High-tech

High-tech
Light

Friday, October 3, 2014

Marriott must pay $600K for blocking personal Wi-Fi hotspots

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Oct 3, 2014 3:20 PM
Subject: Marriott must pay $600K for blocking personal Wi-Fi hotspots
To: <aquarianm@gmail.com>
Cc:

World's craziest Halloween coffinsl

Get More Network World Newsletters!

Network World Daily News PM
October 03, 2014

Marriott must pay $600K for blocking personal Wi-Fi hotspots

Here's some payback for everyone who has felt gouged by hotel charges for Wi-Fi service: Marriott International has to pay US$600,000 following a probe into whether it intentionally blocked personal Wi-Fi hotspots in order to force customers to use its own very pricey service.

READ MORE
 

Issue highlights

1. World's craziest Halloween coffinsl

2. Get More Network World Newsletters!

3. DARPA delving into the black art of super secure software obfuscation

4. Cloud price cuts are nice but enterprises still want more

5. Apple signals Oct. 21 as OS X Yosemite launch date

6. Dubai police to use Google Glass for facial recognition

7. Price tag for troubled SAP project will skyrocket to nearly $1 billion, audit says

8. The 10 worst people you meet working in IT

9. Tools for creating malicious USB thumb drives released by security researchers

10. Evernote everywhere? New collaboration tools hope to take over your workday

11. States worry about ability to hire IT security pros

12. Follow NetworkWorld on Instagram!

RESOURCE COMPLIMENTS OF: Brocade Communications Systems

The Trick to Future-Proofing Your Networking Career

Get a leg up on your peers with a free Brocade Network Functions Virtualization (NFV) Certification to future-proof your career and your network. This course will help you: Understand sophisticated, multitier networks within virtualized environments and stand out from your peers by becoming an expert within your IT organization Sign up today and get a promo code for the free Brocade Network Functions Virtualization Certification program (a $650 value), and a free 60-day trial of the Brocade Vyatta vRouter.

World's craziest Halloween coffinsl

From KISS caskets to lions and airplanes, a plethora of burial boxes populate the world READ MORE

Get More Network World Newsletters!

We have a wide variety of newsletters to satisfy all sorts of IT pros READ MORE

DARPA delving into the black art of super secure software obfuscation

Given enough computer power, desire, brains and some luck, the security of most systems can be broken. But there are cryptographic and algorithmic security techniques, ideas and concepts out there that add a level of algorithmic mystification that could be built into programs that would make them close to unbreakable.+More on Network World: World's craziest Halloween coffins+ That's what the Defense Advanced Research Projects Agency (DARPA) wants for a new program called Safeware.To read this article in full or to leave a comment, please click here READ MORE

Cloud price cuts are nice but enterprises still want more

Google dropped its cloud computing prices and other vendors are expected to follow suit, but the lower pricing may not be the key lure for attracting enterprises to the cloud.Enterprises want to save money, but when it comes to cloud computing, they're more concerned about reliability and security."I don't think this is a large enough price cut to move a lot of enterprise computing into the cloud," said Dan Olds, an analyst with The Gabriel Consulting Group. "When it comes to public clouds, there are factors that are more important to enterprises than capacity price. Security, reliability, performance and quality of service demanded by a particular workload are often the most important factors for enterprise customers looking to move an application to a cloud."To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Ping Identity

6 Trends Driving IT Execs to Rethink the Security Perimeter

This paper discusses six distinct trends that are reshaping how business is conducted and why they are driving the need for an improved identity and access management (IAM) architecture. Learn More

Apple signals Oct. 21 as OS X Yosemite launch date

Apple signaled that it will ship OS X Yosemite on Oct. 21; it has scheduled its third-quarter earnings call for the day before.Although Apple has not yet officially revealed the launch date for Yosemite -- which is also identified as OS X 10.10 -- the earnings call on Monday, Oct. 20, is a clue that the upgrade will appear in the Mac App Store the next day.In both 2011 and 2012, Apple used an earnings call to announce the availability of OS X Lion and Mountain Lion, respectively. In each of those years, the pertinent conference call with Wall Street analysts was for the second quarter, the one that ended in June, because Apple launched the upgrades the following month.To read this article in full or to leave a comment, please click here READ MORE

Dubai police to use Google Glass for facial recognition

Despite Google's best efforts to keep facial recognition away from Glass, the two technologies are finding a way to work together. READ MORE

Price tag for troubled SAP project will skyrocket to nearly $1 billion, audit says

The cost of finishing a massive SAP software overhaul at a New York gas utility will rise to nearly US$1 billion from an original estimate of $383.8 million, a newly released audit report has found.National Grid's SAP upgrade went live in November 2012, nearly simultaneously with Hurricane Sandy, the massive storm that ravaged the East Coast.Immediately upon the go-live, the SAP system was wracked with issues, particularly related to payroll, with the chaos wrought by Sandy and the subsequent cleanup effort only exacerbating the situation.To read this article in full or to leave a comment, please click here READ MORE

The 10 worst people you meet working in IT

"Image by Wikiedpia/Public DomanEvery human being is a unique and special person who doesn't quite fit into any category, of course. That said, if you've worked in IT long enough, you've probably learned to identify certain ... types. Call them Jungian archetypes, but for people you don't like. Once you've started to recognize them, you see them everywhere. We asked a host of IT pros to describe the type of IT pro they like least, and we got some colorful answers. Have you ever dealt with some of these worst people in IT? Or worse: do you recognize yourself in these descriptions? It's not too late to take another path.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: VMware

The Practitioner's Guide to the VMware vCloud Suite

This paper gives an overview of the editions, and addresses the top five questions asked by practitioners who want to better understand and effectively use the capabilities of vCloud Suite. Read now!

Tools for creating malicious USB thumb drives released by security researchers

In a gambit aimed at driving manufacturers to beef up protections for USB flash drive firmware, two security researchers have released a collection of tools that can be used to turn those drives into silent malware installers.The code release by researchers Adam Caudill and Brandon Wilson comes two months after researchers from Berlin-based Security Research Labs (SRLabs) demonstrated an attack dubbed BadUSB at the Black Hat security conference in Las Vegas.The BadUSB attack showed how a USB thumb drive connected to a computer can automatically switch its profile to a keyboard—and send keystrokes to download and install malware—or emulate the profile of a network controller to hijack DNS settings.To read this article in full or to leave a comment, please click here READ MORE

Evernote everywhere? New collaboration tools hope to take over your workday

Evernote may have started as an organization tool, but it's busily evolving itself into a tool for organizations—if it can find ways to stand out from the burly crowd of established players.Enter Work Chat, a new capability that Evernote announced at its Evernote Conference in San Francisco on Thursday and will add to its various platforms in the near future. Work Chat saves workers from clicking over to another window in an email application by replacing it with another window in a chat application.The difference, Evernote claims, is immediacy: Chats can and should be returned immediately, while emails pile up over time. And there's an extra-cost feature: Context, which pulls in data from varied sources to paint the bigger picture around what you're sharing. To read this article in full or to leave a comment, please click here READ MORE

States worry about ability to hire IT security pros

States' efforts to improve cybersecurity are being hindered by lack of money and people. States don't have enough funding to keep up with the increasing sophistication of the threats, and can't match private sector salaries, says a new study.This just-released report by Deloitte and the National Association of State CIOs (NASCIO) about IT security in state government received responses from chief information security officers (CISOs) in 49 states. Of that number, nearly 60% believe there is a scarcity of qualified professionals willing to work in the public sector.To read this article in full or to leave a comment, please click here READ MORE

Follow NetworkWorld on Instagram!

Photos from the office and the road READ MORE

WHITE PAPER: Ping Identity

5 Reasons It's Time For Secure Single Sign-On

While cloud-based applications provide many business benefits including lowering capital expenditures, they can also drive up operational expenses by requiring more administration and lowering employee productivity due to more application login-ins, password resets and helpdesk calls. Learn More

SLIDESHOWS

First Look: BlackBerry Passport

The Passport is uniquely focused on being a device for work first and personal stuff second - take a look at how it's turned out.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

MOST-READ STORIES of 2014

1. Will Windows 10 address the operating system's biggest weakness?

2. Why Windows 10 isn't named 9: Windows 95 legacy code?

3. Startups look to eliminate routers, switches

4. Cisco bulks up branch routers for cloud

5. How the cloud is changing the security game

6. First look: Windows 10

7. 10 Tips to Ensure Your IT Career Longevity

8. Apple's worldwide market share stalls as consumers await the iPhone 6

9. 3 … 2 … 1 … That's all for Lotus 1-2-3

10. Windows 10 in pictures: See the Technical Preview

Follow Network World

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment