Network World Daily News PM | | For the first time, Microsoft will offer user-based Windows licenses to enterprises, a change one expert called "substantial" but another downplayed as unlikely to have much of an impact.Neither believed that the changes would herald Windows-by-subscription any time soon, even though Microsoft licenses its "rent-not-buy" Office 365 by the user, not by each device.MORE ON NETWORK WORLD: 10 (FREE!) Microsoft tools to make admins happier "This is the first time that Microsoft has introduced 'user' with Windows from a basic licensing terminology basis," said Daryl Ullman, co-founder and chief consulting officer of Emerset Consulting Group, a firm that specializes in helping companies negotiate software licensing deals. "So in that regard, this is a substantial change.To read this article in full or to leave a comment, please click here | | Issue highlights 1. Microsoft to bring Docker to Windows Server 2. City rejects Comcast, but resistance is futile 3. CTIA: Mobile carriers still need lighter net neutrality rules 4. Intel preps new technology to secure credit card transactions 5. Mars gets close encounter with a comet 6. Security experts warn of 'POODLE' attack against SSL 3.0 7. Moto X 2nd Gen review: Same same but different 8. Anonabox backpedals on 'custom' hardware claims as Reddit points at Chinese versions 9. How do I know you're lying? My "Star Wars" algorithm told me | : KnowBe4 Since September 2013, several ransomware strains are attacking end-users. You cannot just rely on your filters, you also have to train your end-users. Get a Quote for your organization now and your users trained ASAP. If your files get encrypted due to human error after your user steps through our training, KnowBe4 will pay the crypto-ransom. Learn more >> | The Docker virtualization technology has just taken another giant step forward, as developers from both Microsoft and Docker have started working on a native Docker implementation for Windows Server, which will make the increasingly popular container technology available for use in Windows shops."In the future, a developer building an application with Windows components will be able to manage that application using Docker," said Solomon Hykes, creator and chief maintainer of Docker, as well as chief technology officer of the namesake company.Heretofore, Docker has only run on Linux. The two companies will create a version of the Docker Engine that will run, natively, on the next edition of Windows Server, as well as run on the Microsoft Azure cloud.To read this article in full or to leave a comment, please click here READ MORE | Worcester, Massachusetts, is fighting a losing battle against Comcast's plan to take over its cable and internet customers. READ MORE | The U.S. Federal Communications Commission should not hold mobile carriers to the same net neutrality rules as it does for wired broadband providers because of unique mobile network management challenges, the head of the largest U.S. mobile trade group said.CTIA President and CEO Meredith Attwell Baker on Wednesday repeated the trade group's objections to calls by some advocates and members of the public for the FCC to hold mobile carriers to the same rules of wired broadband providers as the agency considers new net neutrality rules.Members of CTIA support net neutrality principles, but mobile broadband providers have limited spectrum that require "dynamic" network management practices, Baker said at a mobile broadband forum in Washington, D.C., hosted by the University of Pennsylvania's Wharton School.To read this article in full or to leave a comment, please click here READ MORE | : Verizon In this eGuide, InfoWorld and sister publications IDG News Service, Network World, Computerworld, and CSO look at many of today's issues surrounding mobile security and MDM. Read on to learn how MDM can help your enterprise enable mobile security without hampering employee productivity. Learn More | Swiping credit cards or using payment systems like Apple Pay at stores could become much safer thanks to a new Intel system, which could also make it easier for retailers to secure data after transactions are completed.With security breaches and customer data theft on the rise, Intel has developed Data Protection Technology for Transactions, a hardware-software bundle designed to protect credit card and personal data from hackers when transactions are being authorized.Intel will market the chip technology to makers of point-of-sale (POS) systems, PCs and mobile payment terminals. NCR, the world's largest maker of payment terminals, has plans to put Data Protection Technology for Transactions on its products.To read this article in full or to leave a comment, please click here READ MORE | The Red PlanetThe Red Planet will entertain an uninvited guest this weekend in the form a comet moving at 126,000 mph through its space in the universe. Scientists say the comet called Sliding Spring, will not hit the planet, nor the spacecraft currently orbiting Mars. Just to be safe though, NASA says it will alter the orbits on its spacecraft to make sure they are behind Mars when the comet flies by. All of the instruments however will be pointed at the comet and some interesting new details on comets should be gleaned from the pass. Here's what's out there:To read this article in full or to leave a comment, please click here READ MORE | Google researchers have found a severe flaw in an obsolete but still used encryption software, which could be exploited to steal sensitive data. The flaw in SSL 3.0 is more than 15 years old but is still used by modern web browsers and servers. SSL stands for "Secure Sockets Layer," which encrypts data between a client and server and secures most data sent over the Internet. Bodo Möller, Thai Duong and Krzysztof Kotowicz of Google developed an attack called "POODLE," which stands for Padding Oracle On Downgraded Legacy Encryption, according to their research paper. Web browsers are designed to use newer versions of SSL or TLS (Transport Layer Security), but most browsers will accommodate SSL 3.0 if that's all that a server can do on the other end.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: bigtincan Effective user experience design is really about crafting deeper connections that enable end-user computing devices to work better together, rather than just coexist. Distributed user experience is about optimizing the user's experience for enhanced productivity when interacting with content across any end-user computing device. Learn More>> | How Motorola carried over what it did right with the first-generation Moto X while still improving on it. READ MORE | The Kickstarter campaign for the tiny plug-and-play Tor-loaded Anonabox router quickly raised over a half million dollars, but one of the developers is backpedaling on 'custom' hardware claims as Redditers found the same hardware available for sale in China. READ MORE | Two researchers with BAE Systems' Adaptive Reasoning Technologies Group have taken home a $25,000 prize for developing an algorithm that can help detect who's trustworthy and who isn't.The algorithm – known as JEDI MIND--was developed as part of crowdsourcing challenge that took place between nearly 40 competitors backed by The Office of the Director of National Intelligence and its Intelligence Advanced Research Project Activity (IARPA) group.+More on Network World: Mars gets close encounter with a comet+To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: Citrix Systems The greater the number computing devices we use, the more the center of our computing life shifts to the cloud. The last thing anyone wants is for data and preferences to be locked in a smartphone, tablet, or desktop. Learn More | | | | | | | | |
No comments:
Post a Comment