Network World Daily News AM | | Programmers and project managers rejoice: Your skills are bankable assets. | | Issue highlights 1. Microsoft: 'Nobody loves developers more than us' 2. Nokia makes a consumer comeback with N1 Android tablet 3. Obama backs passing of NSA reform legislation by Senate 4. The 10 mightiest supercomputers on the planet 5. China disrupts some websites linked to US content delivery network 6. A look back at 2014's data protection nightmare 7. Intel to combine PC and mobile divisions as market shifts 8. PCI Council looks for ways to stem data breaches after bad year 9. TRUSTe deceived consumers about recertification program, FTC says 10. Cloud computing's not-so-secret mission 11. Encrypt everything, urges Internet Architecture Board | WHITE PAPER: OutSystems New research conducted by Opinion Matters reveals that 85% of enterprises have a mobile app development backlog because they can't cope with business demands. With the average application taking anywhere between three and 12 months to get out the door, this slow approach to app development is resulting in competitive disadvantage. Learn More | At this week's TopCoder Open, Microsoft Developer Evangelist Matt Thompson made his pitch for the newer, gentler, more open Microsoft to the startups and independent developers in attendance. READ MORE | Nokia is once again developing mobile devices, and this time the company is using Android. The N1 tablet has a high-resolution 7.9-inch screen and a 5-megapixel front camera.It didn't take long for Nokia to return to the consumer market after selling its mobile devices business to Microsoft. On Tuesday, the company launched the Android-based N1 tablet at the Slush conference in Helsinki. The tablet will cost US$249 plus tax and start shipping in February in China, later becoming available in Europe and other countries.Nokia's tablet arrives a week after Microsoft launched the first Lumia smartphone without the Nokia brand on it. It completed is acquisition of Nokia's device business in April.To read this article in full or to leave a comment, please click here READ MORE | The administration of U.S. President Barack Obama urged the Senate to pass the USA Freedom Act, which would curb the bulk collection of telephone records by the National Security Agency in the wake of widespread concerns about potential violations of privacy.The administration has asked the Senate to pass the legislation and for the House of Representatives, which earlier passed a weakened version of the bill, to act quickly so that Obama can sign the legislation into law this year, according to a statement Monday from the executive office of the president. The bill has to pass both in the Senate and the House before it can become law.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: BMC Software Monthly license charges (MLC) are rising by 7% or more each year, and account for 30% of total mainframe costs. Yet managing MLC costs is an inexact science. This best practice guide provides a step-by-step process to reduce mainframe MLC costs up to 20% without compromising business critical services. Learn More | The fastest computers in the worldIt was a familiar top 10 released today by the authors of the twice-annual Top500 ranking of world supercomputers, with most entries largely unchanged from this summer's list. Here's a look at the 10 fastest machines in the world.#10: Mystery computer (U.S.)A mysterious Cray CS-Storm, Infiniband-based machine operated by the U.S. government at an undisclosed location is the lone newcomer to the latest top 10. It's also the most energy efficient, providing 2386.42 megaflops per watt of power.To read this article in full or to leave a comment, please click here READ MORE | It's no surprise when China censors a site with anti-government content, but starting last week the country has potentially cut access to scores of non-political sites with a block on U.S. content delivery network EdgeCast Networks.The "Great Firewall of China" has begun filtering out more sites and networks connected to EdgeCast customers, preventing the services from appearing in the country, the Verizon-owned company said in a blogpost Monday."This week we've seen the filtering escalate with an increasing number of popular web properties impacted," it said. "and even one of our many domains being partially blocked...with no rhyme or reason as to why."To read this article in full or to leave a comment, please click here READ MORE | Nightmarish RealitiesImage by ShutterstockIn first nine months of 2014, after 1,922 confirmed incidents, criminals managed to compromise 904 million records. Here's a look back at some of the year's most notable breaches.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: CommVault This CommVault Business Value and Technology White Paper explains how Simpana IntelliSnap® Recovery Manager can make your application recovery fast and reliable. Learn More | Intel will combine its PC and mobile processor divisions under one roof, reflecting a changing market in which the line between tablets and laptops has blurred.The chip maker will form a new division at the start of next year called the Client Computing Group, which will include the teams that develop its Core processors for desktops and laptops, as well as those that develop its Atom chips for smartphones and tablets.The changes were announced Monday in an internal email from CEO Brian Krzanich, Intel spokesman Chuck Mulloy said. They're designed to improve lines of communication between product teams and help Intel better reach manufacturers that use its products.To read this article in full or to leave a comment, please click here READ MORE | A consortium that develops guidelines for protecting payment card data is hoping that emerging security technologies will help prevent breaches that made this year one of the worst ever on the security front."It's been a bad year," said Jeremy King, international director of the PCI Security Standards Council, at its Asia-Pacific Community Meeting in Sydney on Tuesday. "We hope to get better. Unfortunately, the criminals are getting better."As many as 2.3 billion records were compromised this year, a figure close to the populations of India and China combined, King said.One of the largest individual breaches was recorded by Home Depot, which lost 56 million payment cards in an attack on its point-of-sale system, launched after a third-party vendor's credentials to its network were compromised.To read this article in full or to leave a comment, please click here READ MORE | It turns out that TRUSTe, the provider of privacy certifications for online businesses, may not be so trustworthy after all. The company failed to conduct annual recertification checks for hundreds of companies holding its privacy seal, despite promising to do so, the U.S. Federal Trade Commission has charged.The FTC and TRUSTe have reached a settlement on the agency's complaint that the company deceived consumers about its recertification program, the FTC announced Monday.From 2006 until January 2013, TRUSTe failed to conduct annual recertifications of companies holding TRUSTe privacy seals in more than 1,000 cases, despite saying on its website that companies holding TRUSTe Certified Privacy Seals receive recertification every year, the FTC alleged in its complaint.To read this article in full or to leave a comment, please click here READ MORE | There is no denying that the cloud and cloud computing have changed the way many of us are doing business. You only had to attend last week's sold out AWS re:Invent conference in Las Vegas to see the cloud out in force.But as the cloud matures, we are seeing another layer of cloud computing that promises to shake the foundation of our IT infrastructure to its core – the advent of IT-as-a-Service, which will be perhaps the cloud's highest calling.Initially, many thought of the cloud as the successor to the web host. The next-gen data center. As someone who first became involved in web hosting in 1995 or so, I will admit that I thought that as well. The cloud is a great place to keep your web infrastructure, and it is even great to keep your apps and app infrastructure.To read this article in full or to leave a comment, please click here READ MORE | The Internet Architecture Board (IAB) has issued a sweeping directive "for protocol designers, developers, and operators to make encryption the norm for Internet traffic ," even while acknowledging that such an approach will create major obstacles for some network operations.The statement also leaves unaddressed what will be inevitable howls of protest from the law enforcement and national security sectors, whose surveillance activities have long motivated those pushing for ubiquitous encryption.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: CommVault On average, just 28 percent of organizational data is stored because it has clear business value. Ominously referred to as dark data, those information assets grow and soak up resources without returning any business value. Learn More>> | SLIDESHOWS Pi, translated: The evolution of Raspberry Pi It's only been two years, but the Raspberry Pi has already come a long way. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn Join the IDG Contributor Network The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today. MOST-READ STORIES of 2014 1. 20-plus eye-popping Black Friday 2014 tech deals 2. Mobile Pwn2Own: Windows Phone does well, iPhone 5S, Galaxy S5, Nexus 5, Fire Phone fall 3. Peeping into 73,000 unsecured security cameras thanks to default passwords 4. Black Friday iPhone 6, iPad Air deals spill forth from Walmart 5. 8 free online courses to grow your tech skills 6. 20 cool things you can do with a Raspberry Pi 7. Ten operating systems for the Raspberry Pi 8. Intel turns to light beams to speed up supercomputers 9. Cisco winning SDN battle: Chambers 10. 8 tech buzzwords that you need to know | | | | | | | |
No comments:
Post a Comment