Network World Daily News PM | | The newest additions to the iPad lineup are incremental upgrades from their predecessors. | | Issue highlights 1. Top 10 IT Skills Based on Increases in Demand 2. Apple releases OS X Yosemite 3. INSIDER How-to: Get started with MariaDB 4. Get More Network World Newsletters! 5. FBI director calls for greater police access to communications 6. Top Mac-o-lanterns from around the Web 7. Spec showdown: Google Nexus 6 vs. Samsung Galaxy Note 4 8. Hordes of cable modems, Web cams, printers can become DDoS launch platforms 9. McDonald's CIO on Why It's Supporting Apple Pay on Launch Day 10. How giant companies see the cloud | WHITE PAPER: Open Text A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities they're seeking in B2B integration partners. Learn More | On any given day, employers post approximately 80,000 jobs on Dice.com. Here are the 10 fastest-growing categories based on number of mentions compared to a year ago. READ MORE | Apple today launched OS X 10.10, aka Yosemite, as a free upgrade for most Mac owners. READ MORE | MariaDB is a fork of the wildly popular open source database MySQL. Although MariaDB is very similar to MySQL, it is not necessarily the same. One of the primary goals behind the MariaDB project is to serve as a drop-in replacement for MySQL, but MariaDB also offers features beyond those available in MySQL.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | WHITE PAPER: Alert Logic Alert Logic's Threat Manager is coded to run seamlessly on the EC2 cloud, making it the ideal intrusion detection system (IDS) for BancBox. Threat Manager also meets all of BancBox's requirements - it is PCI compliant, it operates seamlessly within the AWS environment, and it does not require any hardware. Learn More>> | We have a wide variety of newsletters to satisfy all sorts of IT pros READ MORE | Apple and Google should reconsider their plans to enable encryption by default on their smartphones, and the U.S. Congress should pass a law requiring that all communication tools allow police access to user data, U.S. FBI Director James Comey said.Comey, repeating his recent concerns about announcements from Apple and Google to offer new encryption tools on their smartphone OSes, went a step further Thursday, when he called on Congress to rewrite the 20-year-old Communications Assistance for Law Enforcement Act.Following the past 15 months of leaks about surveillance at the U.S. National Security Agency, the pendulum of public opinion has swung too far away from law enforcement's needs, Comey said in a speech at the Brookings Institution.To read this article in full or to leave a comment, please click here READ MORE | A snapshot of Apple devotion expressed via carved vegetation. READ MORE | WHITE PAPER: Dell | Symantec This guide addresses how IT can gain control and secure mobility without alienating users. Discover the 5 "must-have" features of mobility management, protecting data at the app level rather than the device level, the differences between MDM, MCM and MAM, and key considerations when selecting an enterprise mobility management solution. Learn More | If you're on the lookout for a new Android smartphone with a big screen, the Motorola-manufactured Nexus 6 from Google and Samsung Electronics' Galaxy Note 4 are two hot possibilities.FThe Nexus 6 was announced on Wednesday along with Android Lollipop, the latest version of Google's mobile OS. It will compete with a growing number of smartphones with screens larger than 5.5 inches. But the biggest Android-based competitor is the Note 4. The success of the Note family is the main reason behind the "phablet" trend. Here's a spec comparison between the phones:ProcessorsLollipop, which the Nexus 6 will run, is the first 64-bit compatible version of Android. However, Qualcomm won't offer high-end 64-bit processors until the first half of next year. Therefore Google decided to go with Qualcomm's Snapdragon 805 processor, which is a 32-bit chipset that also powers the Note 4.To read this article in full or to leave a comment, please click here READ MORE | Attackers are mounting distributed Denial-of-service attacks from home routers, wireless access points, cable modems, Web cams and printers by taking advantage of weaknesses in the protocol they use to announce themselves on networks, according to PLXsert. The attacks, observed in the wild since July, have generated peak traffic of 54.35Gbps and 17.85 million packets per second, according to a threat advisory from Prolexic, which is a part of Akamai. + Also on Network World: Bot-herders can launch DDoS attacks from dryers, refrigerators, other Internet of Things devices; Security vendors claim progress against Chinese group that hacked Google +To read this article in full or to leave a comment, please click here READ MORE | In an exclusive interview with CIO.com, McDonald's U.S. CIO talks about why the fast-food giant chose to support Apple's new contactless payment technology out of the gate and how it built on its experience with Google Wallet to help make Apple Pay a customer magnet. READ MORE | 16 large enterprises talk about their use of the cloud, their plans, challenges they've run into and how they're approaching the skills issues. READ MORE | WHITE PAPER: Vormetric In this white paper Fortrex explores how encryption, access control and file access audit logs from Vormetric can Contributes to HIPAA compliance and exempt from notification requirements of HITECH. View Now>> | | | | | | | |
No comments:
Post a Comment