Network World Daily News PM | | Samsung Electronics' deal with BlackBerry and Apple's efforts to make it easier to configure and deploy massive numbers of iPhones highlight how the smartphone makers are battling for supremacy among enterprise users.As the smartphone market becomes saturated in the U.S. and Europe, enterprise users will be big winners. To continue to grow, manufacturers are courting CIOs more aggressively by making products more secure and easier to manage."The big benefit we are seeing is that costs are coming down for managing these devices," said Leif-Olof Wallin, research vice president at Gartner.Samsung has been trying to replicate its consumer success in the enterprise, but has so far struggled to make much headway. The company is hoping to change that by joining forces with BlackBerry to integrate BES (BlackBerry Enterprise Server) 12 with Galaxy smartphones and tablets. The devices will still be protected using Samsung's Knox technology, but BlackBerry will add its network infrastructure and management capabilities, the company said in an announcement Thursday.To read this article in full or to leave a comment, please click here | | Issue highlights 1. Bloodiest tech industry layoffs of 2014, so far 2. FBI: Crooks have stolen $20 million with false Internet ads 3. The High Flying Week in Commercial Drones 4. Suspected WireLurker malware creators arrested in China 5. ScaleBase takes relational databases to web scale in an instant 6. INSIDER 16 tips for thriving as an IT contractor 7. Online video moguls team up to set standards, meet growing demand 8. Apple: Masque hasnt attacked any iPhone, iPad users yet 9. How Silicon Valley startups try to lure top engineering talent 10. 10 amazing Linux desktop environments you've probably never seen | WHITE PAPER: Onapsis Inc. Threats affecting the SAP application layer are frequently overlooked, leaving systems exposed to malicious attacks. This SAP Insider highlights the security blinds spots and explains how automated assessment and audit solutions enable organizations to monitor, detect, prioritize, and prevent threats to close security gaps and mitigate risks. Learn More | Microsoft leads the way, but has plenty of company on jobs cut front READ MORE | Many people should be wary of Internet ads, especially for large ticket items, but apparently enough folks aren't. The Internet Crime Complaint Center today said over $20 million has been scammed and more than 6,800 complaints have been logged between June 2009 and June 2014 over rip-off ads. + More on Network World: John Dillinger, Bonnie and Clyde escape the shredder as FBI finishes vast digital fingerprint/ID project + The criminals have mostly been targeting online consumers with false advertisements for high priced items such as automobiles, boats, heavy equipment, recreational vehicles, lawn mowers, tractors and other high-end gear.To read this article in full or to leave a comment, please click here READ MORE | [View the story "The Week in Commercial Drones" on Storify] To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: BMC Software In a first-of-its-kind study, IDC has documented the costs of business risks created when business and IT teams fail to communicate effectively. Hear how enterprises are addressing the friction associated with IT needs and the gaps and opportunities that exist between business needs and IT service delivery models. Learn More | Beijing police have arrested three people suspected of developing the "WireLurker" malware that may have infected as many as hundreds of thousands of Apple users.Local authorities arrested the three suspects on a tip from Chinese security company Qihoo 360 Technology, the Beijing police's Internet security team said Friday.The three suspects, surnamed Chen, Li and Wang, were detained Thursday and charged with creating and spreading the malware, the police said in a post on its official Sina Weibo account. The police did not publish the full names of the suspects.To read this article in full or to leave a comment, please click here READ MORE | This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. When Mark Zuckerberg and his associates developed a little application called Facebook back in 2004, they had no idea how wildly popular it would become. Designed to replace a college directory, Facebook took off among college students and had 12 million regular users within two years. At Facebook's ten year mark, the application has more than 1.23 billion users worldwide. More than half a billion people access the application every day.Now picture yourself being the database administrator (DBA) who has to figure out how to accommodate such rapid growth. All those users and all their postings have to be organized and managed without impacting performance and availability of the application.To read this article in full or to leave a comment, please click here READ MORE | When demand exceeds the supply of available IT talent, many companies are using contractors to help fill the gaps. IT contractors provide manpower when workloads spike and can bring key expertise and skills to a team. (See related story, Life as an IT contractor)To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | WHITE PAPER: BMC Software This paper discusses five levers you can use to lower your mainframe MLC costs by up to 20 percent or more. Explore best practices and real-world examples of dramatic savings through a mainframe MLC optimization strategy based on higher visibility, predictability, and automation. Learn More | Some of the most powerful companies in video networks and delivery plan to define an open architecture for streaming video as part of a new alliance that includes Cisco Systems, Comcast, Ustream and Yahoo, but not Netflix or YouTube.The Streaming Video Alliance, announced Friday, says it wants to help scale the infrastructure for online video and make it more efficient while maintaining the quality of the viewer experience. To do that, it plans to "redefine the way online video is streamed across mobile and fixed networks" while fostering deeper collaboration and speeding up innovation.Streaming video is growing fast and taking up an increasing share of network capacity as consumers turn to online sources of entertainment instead of, and in addition to, broadcast TV and traditional cable. It's also a hotly contested area where broadband providers and over-the-top Internet video companies such as Netflix have clashed over the business side of delivering large amounts of content to consumers. Much of the debate over net neutrality centers on whether service providers can sell network priority to streaming video companies.To read this article in full or to leave a comment, please click here READ MORE | Following a U.S. government warning about an iPhone and iPad security threat dubbed Masque Attack, Apple has issued a statement assuring customers that they're probably okay. Masque Attack could enable hackers to exploit iPhones Masque Attack, which security vendor FireEye disclosed information about earlier this week, allows attackers to swap in fake apps for legitimate ones, and potentially grab sensitive data. To read this article in full or to leave a comment, please click here READ MORE | We all know that there's a huge engineering talent shortage in Silicon Valley, right? That anyone who knows the difference between a 1 and a 0 can instantly make more money than the President of the United States, and maybe even get super-rich before they turn 25.See also: Yes, there's a tech bubble: Facebook's mobile ad success proves it But how all that actually works—especially at the highest levels—is a juicy story, one which tech news site The Information did a great job illuminating in an interview this week with Ali Behnam (paid subscription required), co-founder and managing partner at Riviera Partners, a leading San Francisco tech recruiting firm. According the piece's author, Eric. P. Newcomer, Riviera helped Uber, Dropbox, and Twitter, for example, hire vice presidents of engineering.To read this article in full or to leave a comment, please click here READ MORE | One of the most amazing things about Linux is how versatile it is. Let's face it - Windows and MacOS X are...boring. They look exactly how they look. When it comes to making your computer look and behave however you like, Linux is king. Let's take a stroll through some truly interesting, and beautiful, Linux Desktop Environments - the ones that many of us have never even seen. READ MORE | WHITE PAPER: OutSystems New research conducted by Opinion Matters reveals that 85% of enterprises have a mobile app development backlog because they can't cope with business demands. With the average application taking anywhere between three and 12 months to get out the door, this slow approach to app development is resulting in competitive disadvantage. Learn More | | | | | | | | |
No comments:
Post a Comment