Network World Daily News PM | | Google is offering $100,000 worth of use of its cloud platform for free, if you're a startup.What's a startup? Google has some pretty specific criteria: The startup must be in an approved accelerator, incubator or VC fund The startup cannot have previously received Google cloud platform credits Must have received $5 million or less in funding so far Must have less than $500,000 in revenue So, that would leave pretty early-stage startups eligible for this sizeable credit. More details can be found here.+MORE CLOUD CHRONICLES: HP Buys Eucalyptus: What it means for the hybrid cloud+To read this article in full or to leave a comment, please click here | | Issue highlights 1. The iPhone 6 and iPhone 6 Plus Quiz 2. 10 years in tech: The crazy cellphone ideas of 2004 3. Harvard's CompSci intro course boasts record-breaking enrollment 4. VMware and Cisco patch vulnerabilities in data-center gear and software 5. 28 crucial checks to make before launching your Web site 6. Stanford researchers develop ant-sized radio 7. NFL QB turned Biggest Loser contestant also a software startup founder 8. VMware and Cisco patch vulnerabilities in data-center gear and software 9. CIO of Defense Department Agency Cautions Against Rush to Cloud 10. Apple eliminates 32 GB iPhone models from new product lineup 11. 10 years in tech: The crazy cellphone ideas of 2004 12. The $3 billion missing element from Apple's big reveal 13. Browser test redux: New tests yield the same results 14. Apple Tim Tebows the big event 15. How to ensure the success of your Continuous Delivery initiative using testing 16. Cisco right-sizes UCS servers | RESOURCE COMPLIMENTS OF: CSO Perspective Attend the CSO Perspectives Conference taking place on Tuesday, September 23 at the Hotel Nikko San Francisco. At this one-day event, produced by CSO and focused on "Data Protection & Privacy," you'll have the opportunity to get answers to your most burning security questions, and network with peers who wrestle with similar issues and concerns. Register Today! | The new Apple phones are all anyone's talking about but how well do you really know them? READ MORE | A year is a long time in smartphone technology today, so remember if you can the changes that have taken place over the last decade.In 2004, Apple had only just started working on development of its iPhone and no one outside the company knew about it, Samsung was focused on the South Korean market, and the hottest thing in wireless was the success of the I-mode mobile Internet service in Japan.As I watched Apple's launch of its new iPhones and smartwatch this week, I was reminded of a trip I took exactly a decade ago to the ITU's Telecom Asia expo in Busan, South Korea. As Tokyo correspondent for IDG, I was used to seeing advanced phones in Japan but some of the handsets in South Korea looked positively futuristic. Recalling those phones, it's amazing to think how technology has changed in the last decade, and how smartphones have changed our lives.To read this article in full or to leave a comment, please click here READ MORE | Harvard College's CS50, the school's Introduction to Computer Science course for undergrads, has attracted about 1 in 8 students this fall -- a new record for the school and yet another sign of just how hot this field is becoming for the job-hungry.The news, first reported by the Harvard Crimson, is based on stats released Wednesday by the Faculty of Arts and Sciences Registrar's Office.To read this article in full or to leave a comment, please click here READ MORE | VMware and Cisco Systems released security fixes this week for serious vulnerabilities in networking virtualization and server software typically used in data centers.Cisco patched a persistent denial-of-service vulnerability that could prevent the out-of-band management of Cisco Unified Computing System (UCS) E-Series Blade servers that are deployed in Cisco Integrated Services Routers Generation 2 (ISR G2).The vulnerability is located in the SSH (Secure Shell) service of the Cisco Integrated Management Controller (Cisco IMC), a specialized micro-controller embedded in server motherboards that allows systems administrators to monitor and manage servers from outside their OS.To read this article in full or to leave a comment, please click here READ MORE | READ MORE | WHITE PAPER: IBM Forrester has released its 2014 Dynamic Case Management Wave, and for the second consecutive time, IBM is a leader. View Now>> | Engineers at Stanford University have developed a tiny radio that's about as big as an ant and that's cheap and small enough that it could help realize the "Internet of things" -- the world of everyday objects that send and receive data via the Internet.The radio is built on a piece of silicon that measures just a few millimeters on each side. Several tens of them can fit on the top of a U.S. penny and the radio itself is expected to cost only a few pennies to manufacture in mass quantities.Part of the secret to the radio's size is its lack of a battery. Its power requirements are sufficiently frugal that it can harvest the energy it needs from nearby radio fields, such as those from a reader device when it's brought nearby.To read this article in full or to leave a comment, please click here READ MORE | Biggest Loser There I was hunkering down to watch the Steelers-Ravens game last night, when I flipped over to The Biggest Loser weight-loss contest show during a commercial. The first contestant I see in what turns out to be a collection of former top-notch athletes is a 6-foot 6-inch 366-pound guy named Scott Mitchell, described as a former NFL quarterback. To read this article in full or to leave a comment, please click here READ MORE | VMware and Cisco Systems released security fixes this week for serious vulnerabilities in networking virtualization and server software typically used in data centers.Cisco patched a persistent denial-of-service vulnerability that could prevent the out-of-band management of Cisco Unified Computing System (UCS) E-Series Blade servers that are deployed in Cisco Integrated Services Routers Generation 2 (ISR G2).The vulnerability is located in the SSH (Secure Shell) service of the Cisco Integrated Management Controller (Cisco IMC), a specialized micro-controller embedded in server motherboards that allows systems administrators to monitor and manage servers from outside their OS.To read this article in full or to leave a comment, please click here READ MORE | The Defense Information Systems Agency's David Bennett calls the cloud 'viable' for certain government operations, but he warns that some applications and data must remain within the secure agency network. READ MORE | Apple's new iPhone 6 lineup has no 32GB option READ MORE | WHITE PAPER: Coresite Increasing demands on IT are forcing organizations to rethink their data center options. For many organizations, that means turning to the flexibility afforded them by outsourced cloud solutions, which can provide exponential cost savings. Learn More >> | A year is a long time in smartphone technology today, so remember if you can the changes that have taken place over the last decade.In 2004, Apple had only just started working on development of its iPhone and no one outside the company knew about it, Samsung was focused on the South Korean market, and the hottest thing in wireless was the success of the I-mode mobile Internet service in Japan.As I watched Apple's launch of its new iPhones and smartwatch this week, I was reminded of a trip I took exactly a decade ago to the ITU's Telecom Asia expo in Busan, South Korea. As Tokyo correspondent for IDG, I was used to seeing advanced phones in Japan but some of the handsets in South Korea looked positively futuristic. Recalling those phones, it's amazing to think how technology has changed in the last decade, and how smartphones have changed our lives.To read this article in full or to leave a comment, please click here READ MORE | Amidst the giant iPhones, flashy mobile payments scheme, and controversial Apple Watch, one thing stood out by its absence. READ MORE | Even when adjusting the tests to account for add-ons and extensions, Pale Moon still failed to outperform Firefox in my tests.. READ MORE | I had high hopes for Apple's announcement this week, but they failed to live up to the hype. READ MORE | This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.Continuous Delivery (CD), the new darling of IT, is a to dramatically improve the pace and quality of software delivery by creating a repeatable, reliable pipeline for taking software from concept to customer. The benefits are faster time-to-market, increased quality and improved responsiveness. However, doing CD properly hinges on the maturity of your testing.A new version of any application should be rigorously tested to ensure it meets all desired system qualities. It is important that all relevant aspects -- whether functionality, security, performance or compliance -- are verified by the application delivery pipeline. If in doubt, test and test again.To read this article in full or to leave a comment, please click here READ MORE | Company recasts line for large- and small-scale requirements READ MORE | WHITE PAPER: Fortinet Next-generation firewall technology (NGFW) addresses the most prevalent security issues. Fortinet's FortiGate NGFW integrates five crucial security protections, including strong authentication, antimalware and APT detection. View Now>> | | | | | | | |
No comments:
Post a Comment