Network World Daily News AM | | Tech public relations likes to talk about the cloud as though it exists in an entirely conceptual form – files, apps, and even computing power existing merely in potentia, flowing mystically to you from some digital Olympus. It's a neat vision, and not, perhaps, an entirely unfair one, as far as it goes.But the fact remains that all computing is done on silicon that exists somewhere in the real world, no matter how many layers of abstraction it goes through. If it's a computing task, there is a real computer, somewhere, pushing 1s and 0s around to make it happen. | | Issue highlights 1. 8 cutting-edge technologies aimed at eliminating passwords 2. iPhone Weirdness Quiz 3. Chambers again dashes EMC speculation 4. What corporate security pros should do about Shellshock/Bash bug 5. Forget passwords -- the Nymi wristband uses your heartbeat for security 6. Cloud will be key for Oracle at OpenWorld 7. Why Amazon is rebooting 10% of its cloud servers 8. Pittsburgh is a vibrant ecosystem for high tech companies 9. Worst Product Ever: Fujitsu ScanSnap iX100 10. Web developer has a dirty little secret 11. Windows Server 2003 End of Support Loom 12. Networking pioneer Bob Metcalfe hails Ethernet-as-a-Service effort 13. First Look: BlackBerry Passport | WHITE PAPER: Code 42 Three primary cloud deployment strategies are available today for enterprise software—public cloud, private cloud and hybrid cloud. However, many vendors force enterprises to choose between data security or cloud deployment flexibility; they're either unable or unwilling to give the enterprise both. Learn More | From electronic pills to digital tattoos, these eight innovations aim to secure systems and identities without us having to remember a password ever again READ MORE | I'm trying out a new quiz tool called PlayBuzz: The past week's iPhone strangeness inspired these questions. To read this article in full or to leave a comment, please click here READ MORE | As he has done several times before, Cisco CEO John Chambers dismissed speculation that his company may acquire storage giant EMC. Reports surfaced this week that EMC was shopping itself around as a candidate for a "merger of equals," and had talked to HP and Dell about possible linkups.To read this article in full or to leave a comment, please click here READ MORE | Shellshock/bash bug exploits can force compromised servers to act as bots and, depending on the types of privileges the servers have, attackers can make them do a lot worse. So corporate security pros should patch important affected machines as soon as possible.In the meantime, you can shore up defenses around servers with the bash vulnerability to block attacks before they reach the machines, security experts say.+ Also on Network World: Shellshock flaw leaves OS X, Linux, more open to attack; 15 (FREE!) security tools you should try +To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: McAfee McAfee spoke with SIEM users and asked them to tell us about their primary issues with SIEM. This brief lists the top five issues along with corresponding customer case studies and use cases. Learn More>> | Imagine one day strapping on a wristband in the morning and then opening your smartphone and laptop without passwords, getting into your car without a key and even boarding a plane without your ID or a boarding pass.That's the future imagined by Andrew D'Souza, president of Bionym Inc., a Toronto-based company working on what he says will be the world's first wearable authentication device.D'Souza talked about the Nymi, which verifies a person's identity using their unique heart beat, at MIT Technology Review's EmTech conference in Cambridge this week.To read this article in full or to leave a comment, please click here READ MORE | The vendor's massive annual conference gets underway Sunday READ MORE | Amazon Web Services issued a blog post on Thursday providing some more details of why the company needs to reboot up to 10% of its cloud servers in the coming days, and it doesn't have anything to do with the so-called Shellshock vulnerability.+ MORE DETAILS NETWORK WORLD: Amazon readies major cloud server reboot +Amazon says that about Elastic Compute Cloud (EC2) servers from across the globe will be impacted by what it calls a "timely security and operational update" related to its open source Xen hypervisor. The blog post explains:To read this article in full or to leave a comment, please click here READ MORE | This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. It's been three decades since I moved away from the Pittsburgh area. Fresh out of college and newly married, my husband and I left "the Steel City" for economic reasons. We couldn't find jobs. We weren't alone. In 1981, the unemployment rate for the greater Pittsburgh area was 18%. Even our newly minted university technical degrees couldn't help us in a town with a dying steel industry and not much more. I've barely given Pittsburgh's economy a thought since moving to Texas 33 years ago. Then the Pittsburgh Regional Alliance invited me back for an opportunity to tour the city's growing technology ecosystem. Wow, what an eye opener!To read this article in full or to leave a comment, please click here READ MORE | RESOURCE COMPLIMENTS OF: PC Connection Storage modernization unlocks the full potential of your data center. It increases storage capacity, boosts performance, and reduces costs per gigabyte. Click to continue | In the course of my 13+ years of writing the Cool Tools column, I've run across many good products (hence the title of the column), several average products and only a few products that were not-yet-ready-for-public-consumption. This is one of those rare moments - get ready for some vitriol.The scoop: ScanSnap iX100 wireless scanner, by Fujitsu, about $230.What is it? This color image scanner is about the size of my forearm, smaller than a baseball bat, which reminds me, I should take a baseball bat and start pounding this thing to shreds. In a Utopian world where nothing ever goes wrong, the device lets you scan photos and documents quickly, and sends those scanned digital documents to either your computer or mobile device. You can connect the scanner to a computer via USB cable, or you can attempt to configure Wi-Fi with the unit (either through a Wi-Fi router or the-even-more-sadistic Wi-Fi Direct) so that your scans can be sent wirelessly to the computer or your phone/tablet. The device also includes software that aims to make your document-centric life a little bit more sane, such as a receipt application ("Scan those receipts so we can pay your expense report on time!", a business card manager ("Hey, I know you ignore those business cards but at least now you might be able to ignore them in your Outlook rather than dumping the cards into a desk drawer") and a program that converts scanned documents into editable text formats (Word, Excel, PowerPoint, PDF).To read this article in full or to leave a comment, please click here READ MORE | I could say that a co-worker pointed me to this one – and in this case that would be true – but the fact is that I quite often read Dear Prudence on Salon. Not very often, however, does the advice column have an IT angle. Dear Prudence,I am a freelance Web developer who was almost bankrupted by the economic collapse. A few years ago a client referred me to a friend who needed some search engine optimization. The friend operates an adult website. Adult websites make a lot of money but have trouble finding honest, competent help. One job turned into another, and working with adult websites has become a thriving business for me. My problem is that nobody knows I do this. My wife thinks that I design websites for local companies.To read this article in full or to leave a comment, please click here READ MORE | IT organizations must begin putting in place their migration plans now or risk major disruptions in 2015. READ MORE | The Metro Ethernet Forum (MEF) this week announced intentions to define parameters for Ethernet network-as-a-service (NaaS), an effort Ethernet inventor Robert Metcalfe hailed as "a new network paradigm."The so-called Third Network initiative builds on the Forum's Carrier Ethernet 2.0 specifications for service expansion, application oriented class-of-service, interconnect attributes and manageability. Third Network work includes service orchestration functions, APIs, a protocol independent NaaS information model and service definitions between physical and virtual service endpoints.To read this article in full or to leave a comment, please click here READ MORE | So BB 10 didn't work out so well, did it? Which helps explain why, with the new Passport smartphone, BlackBerry is ditching the years-late emphasis on competing for consumers and refocusing on the enterprise users on which the company was built. The Passport is uniquely focused on being a device for work first and personal stuff second - take a look at how it's turned out.To read this article in full or to leave a comment, please click here READ MORE | WEBCAST: Interactive Intelligence The total cost of ownership (TCO) debate between a premises and cloud decision continues to wage on. Depending on how you look at it, it seems that you arrive at a different conclusion. However, the missing factor in nearly all cloud contact center and unified communications TCO discussions is the consideration of buyer risk. Learn More | | | | | | | |
No comments:
Post a Comment