Network World Daily News PM | | New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Concerto Cloud Premium Infrastructure as a ServiceKey features: The Concerto Cloud IaaS combines 24/7 management and support, 99.99% guaranteed up-time, state-of-the-art facilities, best-of-breed technologies and more in a highly secure solution that's fully customized for enterprise applications. More info.To read this article in full or to leave a comment, please click here | | Issue highlights 1. 'Less' means more to malware authors targeting Linux users 2. Alcatel-Lucent Enterprise Unveils OpenTouch Suite for SMBs 3. INSIDER How to create seamless mobile security for employees 4. IDG Contributor Network: Using lasers for backhaul Internet 5. Hack the halls: Watch out for Cyber Monday scamathon 6. 7 tools tuned for agile development success 7. Breaking up Google is just one possible antritrust option, EU lawmakers say 8. Segmenting for security: Five steps to protect your network 9. Attack of the one-letter programming languages 10. INSIDER Review: Spark lights a fire under big data processing | WHITE PAPER: BMC Software Mainframe software costs are the cost driver in many company's IT budgets and as such an increasing concern. We will describe the difficulty of managing an increasingly complex environment with limited data and small staffs and offer a methodology to safely and sanely identify achievable cost reductions. Learn More | Using the "less" Linux command to view the contents of files downloaded from the Internet is a dangerous operation that can lead to remote code execution, according to a security researcher.At first glance, less appears to be a harmless command that outputs a file's content to a terminal window and allows the users to navigate forward and backward through it. Less does not allow file editing, which is a job for file editors like the widely used vi, but has the benefit of displaying data on the fly without needing to load an entire file into memory. This is useful when dealing with large files.Less is frequently used to view text files, but on many Linux distributions, including Ubuntu and CentOS, it supports many more file types including archives, images and PDF. That's because, on these systems, less is extended through a script called lesspipe that relies on different third-party tools to process files with various extensions.To read this article in full or to leave a comment, please click here READ MORE | Alcatel-Lucent Enterprise has added to its unified communications portfolio with its OpenTouch Suite for SMB, targeting the small- and medium-sized business. New features include simplified SIP support, BYOD solutions, and a flexible cloud approach.The OmniPCX Office RCE release 10 communication server offers plug-and-play voice and data deployment capability, with a PowerCPU Extended Edition that eliminates the need for a hard disk, to improve reliability. SIP deployment and public trunking solutions have removed the need for Session Border Controller, according to the company's statement.Other new features within the unified communications foundation include multi-device unified instant messaging, along with conversation and history tracking accessible on Premium DeskPhones through web-based and mobile applications. BYOD features are supported for iOS 8 and Android 4.4.To read this article in full or to leave a comment, please click here READ MORE | The salespeople at financial services firm Vanguard Group need on-the-go access to presentations, client data and meeting details from wherever they are without a lot of hurdles. That doesn't mean, however, they need to access the complete suite of Vanguard applications and all of its data. So access is built around determining what users need in order to be productive without jeopardizing security by giving them too much access, says John Marcante, managing director and CIO at Valley Forge, Pa.-based Vanguard.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | WHITE PAPER: BMC Software Monthly license charges (MLC) are rising by 7% or more each year, and account for 30% of total mainframe costs. Yet managing MLC costs is an inexact science. Learn More | Cost is the principal reason lasers could be a highly attractive alternative to fiber for backhaul and remote areas. Fiber is expensive to lay, and often the rural nature of the application means that there aren't enough customers to pay it.Campbell, California-based AOptix reckons it's got an alternative to fiber with a hybrid laser and Millimeter spectrum setup.What is it?Laser-delivered Internet utilizes a combination of optics, along with Millimeter-wave radio frequencies.The combination of the two carriers should theoretically offset issues with disruption due to inclement weather—fog can disrupt laser, for example, and rain can affect Millimeter.To read this article in full or to leave a comment, please click here READ MORE | Cyber Monday is the biggest online shopping day of the year, which means it is also the single biggest opportunity for criminals to steal cash, personal information and credit card numbers, and they've got an imposing arsenal to carry out their plans against the unwary.They'll rely on a range of scams that play on human frailties as well as malware technology that automates the theft of sensitive personal and financial data.Some of these criminal plans have been around for years and with upgrades and revisions remain effective today so beware these holiday traditions.The FBI is all over this problem and has issued some sound advice, including not responding to, clicking on links in and opening attachments to unsolicited emails. All can lead to infections and data theft. Also, don't fill out forms in such emails that ask for personal information.To read this article in full or to leave a comment, please click here READ MORE | 7 tools tuned for agile development successImage by Alexandr MitiucAgile development remains an increasingly popular way for development teams to get work done. The iterative alternative to fully mapped-out waterfall processes has become widely accepted in recent years, bringing with it software tools designed to help agile practitioners hone their processes, collaborate efficiently, and monitor progress.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: OutSystems New research conducted by Opinion Matters reveals that 85% of enterprises have a mobile app development backlog because they can't cope with business demands. With the average application taking anywhere between three and 12 months to get out the door, this slow approach to app development is resulting in competitive disadvantage. Learn More | Breaking up Google by separating its search engine from other commercial services is only one of the actions the European Commission could take to resolve the company's antitrust problems, say members of Parliament who are proposing the split.A draft version of a European Parliament resolution, reported by news outlets over the weekend, calls on the Commission to break up Google as one way to solve competition issues with the search engine provider, which is the biggest in Europe.The Parliament is set to discuss the resolution, which also deals with a range of other European tech issues, on Wednesday in Strasbourg and vote on it on Thursday. As the resolution is still a draft, its text could still change. If adopted, it would also be non-binding though it would force a response from the Commission.To read this article in full or to leave a comment, please click here READ MORE | Relying on a DMZ to protect your network and data is like putting money in a bank that depends on one guard and a single gate to secure its deposits. Imagine how tempting all those piles of money would be to those who had access — and how keen everyone else would be to obtain access. But banks do not keep cash out on tables in the lobby, they stash it in security boxes inside vaults, behind locked doors, inside a building patrolled by a guard and secured by a gate. Likewise, network segmentation offers similar security for an organization's assets. + ALSO ON NETWORK WORLD Free security tools you should try +To read this article in full or to leave a comment, please click here READ MORE | Watch out! The coder in the next cubicle has been bitten and infected with a crazy-eyed obsession with a programming language that is not Java and goes by the mysterious name of F. The conference room has become a house of horrors, thanks to command-line zombies likely to ambush you into rewriting the entire stack in M or R or maybe even -- OMG -- K. Be very careful; your coworkers might be among them, calm on the outside but waiting for the right time and secret instructions from the mothership to trash the old code and deploy F# or J.ALSO ON NETWORK WORLD: Google Graveyard: Here's what Google has killed so far in 2014 A long time ago -- long before Netflix, Hulu, and HBO battled for the living room -- people went to the movie theaters for their weekly dose of video streaming. There were usually only two movies, and you couldn't choose the order. (The horror!) The double feature began with the big stars -- the Javas and JavaScripts of the acting world -- but then it got interesting. The second feature, the so-called B movie, was where the new ideas, odder actors, and weirder scripts found their home. Some proved rich enough with exactly the right kind of out-there thinking to garner significant cult followings -- even break through to the mainstream.To read this article in full or to leave a comment, please click here READ MORE | Apache Spark got its start in 2009 at UC Berkeley's AMPLab as a way to perform in-memory analytics on large data sets. At that time, Hadoop MapReduce was focused on large-scale data pipelines that were not iterative in nature. Building analytic models on MapReduce in 2009 was a very slow process, so AMPLab designed Spark to help developers perform interactive analysis of large data sets and to run iterative workloads, such as machine-learning algorithms, that repeatedly process the same data sets in RAM.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | WHITE PAPER: Compuware With the right long- term strategy, next-generation IT leaders can leverage their mainframe application portfolios in ways that generate transformative business value and competitive advantage for the next 10 to 15 years - and beyond. Learn More | | | | | | | |
No comments:
Post a Comment