High-tech

High-tech
Light

Friday, October 17, 2014

FIRST LOOK: iPad Air 2, Mini 3 & more

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Oct 16, 2014 9:01 PM
Subject: FIRST LOOK: iPad Air 2, Mini 3 & more
To: <aquarianm@gmail.com>
Cc:

  A tale of Ransomware that will make your blood run cold ... | ChromeOS team listens to Linux community, brings back ext2/3/4

 
  Network World After Dark  

FIRST LOOK: iPad Air 2, Mini 3 & more
Apple's glossy new tablets were accompanied by new iMacs and OS X Yosemite. Read More
 


WHITE PAPER: Dell | Symantec

Strategies for Gaining Control and Securing Mobility
We are in the midst of a mobile revolution. Numbers of mobile devices are growing with some experts predicting that employees will be carrying three or more devices. Growth is not limited to just devices. As the number of enterprise apps rapidly expands, "an app for everything" is a slogan few would question. Learn More

WHITE PAPER: Tintri Inc.
 
Application-Aware Storage
Server virtualization brings tremendous value in terms of adding operational agility and significant cost savings through consolidation, increased utilization, and workload portability, but storage can be an inhibitor to realizing that value. Learn more

A tale of Ransomware that will make your blood run cold ...
Ransomware has become big business for the Bad Guys.On the off-chance you don't know what this particular malware is all about, allow me to explain: A machine infected by ransomware will have its drives encrypted and then, unless the perpetrators are paid the ransom they demand, your drives will be and remain, in effect, unusable. But what happens if, say, you're a system admin and you have drives mapped to multiple servers when the ransomware does its encryption?Here's a cautionary tale from a post on the KnowBe4 blog: "We are a 250 employee non-profit and we heavily rely on our computer systems in almost everything we do. Yesterday, one of our admin workstations was hit with CryptoWall Version 2.0, and because this workstation had drives mapped to all our servers, and the administrator had permissions, all our seven servers were encrypted and we were dead in the water.To read this article in full or to leave a comment, please click here Read More
 

ChromeOS team listens to Linux community, brings back ext2/3/4
It's great to see a community response to an unpopular decision actually have an impact. Read More
 

Apple iPad Air 2 is thinner and speedier than its predecessors
Apple's iPad Air 2 is thinner and lighter than its predecessor, and should be speedier as well, thanks to a new processor.It also has improved camera and security features, as does the iPad Mini 3, Apple said Thursday during an event at it's Cupertino, California, campus, unveiling the tablets at a time when the company's dominance in that market has waned.The iPad Air 2, which has a 9.7-inch screen, is 6.1 millimeter thick, which is 18 percent thinner than the iPad Air. The Air 2 offers 10 hours of battery life.The tablet has the all-new A8X chip, which is a variant of the A8 chip in the iPhone 6 and iPhone 6 Plus. The chip is 40 percent faster and provides 2.5 times better graphics than the A7 chip in the iPad Air.To read this article in full or to leave a comment, please click here Read More
 

How Aruba Networks is tackling the SME market
Re-imagining its approach could help Aruba Networks capitalize on a Wi-Fi market that appears set for massive growth. Read More
 

Life as an IT contractor
The upside of life as an IT contractor is alluring. You get to be your own boss, accept only the jobs you want, and work flexible hours. With each assignment comes the opportunity to learn new skills and gain exposure to different environments.But there are obvious sacrifices – job security and paid vacations, for starters. As an IT contractor, you're also often responsible for your own benefits (healthcare, retirement), paying taxes, and marketing yourself for the next gig.Tech pros who successfully balance the pros and cons of contracting play an important role in the IT world. They provide manpower when workloads spike and can bring key expertise or niche skills to a team. In recent years, companies have increasingly relied on a contingent workforce to augment their full-time staff. In a new survey by TEKsystems, more IT leaders said they expect to increase temporary hiring (42%) than those who plan to increase full-time hiring (37%).To read this article in full or to leave a comment, please click here Read More
 

 

INSIDER
16 tips for thriving as an IT contractor
  When demand exceeds the supply of available IT talent, many companies are using contractors to help fill the gaps. IT contractors provide manpower when workloads spike and can bring key expertise and skills to a team. (See related story, Life as an IT contractor)To read this article in full or to leave a comment, please click here(Insider Story) Read More

 

Apple releases OS X Yosemite
Apple today launched OS X 10.10, aka Yosemite, as a free upgrade for most Mac owners.Mac users running last year's Mavericks, 2012's Mountain Lion, 2011's Lion and even 2009's Snow Leopard are able to download Yosemite from the Mac App Store starting today. The no-older-than-Snow-Leopard limitation was due to the App Store, the only distribution channel for Yosemite; versions of OS X that preceded Snow Leopard cannot access the online mart.During a news conference today -- which Apple live-streamed -- Craig Federighi, who leads iOS and OS X development and has taken the roll of Jerry Lewis to Cook's Dean Martin straight man, spent considerable time summarizing the new features of Yosemite.To read this article in full or to leave a comment, please click here Read More
 

Hordes of cable modems, Web cams, printers can become DDoS launch platforms
  Attackers are mounting distributed Denial-of-service attacks from home routers, wireless access points, cable modems, Web cams and printers by taking advantage of weaknesses in the protocol they use to announce themselves on networks, according to PLXsert. The attacks, observed in the wild since July, have generated peak traffic of 54.35Gbps and 17.85 million packets per second, according to a threat advisory from Prolexic, which is a part of Akamai. + Also on Network World: Bot-herders can launch DDoS attacks from dryers, refrigerators, other Internet of Things devices; Security vendors claim progress against Chinese group that hacked Google +To read this article in full or to leave a comment, please click here Read More
 

Mobile device and date use skyrockets, US gov't survey says
US residents are increasingly using mobile phones for downloading, email and other apps, the NTIA says Read More
 

Microsoft's Nadella finally apologizes
Last Thursday Microsoft CEO Satya Nadella stuck his foot in his mouth by saying that women should be seen but not heard asking for raises. On Friday he attempted to walk those comments back and was rather oddly credited by many media outlets for apologizing even though he did no such thing.Yesterday he did apologize. From an email obtained by the Seattle Times:To read this article in full or to leave a comment, please click here Read More
 

 

SLIDESHOWS

The Onion's 9 best bits about Microsoft

Poking fun at the software giant and founder Bill Gates since 1996.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Moto X 2nd Gen review: Same same but different

2. Conspiracy Theory With Teeth: Government Allegedly Forced TruTV To Yank FEMA Camps Episode

3. Anonabox backpedals on 'custom' hardware claims as Reddit points at Chinese versions

4. First Look: The magnificent new Nexus 6 and Nexus 9

5. The Snappening: Snapsaved admits to hack that leaked SnapChat photos

6. The world's craziest contraband

7. Microsoft patches 3 zero-days including Sandworm on Patch Tuesday

8. Gartner: Top 10 Technology Trends for 2015 IT can't ignore

9. Last minute iPad Air, iPad Mini, and iMac rumors ahead of Apple's special event

10. 7 free tools every network needs


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment