware and other threats. Accurately describing these threats gives us the ability to discuss them in a common language and can help t raise awareness and educate the general public.In this video we give an overview the major criteria that are used to classify malware – propagation, harm done and resiliency. In future videos we'll describe each of these in greater detail.To read this article in full or to leave a comment, please click here READ MORE

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

Hacker heavenIt's that time of year again: The wonderful, terrifying week when hackers and security gurus descend upon Las Vegas to show off their skills and unleash presentation after presentation full of scary-sounding exploits. This year is no different. Over the previous week, we've heard tales of planes brought down by rogue code, snoops spying on your security cameras, and secretive, undetectable code that can turn any USB drive into an unstoppable malware vessel.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: MovinCool

Using Ceiling-Mount Air Conditioners to Cool Server Rooms

A new class of self-contained ceiling-mount air conditioners offers a cost-effective solution for cooling server rooms. The compact, space-saving units fit easily above a drop ceiling, have low installation costs, do not require penetration of walls and have no outside condensing unit to maintain. Learn more!

10 tech pros who push their downtime to the limits

As if IT leadership isn't challenging enough, some tech pros choose not to kick back when the day is done. Here's how flying a stunt plane or birthing a llama can make you a better leader. READ MORE

How to fix your Internet connection in Ubuntu Linux

Ubuntu's included NetworkManager software aims to make your network connections "just work." Nevertheless, sometimes thing go awry. There are times you have to adjust or change your connection settings, especially when using a laptop—just like in Windows.MORE ON NETWORK WORLD: Linux: Best desktop distros for newbies Luckily, you won't have to pull up the terminal and type any arcane commands to make your Internet connection work.To read this article in full or to leave a comment, please click here READ MORE

The Internet of Things Brings Far-Reaching Security Threats

WASHINGTON – Security pros routinely cite poor cyber hygiene as one of their top concerns. But if they're lying awake at night worried about lazy passwords and software updates going ignored, just think of the headaches that will come once thermostats, pacemakers and just about everything else comes online.When Randy Garrett contemplates the Internet of Things, he sees a colossal security challenge.MORE ON NETWORK WORLD: 12 most powerful Internet of Things companies Garrett, a program manager at the Defense Advanced Research Projects Agency (DARPA), worries that, in the exuberance to embed sensors in a galaxy of devices and bring them onto the network, backers of the Internet of Things will unwittingly create a virtually limitless set of new threat vectors.To read this article in full or to leave a comment, please click here READ MORE

Rackspace clarifies its IaaS message

Rackspace still offers IaaS, but only with a support package. READ MORE

WHITE PAPER: Dell

Achieve Deeper Network Security and Application Control

Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet to safeguard an organization from today's ever-evolving threats, NGFWs must be able to deliver an even deeper level of network security. View Now

SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Netscout sues Gartner over Magic Quadrant rating

2. Why TCP/IP is on the way out

3. Amazon Fire Phone: Nice but nothing to get fired up about

4. Rackspace bows out commodity IaaS market in favor of 'managed cloud'

5. Cisco's new UCS fabric interconnect: no ACI?

6. Smartphone kill-switch bill passes California assembly

7. Emerging networking technology used by Apple, Cisco will frustrate firewalls

8. IBM/DARPA turn out brain-like 5-billion transistor superchip

9. 10 ways to get noticed at Black Hat

10. Top 20 colleges for computer science majors, based on earning potential

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment