High-tech

High-tech
Light

Sunday, November 30, 2014

Pi, translated: The evolution of Raspberry Pi

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Nov 30, 2014 8:01 AM
Subject: Pi, translated: The evolution of Raspberry Pi
To: <aquarianm@gmail.com>
Cc:

What it's like living on a Chromebook, Part 2

5 ways to escape password hell

Network World Daily News AM
November 30, 2014

Pi, translated: The evolution of Raspberry Pi

A brief history of PiThe Raspberry Pi has been the object of a great deal of nerdy affection since its initial release in 2012. A mousetrap-sized, self-contained single-board computer, the Pi is designed to serve as both an educational tool and a handy option for hobbyists – who have turned it into, well, pretty much anything you can think of. Here's a look back through the brief but illustrious history of the Pi.To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. What it's like living on a Chromebook, Part 2

2. INSIDER 5 ways to escape password hell

3. SDN groups respond to Cisco's "game over"

4. 4 ways your competitors are stealing your IT talent

5. Gartner's cloud showdown: Amazon Web Services vs. Microsoft Azure

6. UCLA, Cisco & more join forces to replace TCP/IP

7. Watch Out for These 3 Holiday Shopping Scams

8. IDG Contributor Network: There is No Substitution for In-House Security Professionals.

9. INSIDER 8 significant software releases of 2014

10. 7 great MOOCs for techies -- all free, starting soon!

11. Does being first in supercomputing still matter?

12. Why CIOs need to embrace new norms of the hybrid cloud

13. Top tech turkeys of 2014

: MoreDirect

Disaster Recovery Interactive eGuide

In this eGuide, Computerworld along with sister publications InfoWorld and CIO look at recent disaster recovery trends and offer expert opinions and advice. Read on to learn how the right disaster recovery efforts can protect your organization's data. Learn More

What it's like living on a Chromebook, Part 2

I spent a week living in a Chromebook, and I actually rather enjoyed it.But there were still some obstacles that prevented me from being able to use a Chromebook, and only a Chromebook, as the center of my computing world. Namely: video editing and audio editing. If I could find solutions to those, I'd be living the sweet life on this here Chromebook.See also: What it's like living on a Chromebook, Part 1 This last week I've dedicated myself to the proposition that overcoming these obstacles is possible – and I was determined to do it.To read this article in full or to leave a comment, please click here READ MORE

INSIDER

5 ways to escape password hell

Security can be a vicious cycle. A breach occurs. Enterprises add a new level of security. That increases inconvenience for users, who find workarounds. Then there's another breach and the cycle begins again.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

SDN groups respond to Cisco's "game over"

A couple of organizations are taking issues with Cisco CEO John Chambers' claims that it's "game over" for SDN and that Cisco has won the SDN battle with its Application Centric Infrastructure. The Open Networking Foundation, which is encouraging standardization of the classical SDN model of decoupled control and data planes facilitated by the OpenFlow protocol, has butt heads with ONF member Cisco before.To read this article in full or to leave a comment, please click here READ MORE

4 ways your competitors are stealing your IT talent

One of the best places for your competitors to find great talent is within the walls of your company. If your best and brightest have been jumping ship to work for your biggest rival, it's important to know how they're being recruited, why they are being targeted and what you can do to stop it. Here's how your competitors may be poaching your talent.They're Using Professional Search Tactics Savvy companies know that the best talent is often already employed - with their competitors. Hiring a professional search firm -- or if that's not financially feasible, copying their subtle approach -- can lure away even the most content employees. As this Inc. Magazine article points out, targeting successful talent and then making contact via social networks like Facebook or LinkedIn, or at professional networking events, conferences or industry events with the promise of a "great opportunity" can pique their interest and entice them to consider a move.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: BMC Software

A New Opportunity for Capacity Planners

Mainframe software costs are the cost driver in many company's IT budgets and as such an increasing concern. We will describe the difficulty of managing an increasingly complex environment with limited data and small staffs and offer a methodology to safely and sanely identify achievable cost reductions. Learn More

Gartner's cloud showdown: Amazon Web Services vs. Microsoft Azure

Gartner IaaS Research Director Kyle Hilgendorf says one of the most common questions he gets from enterprise customers looking to go to the cloud is: AWS or Azure?Amazon Web Services has been anointed the public IaaS cloud leader by Gartner and many others, but over the past year or so Satya Nadella's Microsoft has made significant advancements to its public cloud platform. AWS now has competition.AWS clearly has a lead, and a pretty sizeable one, Hilgendorf says. But, it's a marathon, not a sprint: "The race has just begun, and it's a very long race," Hilgendorf said during a presentation at AWS re:Invent comparing the two providers.+ MORE AT NETWORK WORLD: re:Cap of re:Invent 10 Cool new features to Amazon's cloud | Hot new products from AWS re:Invent +To read this article in full or to leave a comment, please click here READ MORE

UCLA, Cisco & more join forces to replace TCP/IP

Big name academic and vendor organizations have unveiled a consortium that's pushing Named Data Networking (NDN), an emerging Internet architecture designed to better accommodate data and application access in an increasingly mobile world. READ MORE

Watch Out for These 3 Holiday Shopping Scams

'Tis the season to be scamming.It's no secret that Americans are about to spend a lot of money during this upcoming holiday shopping season. Holiday sales are expected to hit nearly $617 billion this year – this after consumers spent $2.29 billion on Cyber Monday alone in 2013.That's a big pile of money and credit card numbers and passwords and logins for scammers to jump into, whether through point of sale hacks or phishing scams that go beyond just email.To read this article in full or to leave a comment, please click here READ MORE

IDG Contributor Network: There is No Substitution for In-House Security Professionals.

This post is not about adequate versus inadequate cyber security professionals. Instead, it's an argument for how critical it is to employ full-time in-house cyber security professionals who are dedicated to the constant needs of one organization, versus outsourcing cyber security to a third-party managed security service provider (MSSP) and/or consulting organization.I have always been of the opinion that if one wants to gauge an organization's dedication to the protection of information, they should be asking how many full-time employees are on the payroll that are dedicated to cyber security?If the answer is none, or if the employees are part-time and have other IT responsibilities, they should look critically at the additional information that this organization provides. This is particularly important for organizations that are highly regulated and/or are common targets of cyber criminals.To read this article in full or to leave a comment, please click here READ MORE

WEBCAST: Surfwatch Labs

How to Raise Cyber Risk Management to the C-Suite

In this webcast, CSO publisher Bob Bragdon leads a discussion with SurfWatch Labs Founder and Chief Architect, Jason Polancich and Terrago Technologies Chief Executive Officer Chris Broderick, around this shift of cybersecurity responsibility from the Server Room to the Board Room. Learn More

INSIDER

8 significant software releases of 2014

We looked back at the multitude of software releases in 2014, and selected ones that made an impact. Many of these could continue to transform the tech industry into 2015 and beyond.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

7 great MOOCs for techies -- all free, starting soon!

Always be learningBig data, open source software, security -- these are some of the IT skills most in demand today and for the near future. Fortunately, free classes, in the form of Massive Open Online Courses (MOOCs), are available to help you keep pace with these and many other IT-oriented subjects. Offered by top universities as well as online education platforms (often in partnership), IT MOOCs can help you keep your skills sharp and resume updated.To read this article in full or to leave a comment, please click here READ MORE

Does being first in supercomputing still matter?

NEW ORLEANS -- The European forecast of Hurricane Sandy in 2012 was so far ahead of U.S. models in predicting the storm's path that the National Oceanic and Atmospheric Administration was called before Congress to explain how it happened.NOAA administrator Kathryn Sullivan told lawmakers at a hearing last year that the Europeans "set a target and a policy of staying very close to the leading edge of computational capacity." That's in contrast to the U.S., which "falls further and further behind the cutting edge" and then follows it with a "big step forward," she said.That's how things work in the U.S. When the Soviets launched Sputnik in 1957, the "big step forward" for the U.S. was the moon landing in 1969. It crushed the competition.To read this article in full or to leave a comment, please click here READ MORE

Why CIOs need to embrace new norms of the hybrid cloud

Forget viewing yourself as a cloud services broker. In today's hybrid cloud enterprise the CIO's truly high value role is the creation of seamless business flows that bridge cloud and on-premisec infrastructure to help the business operate better, says Intel CIO Kim Stevenson.Hybrid Cloud: The time for adoption is upon us For most CIOs, a hybrid environment — a combination of on-premise and cloud-based infrastructure and applications — is, or soon will be, a fact of life. The real trick, she says, is to understand that hybrid isn't about cost. It is about innovation cycles and where you, as a CIO, can deliver innovation faster at better value. Innovation that allows the business to get a product to market a quarter sooner is almost certainly of much higher value than saving some cost by choosing the cheapest cloud service.To read this article in full or to leave a comment, please click here READ MORE

Top tech turkeys of 2014

Giving thanksIt's that time of the year again, when people all across America sit down with their families to a nice home-cooked meal and collectively laugh at the people who did more embarrassing stuff than them. Even if that's not how you celebrate Thanksgiving, you can at least be thankful that you're not one of these people.Ted Cruz declaring 'Obamacare for the internet'Republican Senator from Texas Ted Cruz swiftly responded to President Obama's recent call for the FCC to reclassify and regulate the internet like a utility by declaring on Twitter that "net neutrality is Obamacare for the internet." No one – probably Cruz included – quite knew what he meant by this, other than to pander to the people who already support him. If people think Obamacare is bad, then just call net neutrality Obamacare and they'll think that's bad, too. The worst part is, for some people, it'll probably work.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Compuware

Mainframe Excellence 2025

With the right long- term strategy, next-generation IT leaders can leverage their mainframe application portfolios in ways that generate transformative business value and competitive advantage for the next 10 to 15 years - and beyond. Learn More

SLIDESHOWS

Top tech turkeys of 2014

This Thanksgiving, just be thankful you aren't associated with any of these people.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. 14 go-to tools for Mac sysadmins

2. 11 technologies Apple has killed

3. No, Walmart, you can't walk away with my smartphone for price-matching purposes

4. Google launching 20 Internet balloons per day

5. 11 Black Friday deals for HP Pavilion All-in-One PCs with Windows 8.1

6. 20+ Jaw-Dropping Black Friday 2014 Tech Deals

7. Peeping into 73,000 unsecured security cameras thanks to default passwords

8. Regin is groundbreaking malware on par with Stuxnet, Symantec says

9. SDN groups respond to Cisco's game over

10. Microsoft cold-shoulders Server 2003 and XP users hit with Microsoft Update error 0x80248015

Follow Network World

...

Friday, November 28, 2014

Hacking Team surveillance malware masquerades as legitimate bookmark manager

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Nov 28, 2014 8:01 AM
Subject: Hacking Team surveillance malware masquerades as legitimate bookmark manager
To: <aquarianm@gmail.com>
Cc:

10 productivity gadgets to add to your holiday shopping list

Hackers suggest they had physical access during attack on Sony Pictures

Network World Daily News AM
November 28, 2014

Hacking Team surveillance malware masquerades as legitimate bookmark manager

Researchers found digitally signed spyware posing as a legitimate program called Outertech Linkman

READ MORE
 

Issue highlights

1. 10 productivity gadgets to add to your holiday shopping list

2. Hackers suggest they had physical access during attack on Sony Pictures

3. INSIDER Review: Spark Lights a Fire Under Big Data Processing

4. Fidelity's top IT exec sees potential in A.I.

5. New IBM service shines a light on mobile device and app performance

6. Google's gigabit-Internet service in Austin priced at $70 per month

7. Intel to tame passwords with biometric authentication

8. 11 technologies Apple has killed

9. Thwarting attackers with threat intelligence

10. Google quadruples Nobel Prize in Computing to $1M

: MoreDirect

Disaster Recovery Interactive eGuide

In this eGuide, Computerworld along with sister publications InfoWorld and CIO look at recent disaster recovery trends and offer expert opinions and advice. Read on to learn how the right disaster recovery efforts can protect your organization's data. Learn More

10 productivity gadgets to add to your holiday shopping list

Holiday Gadget Gift IdeasImage by ShutterstockIt's that time of the year again. You're probably looking for gifts for a loved one, friend or business associate – or maybe you're looking for a reward for yourself. This list of 10 gadgets will help the people on your holiday shopping list stay productive on the go, whether it's for business or personal travel.To read this article in full or to leave a comment, please click here READ MORE

Hackers suggest they had physical access during attack on Sony Pictures

On Monday, Sony Pictures was forced to disable their corporate network after attackers calling themselves the GOP (Guardians of Peace) hijacked employee workstations in order to threaten the entertainment giant. Now, new information suggests that the GOP had physical access to the network in order to accomplish their aims.According to employees, who continue to speak to Salted Hash on the condition that they names not be used, the corporate network is still offline as of Tuesday morning. VPN access is likewise unavailable. In many cases employees are resorting to using non-technical means as a way to accomplish their daily tasks.To read this article in full or to leave a comment, please click here READ MORE

INSIDER

Review: Spark Lights a Fire Under Big Data Processing

Apache Spark got its start in 2009 at UC Berkeley's AMPLab as a way to perform in-memory analytics on large data sets. At that time, Hadoop MapReduce was focused on large-scale data pipelines that were not iterative in nature. Building analytic models on MapReduce in 2009 was a very slow process, so AMPLab designed Spark to help developers perform interactive analysis of large data sets and to run iterative workloads, such as machine-learning algorithms, that repeatedly process the same data sets in RAM.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

: MoreDirect

Data Center Interactive eGuide

In this eGuide, Computerworld examines the issue of Green IT and how some organizations are making changes for the better. Read on to learn about data center sustainability and how it can be implemented at your organization. Learn More

Fidelity's top IT exec sees potential in A.I.

Since his January 2013 appointment as enterprise CTO at Fidelity Investments, Stephen Neff has made a significant impression in the financial services company's highest IT post. Earlier this year, he was named one of five finalists for the 2014 MIT Sloan CIO Leadership Award. Fidelity Investments He oversees an IT organization with an annual budget of $2.5 billion and 12,500 tech employees, associates and contractors around the globe. And he's tasked with running a distributed technology organization where a majority of workers operate within the various business lines reporting into business unit CIOs.To read this article in full or to leave a comment, please click here READ MORE

New IBM service shines a light on mobile device and app performance

With mobile devices rapidly becoming the tools of choice for enterprise work, IBM wants to help IT departments make sure they can serve all users.Developing and delivering software to laptops and desktops is only part of the battle these days. IBM has signaled that mobile is a big part of its enterprise future through the partnership it announced with Apple in July. No new products from that deal have surfaced yet, but on Tuesday, in a separate development, IBM added to its Mobility Services portfolio.One new service helps IT departments gauge how applications on mobile devices are working, while the other offers a way to deliver them virtually. Both are available now and work on any major mobile OS, said Linda Lyding, director of portfolio strategy and development.To read this article in full or to leave a comment, please click here READ MORE

Google's gigabit-Internet service in Austin priced at $70 per month

Google will offer a basic version of its broadband service for no monthly charge when it launches soon in Austin, Texas, with the 1Gbps service priced at $70 per month.The basic plan will provide download speeds of up to 5Mbps (megabits per second) and upload speeds of 1Mbps, according to Google, which announced its pricing plans Monday and said consumers in some neighborhoods will be able to sign up next month. Customers will pay a one-time "construction" fee of $300, but there will be no monthly charges after that.The middle-tier plan that provides Google Fiber's promised 1Gbps service will be priced at $70 per month, with the construction fee waived for a one-year commitment. That plan includes 1TB of cloud storage across Google Drive, Gmail and Google+ photos, the company said.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: CommVault

IDG MarketPulse: Lighting Up Dark Data CIO Research Paper

On average, just 28 percent of organizational data is stored because it has clear business value. Ominously referred to as dark data, those information assets grow and soak up resources without returning any business value. Learn More>>

Intel to tame passwords with biometric authentication

Forget typing in passwords, Intel wants you to use your body to log into email and online bank accounts.McAfee software that will use biometric technology to authenticate users will be available for download by the end of the year, said Kirk Skaugen, senior vice president and general manager of the PC Client Group at Intel, last week."Your biometrics basically eliminate the need for you to enter passwords for Windows log in and eventually all your websites ever again," Skaugen said.Further product details were not immediately available. But one of the major inconveniences in using PCs and tablets is remembering passwords, which biometrics can tame.To read this article in full or to leave a comment, please click here READ MORE

11 technologies Apple has killed

Out with the oldImage by Connie Ma via Flickr/Creative CommonsOne of the things that makes Apple so successful is that it's not afraid to abandon/kill popular technologies in the interest of something new. In doing so, the company often creates a bit of controversy, even if in the long run it seems to pan out well. At the same time, Apple's revolutionary products have helped bring down entire product categories. Here is a rundown of technologies and products that Apple has killed (or is in the process of killing) over the last 17 years.To read this article in full or to leave a comment, please click here READ MORE

Thwarting attackers with threat intelligence

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.News reports show cyber attacks continue to outpace IT's ability to protect critical data, but teams that have built systems to deliver accurate threat intelligence can often end an attack before damage is done. Threat intelligence comes from commercially available information, ongoing analysis of user behavior and native intelligence from within the organization.+ ALSO ON NETWORK WORLD 5 ways to escape password hell +To read this article in full or to leave a comment, please click here READ MORE

Google quadruples Nobel Prize in Computing to $1M

ACM The Association for Computing Machinery (ACM) has announced that its annual A.M. Turing Award, sometimes called the Nobel Prize in Computing, will now come with a $1M award courtesy of Google. Previously, the award came with a $250K prize funded by Google and Intel. The award, which goes to "an individual selected for contributions of a technical nature made to the computing community," is generally doled out in February or March. This past March, the winner was Microsoft Research principal Leslie Lambert, a distributed computing wrangler.To read this article in full or to leave a comment, please click here READ MORE

WEBCAST: Surfwatch Labs

How to Raise Cyber Risk Management to the C-Suite

In this webcast, CSO publisher Bob Bragdon leads a discussion with SurfWatch Labs Founder and Chief Architect, Jason Polancich and Terrago Technologies Chief Executive Officer Chris Broderick, around this shift of cybersecurity responsibility from the Server Room to the Board Room. Learn More

SLIDESHOWS

Top tech turkeys of 2014

This Thanksgiving, just be thankful you aren't associated with any of these people.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. 14 go-to tools for Mac sysadmins

2. 11 technologies Apple has killed

3. No, Walmart, you can't walk away with my smartphone for price-matching purposes

4. Google launching 20 Internet balloons per day

5. 11 Black Friday deals for HP Pavilion All-in-One PCs with Windows 8.1

6. 20+ Jaw-Dropping Black Friday 2014 Tech Deals

7. Peeping into 73,000 unsecured security cameras thanks to default passwords

8. Regin is groundbreaking malware on par with Stuxnet, Symantec says

9. SDN groups respond to Cisco's game over

10. Microsoft cold-shoulders Server 2003 and XP users hit with Microsoft Update error 0x80248015

Follow Network World

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **