Network World Daily News PM | | IBM is going up against cloud-apps powerhouses Google and Microsoft with its next generation email client, called Verse, designed to enrich email with social media and analysis."We felt we could leverage analytics to build an experience that understands your priorities," said Jeff Schick, IBM general manager of IBM social solutions, of the app that launched as a private beta on Tuesday. "We had the opportunity to reduce clutter and create priority, and to help people be more efficient in how they master their inbox."The company plans to offer Verse in the first quarter of 2015 as a hosted service though the IBM Cloud Marketplace. IBM will also issue apps for both iOS and Android that can access all the same features as the desktop browser version.To read this article in full or to leave a comment, please click here | | Issue highlights 1. Google software writes photo captions (sigh) 2. UC Berkeley, MIT and Stanford split $45M in cybersecurity policy research grants 3. AWS re:Invent(ing) IT, Business Models and Marketing 4. US Marshals auctioning $20M worth of Silk Road's Bitcoins 5. Smartphone Encryption – What Does it Mean to You? 6. Swedish ISP to let users shield Internet activity from police 7. IBM taps Twitter's data to drive business insights 8. EFF, Mozilla back new certificate authority that will offer free SSL certificates 9. Cisco open sources security 10. Extreme extends SDN products, partners 11. Mobile payments to tally just 1% of all U.S. consumer spending in 2019 | WHITE PAPER: Brother International Corp. OmniJoin offers a full suite of security features to give you the peace of mind that your web meetings are as secure as you need them to be. Learn More>> | A system created by Google researchers automatically wrote the caption on the picture above this post.Normally, I get paid to perform that function, at least on this blog.Maybe this isn't such great technology (he writes jokingly).From a post on the Google Research Blog: People can summarize a complex scene in a few words without thinking twice. It's much more difficult for computers. But we've just gotten a bit closer -- we've developed a machine-learning system that can automatically produce captions … to accurately describe images the first time it sees them. This kind of system could eventually help visually impaired people understand pictures, provide alternate text for images in parts of the world where mobile connections are slow, and make it easier for everyone to search on Google for images.To read this article in full or to leave a comment, please click here READ MORE | The Hewlett Foundation has granted $15M apiece to the University of California at Berkeley, MIT and Stanford University to conduct cybersecurity policy research, bringing to $65 the total that the foundation has committed to such research over the next 5 years. According to the foundation, "The grants to MIT, Stanford, and UC Berkeley are intended to jump-start a new field of cyber policy analysis—generating a robust 'marketplace of ideas' about how best to enhance the trustworthiness of computer systems and appropriately balance rights of privacy, the need for data security, innovation, and the broader public interest."To read this article in full or to leave a comment, please click here READ MORE | AWS held its 3rd annual re:Invent user conference with 13,500 attendees in Las Vegas. While the event had similarities to other IT conferences that included an expo floor, keynotes, and sessions I was fascinated by, AWS has the potential to disrupt the way businesses consume IT, IT organizational structure, high margin IT infrastructure business models, and product marketing. There were a pile of announcements at the event, but it is the following disruptors that will account for the AWS blast radius:IT Consumption: My conversations with customers and the event content validated that the 1st wave of movers are absolutely net new applications driven by developers. This is followed by website hosting and digital transformation where businesses are collecting, storing, and running analytics, resulting in actionable results and visibility. The next wave can be super hard and involves the migration of traditional business-critical applications. I spoke with one customer who is on the fast track of AWS adoption, but re-platformed SAP on-prem for a simpler inline migration as opposed to a risky export and import of critical business data. With this said, AWS has the crosshairs on major IT vendors such as Oracle and is setting itself up to challenge commercial databases with Amazon DynamoDB, RDS, and Red shift.To read this article in full or to leave a comment, please click here READ MORE | WEBCAST: VMware Historically, Healthcare IT has not been a IT trend setter. In fact, they have been historically viewed as technology laggards. Although with the massive business and industry transformation taking place that is or will no longer be the case. We will explore how the Healthcare will be able to get out of the basement and into the cloud. Learn more! | The US Marshals office this week said it would auction off almost 50,000 or about $20 million worth of alleged Silk Road creator Robert Ulbricht's Bitcoins.The auction, which is the second sale of Silk Road's Bitcoin collection, will take place during a 6-hour period on Dec. 4 from 8:00 a.m. until 2:00 p.m. EST. Bids will be accepted by email from pre-registered bidders only, the US Marshall's office stated. In June a more than $17 million in Bitcoins seized from the Silk Road take-down was auctioned off. +More on Network World: IRS: Bitcoin is property not money+To read this article in full or to leave a comment, please click here READ MORE | Why are legislators considering going to congress for access to our cell phones? What has changed recently to motivate these demands for legislative changes? The Communications Assistance for Law Enforcement Act, or CALEA, passed in 1994, gave access to our voice communications to wiretap our phone to members of the law enforcement community. This law required all telephone service providers to make it possible for law enforcement to wiretap phones. The law did not anticipate any of the new technology which is now commonplace. The access is still permissible, but now the data and metadata which used to be accessible are garbled. The two main cellular operating system (OS) vendors, Apple and Google with their respective iOS and Android operating systems, have recently implemented new security protocols for data storage, which automatically encrypt the information stored on the mobile devices which use these OSs. Both Apple and Google use very sophisticated encryption algorithms, which can take years of processing power to decrypt a single device. Further, neither vendor built a "back door" for access without the user password into their device.To read this article in full or to leave a comment, please click here READ MORE | Swedes have started to sign up for a free service from ISP Bahnhof to hide their Internet communications metadata from the police, and the company's CEO is urging other European ISPs to follow suit.The Swedish ISP will start offering a free VPN (virtual-private-network) service to its customers on Monday. That same day it will also resume retaining customer location and traffic metadata for law enforcement purposes to comply with Swedish law, something it stopped doing in May. By complying again with the data retention rules, the ISP will avoid a fine of 5 million Swedish Kronor, or about US$678,000.To read this article in full or to leave a comment, please click here READ MORE | : MoreDirect In this eGuide, Computerworld along with sister publications InfoWorld and CIO look at recent disaster recovery trends and offer expert opinions and advice. Read on to learn how the right disaster recovery efforts can protect your organization's data. Learn More | The enterprise sector is undergoing such a transformation that companies recently deemed unfit for the corporate world are now sitting at the head of the table. So if IBM's partnership with Apple seemed like a hell-freezing-over moment in the middle of summer, last month's follow-up deal with Twitter would have to be characterized as a deep freeze.Enterprise is no longer exclusive to the stodgy or empowered companies that coast by on conformity. IBM and Twitter proclaim that they will "change the way business decisions are made" by integrating Twitter data into IBM analytics tools, developing mission-critical apps for enterprises and training 10,000 outside consultants to create other custom apps.To read this article in full or to leave a comment, please click here READ MORE | A new organization supported by Mozilla, the Electronic Frontier Foundation and others is working to set up a new certificate authority (CA) that will provide website owners with free SSL/TLS certificates. The new CA will be called Let's Encrypt and is expected to become operational in the second quarter of next year. It will be run by the Internet Security Research Group (ISRG), a new California public-benefit corporation. The goal of this effort is to get as many people as possible to use the TLS (Transport Layer Security) protocol -- the more secure successor of SSL (Secure Sockets Layer) -- said Josh Aas, executive director of ISRG. Aas is also a senior technology strategist at Mozilla.To read this article in full or to leave a comment, please click here READ MORE | Cisco this week announced the availability of an open source security framework designed to harness big data analytics to combat data loss.Cisco OpenSOC integrates elements of the Hadoop ecosystem, such as Storm, Kafka, and Elasticsearch, to provide a platform incorporating full-packet capture indexing, storage, data enrichment, stream processing, batch processing, real-time search, and telemetry aggregation. It also provides a centralized platform to enable security analysts to detect and respond to threats, Cisco says.To read this article in full or to leave a comment, please click here READ MORE | Extreme Networks this week announced new products and technology partners for its Software Defined Architecture data center product line. Extreme's Software Defined Architecture is designed to provide unified management, application analytics and data center orchestration for virtualized enterprise, cloud service provider and high performance computing and Big Data deployments. It comprises Extreme switches and SDN software applications and controllers, including the company's OpenDaylight-based OneController software.To read this article in full or to leave a comment, please click here READ MORE | The emergence of Apple Pay has led some technology early adopters to predict that mobile payments will dominate U.S. consumer spending in the next decade.Yet the idea that most Americans will use a mobile wallet in 2025 is still a pipe dream, according to some expert analysis.Forrester Research on Monday threw something of a wet blanket on mobile payment growth, calling it an "evolution — not a revolution," in a blog.In a separate report for its clients, Forrester said that the $142 billion predicted for mobile payment spending in 2019 will be "just a drop in the ocean of total U.S. consumer spending." Forrester predicted that all forms of mobile spending — online, in-person and person-to-person — will total only 1% of the annual $16 trillion consumer payments in the U.S.To read this article in full or to leave a comment, please click here READ MORE | WEBCAST: CenturyLink Now on Demand! IT leaders are constantly required to do more with less, but even as new digital technologies now play the most vital role in engaging customers, many IT groups spend 75% of their resources on legacy application maintenance. Join us to learn how IT organizations can pivot from maintenance to creation and innovation. View now | SLIDESHOWS Pi, translated: The evolution of Raspberry Pi It's only been two years, but the Raspberry Pi has already come a long way. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn Join the IDG Contributor Network The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today. MOST-READ STORIES of 2014 1. 20-plus eye-popping Black Friday 2014 tech deals 2. The SWAMP: How to avoid the coming software armageddon 3. 10 hottest IT skills for 2015 4. Cool Yule Tools: Best techie gifts for 2014 5. The 10 mightiest supercomputers on the planet 6. Cloud computing's not-so-secret mission 7. 10 enterprise Internet of Things deployments with actual results 8. re:Cap of AWS re:Invent: 10 cool new Amazon cloud features 9. Mobile Pwn2Own: Windows Phone does well, iPhone 5S, Galaxy S5, Nexus 5, Fire Phone fall 10. Peeping into 73,000 unsecured security cameras thanks to default passwords | | | | | | | |
No comments:
Post a Comment