Network World Daily News PM | | An archive containing nearly 5 million Gmail addresses and plain text passwords was posted Tuesday on an online forum, but the data is old and likely sourced from multiple data breaches according to one security firm. | | Issue highlights 1. 9 Rules for the Developer-ization of IT 2. Get More Network World Newsletters! 3. INSIDER CIOs reveal their must-have mobile apps 4. Is there a viable alternative to ubiquitous GPS? 5. VMware patches third-party components in vSphere platform 6. Apple lays groundwork for global LTE roaming with new iPhones 7. Red Hat Satellite orbits the Amazon cloud 8. Man arrested on drug charges after butt-dialing 911 ... and this happens a lot 9. Windows 9 to users: I'm listening 10. Super Mobility Week: Samsung product tour 11. How to Ensure a Smooth IT Reorganization 12. First Look: The Apple Watch 13. First Look: iPhone 6 and iPhone 6 Plus | WHITE PAPER: OPSWAT Inc. Securing critical infrastructure is crucial to ensuring that our current way of life is sustained. Our whitepaper provides insight into the development of strong security policies around the use of portable media, and how to effectively mitigate the threat from external sources. Learn more | Image by ShutterstockThe acceptance of SaaS, the cloud and other easily accessible technologies allow the lines of business to drive innovation without necessarily turning to IT for help.While the CIO can take back some of that ground by becoming a broker and orchestrator of services, the real key to driving innovation and change today is app development, according to Jim Franklin, CEO of SendGrid, a largest provider of email infrastructure as a service.To read this article in full or to leave a comment, please click here READ MORE | We have a wide variety of newsletters to satisfy all sorts of IT pros READ MORE | For many of us, mobile apps have become a way of life. According to Nielsen, U.S. Android and iPhone users age 18 and older spend 65% more time each month using apps than they did just two years ago. Specifically, in fourth-quarter 2013, this population spent 30 hours, 15 minutes using apps, which is a half-day more than the 18 hours, 18 minutes they spent in fourth-quarter 2011. To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | What's the state-of-the-art in non-GPS based navigation and homing technology? That's the main question behind a Defense Advanced Research Projects Agency (DARPA) request to the industry this week as the group ponders where or not to go forward with a program that would seek an alternative to or a technology capable of augmenting GPS."As revolutionary as GPS has been, however, it has its limitations. GPS signals cannot be received underground or underwater and can be significantly degraded or unavailable during solar storms. More worrisome is that adversaries can jam signals. GPS continues to be vital, but its limitations in some environments could make it an Achilles' heel..." DARPA stated earlier this year.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: BMC Software This paper discusses five levers you can use to lower your mainframe MLC costs by up to 20 percent or more. Explore best practices and real-world examples of dramatic savings through a mainframe MLC optimization strategy based on higher visibility, predictability, and automation. Learn More | VMware has updated third-party libraries and components used by its vSphere server virtualization platform to integrate security patches released in recent months.The company released vCenter Server 5.5 Update 2 in order to include a patch for a remote code execution vulnerability in the Apache Struts Web framework used inside the product.The same vCenter Server release updates the Apache Tomcat component to version 7.0.52, originally released in February, which includes fixes for two denial-of-service and one information disclosure vulnerabilities.VCenter Server 5.5 Update 2 and vCenter Update Manager 5.5 Update 2 change the bundled Java Runtime Environment (JRE) version to 1.7 Update 55 that was released in April. This Java version contains patches for 37 security vulnerabilities.To read this article in full or to leave a comment, please click here READ MORE | By increasing the number of LTE bands to an astonishing 20 on the iPhone 6 models, Apple has paved the way toward global data roaming for the wireless technology. Now mobile operators just have to get their act together and agree on deals to make it a reality.At the end of July there were 318 commercial LTE networks in 111 countries. Unfortunately, most of these networks are virtual islands, thanks to the technical complexity of implementing all of them on smartphones and tablets. However, with the iPhone 6 and 6 Plus Apple has managed to get over that hump."I think this will matter a lot, actually. Because the new iPhones aren't just supporting the mainstream frequencies, but also up and coming bands such as 700MHz," said Alan Hadden, president at GSA (Global mobile Suppliers Association), which keeps track of LTE's expansion.To read this article in full or to leave a comment, please click here READ MORE | Red Hat Satellite, the software for managing fleets of servers running Red Hat Enterprise Linux, can now also manage copies of RHEL that run in the cloud as well."We've had a lot of emphasis in this release of expanding beyond the typical data center management to the cloud," said Chris Wells, Red Hat senior product manager for Red Hat Satellite.As a result of the update, "If someone is running RHEL on Amazon Web Services, they can use the same process to manage the lifecycle of that Red Hat system as one sitting in a physical or virtual system inside their data center," Wells said.Red Hat Satellite 6, released Wednesday, also comes with an entirely new interface for writing server configurations. The company replaced its own software with the popular open source configuration management software Puppet.To read this article in full or to leave a comment, please click here READ MORE | A Tennessee man is facing minor criminal charges after his butt-dialing 911 allowed police to overhear a restaurant conversation in which he allegedly discussed visiting a drug dealer.And before you say something like "no way" or "get out" or whatever, please be advised that butt-dialing 911 leads to police overhearing stuff that gets people arrested all the time. Or so say the police and Google.In Tennessee last Friday, the bummed-out butt-dialer was charged with possession of marijuana and drug paraphernalia, according to a TV news report. "Officers told News 2 the suspect had no idea he accidentally called 911 until they told him."To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: IBM Forrester has released its 2014 Dynamic Case Management Wave, and for the second consecutive time, IBM is a leader. View Now>> | The comedy "Frasier," set in Seattle, Washington, featured a radio psychiatrist who said to every caller "I'm listening."That seems to be the motto of the upcoming Windows 9 preview, expected on September 30. It will ask for feedback almost to the point of pestering you, according to a report from Neowin. Microsoft wants to collect all sorts of input from the users on everything. The feedback center will ask users about everything they like, don't like, which features should be changed, added or removed, and anything else.To read this article in full or to leave a comment, please click here READ MORE | Super Mobility Week: Samsung product tour Computerworld's Matt Hamblen gets updates on the latest products from Samsung at the Super Mobility Week (CTIA) event in Las Vegas. From: Network World Views: 0 0 ratings Time: 03:39 More in Science & Technology READ MORE | IT reorganizations are costly both in terms of resources and productivity. To minimize those costs, CIOs and IT leaders should understand the nature of the problems they are looking to solve, have a solid strategy and be sure that business strategy is at the heart of the reorganization efforts.Know the Problem Before going down the reorganization path consider other ways to fix what is ailing your organization. It all starts with having a grasp of what the actual problems are. Once you have that knowledge, you can decide what your next actions should be. "IT leaders should first ask themselves what they hope to accomplish," says Julie Stansbury, CIO of GE Capital Treasury.To read this article in full or to leave a comment, please click here READ MORE | READ MORE | A glimpse at Apple's much-anticipated new iPhones READ MORE | WHITE PAPER: Coresite Increasing demands on IT are forcing organizations to rethink their data center options. For many organizations, that means turning to the flexibility afforded them by outsourced cloud solutions, which can provide exponential cost savings. Learn More >> | SLIDESHOWS 7 sexy smartphone technologies coming your way A slew of new technological features are (or could be) coming to future smartphones. Here are seven that have been in the news over the last few years. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn MOST-READ STORIES of 2014 1. iPhone 6, Apple Watch features: Android's been there, done that 2. First Look: The Apple Watch 3. First Look: iPhone 6 and iPhone 6 Plus 4. Last-minute iPhone 6 rumors: Release date, water proof, shatter proof and more 5. Internet of Overwhelming Things 6. Big alternatives to the iPhone 6 and 6 Plus 7. 17 coolest iPhone 6, Apple Watch announcements 8. iPhone 6 is an apple, the Lumia 830 Windows Phone is an orange. 9. SDN and Network Virtualization: A Reality Check 10. Microsoft Patch Tuesday thwarts nosey malware | | | | | | | |
No comments:
Post a Comment