Network World Daily News AM | | It has been a summer of discontent for the Android security community, as a host of vulnerabilities large and small has arisen to plague the world's most popular mobile OS. The revelation this week of a cross-site scripting flaw in the default browser installed on large numbers of pre-version 4.4 Android devices is merely the latest entry in a list that makes for unsettling reading.To read this article in full or to leave a comment, please click here | | Issue highlights 1. The crazy cellphone ideas of 2004 2. Follow NetworkWorld on Instagram! 3. INSIDER How to lure tech talent with employee benefits, perks 4. iPhone 6 and iPhone 6 Plus review: Bigger is in fact better (in the right hands) 5. Browser comparison: How the five leaders stack up in speed, ease of use and more 6. In Scotland, tech firms fear independence vote 7. Get More Network World Newsletters! 8. Citadel financial malware used in attacking petrochemical companies 9. Adobe releases previously delayed security updates for Reader and Acrobat 10. 10 more do's and don'ts for faster SQL queries 11. Hackers accessed Goodwill hosting provider for 18 months before card breach 12. Dyn sells Internet performance data via SaaS 13. Jive adds Office 365 connectors for its enterprise social suite 14. Arista switches legal team in suit with co-founder 15. Ig Nobels 2014: Science's craziest night set for Thursday at Harvard 16. New products of the week 09.15.14 | RESOURCE COMPLIMENTS OF: SAS When it comes to big data, there are still a lot of questions out there. Click to continue | "Image by IDG News Service/Martyn WilliamsA year is a long time in smartphone technology today, so remember if you can the changes that have taken place over the last decade.In 2004, Apple had only just started working on development of its iPhone and no one outside the company knew about it, Samsung was focused on the South Korean market, and the hottest thing in wireless was the success of the I-mode mobile Internet service in Japan.To read this article in full or to leave a comment, please click here READ MORE | Photos from the office and the road READ MORE | Companies are vying for IT talent, and they're using benefits and perks to help attract the best and brightest. So what are IT pros looking for?To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | When Apple released the first iPhone, its 3.5-inch touchscreen seemed huge compared to the displays of other phones. Nonetheless, competitors responded with even larger screens, trying to find areas where they could provide clear alternatives to Apple hardware. Consumers responded positively, so the competition started making even bigger phones.Whatever good reasons Apple had for sticking with its 3.5-inch (and later 4-inch) screens—and there are good reasons, including the fact that it's hard to hold and control larger phones—it also meant it was ceding the large end of the market to the likes of Samsung.+ ALSO ON NETWORK WORLD Take the iPhone 6 quiz +To read this article in full or to leave a comment, please click here READ MORE | The best browser for your desktop could be one you're not using. Whether Chrome, Firefox, Internet Explorer, Opera, or Safari is your current choice, our tests found distinct differences in speed and ease of use. We also compared how each browser uses system resources, a near-invisible trait that could be discreetly bogging down your PC. For the online lifestyle, the right browser could save you time and frustration.+ ALSO ON NETWORK WORLD Sneak peek: New features coming to Internet Explorer +See how they run Browsers largely look and act the same: They render HTML in multiple tabs or separate windows, let you bookmark pages, support HTTP and FTP file transfer, or offer private browsing (no data is stored). Deep inside each one, however, are operational differences that may or may not fulfill your needs.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: IBM Hedge fund administration company Quintillion doubles its asset and investor portfolio while keeping staff levels almost flat, by working with Insight 2 Value to deploy an efficient content management solution, based on IBM Case Manager. Read Now | The one sure thing a "yes" vote Thursday for Scottish independence will bring to its high-tech sector is a long period of uncertainty.Scotland is not a major high-tech employment center, but it has good universities and entrepreneurial energy. About 70,000 people work in IT out of a total workforce of about 2.5 million, or about 3%. By contrast, financial services accounts for about 15% of employment in Scotland.Scotland has 5.3 million people and is just a little larger than Colorado; in terms of size, it's almost as large as South Carolina.ALSO ON NETWORK WORLD: How to lure tech talent with employee benefits, perks A separation from the U.K. would be jarring and would bring big problems to solve, including currency and European Union membership issues to settle. Passions are high.To read this article in full or to leave a comment, please click here READ MORE | We have a wide variety of newsletters to satisfy all sorts of IT pros READ MORE | A Citadel variant has been used against several Middle Eastern petrochemical companies, marking the first time the financial malware has been found in targeted attacks against companies.Trusteer, the IBM security firm that made the discovery, declined to identify the companies whose names were found in configuration files in the malware. Trusteer did not know whether the companies' systems were actually infected with the software.Nevertheless, the finding opens a new chapter in the sophisticated malware typically distributed through phishing attacks launched from botnets of thousands of infected PCs.To read this article in full or to leave a comment, please click here READ MORE | After a one-week delay, Adobe Systems has released security updates for its Reader and Acrobat products to patch critical vulnerabilities that could lead to computers being compromised.The new 10.1.12 and 11.0.09 versions of Adobe Reader and Acrobat released Tuesday for Windows and Mac address eight vulnerabilities, five of which could allow for remote code execution.One of the other three vulnerabilities can be used to bypass the products' sandbox protection to run code with elevated privileges on Windows, one can lead to a denial-of-service condition and one is a universal cross-site scripting (UXSS) flaw that only affects the programs on the Mac platform.To read this article in full or to leave a comment, please click here READ MORE | Everyone wants faster database queries, and both SQL developers and DBAs can turn to many time-tested methods to achieve that goal. Unfortunately, no single method is foolproof or ironclad. But even if there is no right answer to tuning every query, there are plenty of proven do's and don'ts to help light the way. While some are RDBMS-specific, most of these tips apply to any relational database.My previous collection of SQL do's and don'ts concentrated on individual query performance. While you'll definitely find more of that here, the main focus is on increasing concurrency in your system. By minimizing locking, I/O, and network traffic, you can not only make your queries run much faster, but even more important, you can make queries behave themselves on a system with hundreds or even thousands of concurrent users.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: OpenMarket In this paper we look at the new, front-line role of IT and security, specifically within enterprises using mobile messaging technologies, and suggest ways to mitigate risk and avoid costly mistakes and pitfalls. View Now>> | Hackers evaded security systems for a year-and-a-half at a hosting center that processed payment cards for Goodwill Industries, using the same type of malware that struck Target and other major retailers to steal card data, according to the charity's software vendor.In its first public statement since being identified by Goodwill as its technology partner, C&K Systems of Murrells Inlet, South Carolina, said two other customers were also affected by the unauthorized access, though it didn't name them.Goodwill, which sells donated clothing, said in July that federal authorities were investigating a possible payment card breach at its U.S. outlets. It's one of many retailers, including Target, Neiman Marcus, Michaels, P.F. Chang's China Bistro and Sally Beauty, that have disclosed data breaches since December.To read this article in full or to leave a comment, please click here READ MORE | Enterprises can tap into more than a decade's worth of statistics on global Internet performance, plus real-time data, with a new SaaS (software-as-a-service) product from Dyn, the parent company of network monitor Renesys.Dyn's current and historical information spans multiple service providers' networks, giving enterprises insights that any one carrier won't be able to provide, said Scott Hilton, Dyn's executive vice president of products. They can use that data both for planning, to select service providers and data-center locations, and for ongoing operations. For example, Dyn can tell companies where and when customers are likely to be seeing poor performance on their website so they can take corrective action.To read this article in full or to leave a comment, please click here READ MORE | Jive has built links between its enterprise social networking (ESN) suite and Microsoft's Office 365 to let users leverage Jive collaboration features with the cloud versions of Outlook, Office, SharePoint and OneDrive for Business.ESN vendors like Jive realized years ago that for their products to gain adoption in workplaces, they have to be threaded into the third-party applications that workers use every day, like the ones for email, CRM, ERP, accounting and the like. That way, users can tap their third-party software from within the Jive interface, and vice versa.ESN software that is isolated from the daily-use business software of a company is unlikely to gain traction among users, because it becomes yet another stand-alone inbox of sorts that they need to check and maintain. In that sense, ESN software's adoption dynamics are different from the consumer market social media services it's modeled after, like Facebook and Twitter, which are at the center of the universe of complementary apps built around them.To read this article in full or to leave a comment, please click here READ MORE | Arista Networks has replaced its attorney in the contentious legal battle with co-founder David Cheriton and his company, OptumSoft. According to this post in The Recorder, Arista recently hired Latham & Watkins as a substitute for previous representation from Wilson Sonsini Goodrich & Rosati, the same firm that represented Arista in its IPO. Could Arista be losing the intellectual property ownership battle with OptumSoft? OptumSoft, a stealth software company founded by Cheriton, is suing Arista for breach of contract, misappropriation of trade secrets and declaratory relief involving a compiler – called TACC -- Arista licensed royalty-free from OptumSoft for use in it EOS operating system. Optumsoft claims ownership of "improvements, corrections or modifications to" TACC, as well as any "derivative works thereof, made by or for" Arista involving TACC, such as EOS.To read this article in full or to leave a comment, please click here READ MORE | Ig Nobel Prize, Improbable Research The annual Ig Nobel Prize ceremony, honoring inventions in science, medicine and technology that first make people laugh and then make them think, will be held this Thursday, Sept. 18 at Harvard University in Cambridge, Mass. According to organizer Improbable Research: Winners travel to the ceremony, at their own expense, from around the world to receive their prize from a group of genuine, genuinely bemused Nobel Laureates, in Harvard's historic and largest theater. 1100 improbable persons fill the theatre, and the whole affair is broadcast live.To read this article in full or to leave a comment, please click here READ MORE | Our roundup of intriguing new products from companies such as Lenovo and Good Technology READ MORE | WHITE PAPER: Guidance Software Forrester Consulting conducted an analysis of the net benefit a global automobile manufacturer realized from the use of EnCase Cybersecurity. The research applied risk-adjusted calculations to the ROI and net benefits experienced in order to provide realistic expectations of the total economic impact that organizations can achieve. Learn more | | | | | | |
No comments:
Post a Comment