High-tech

High-tech
Light

Tuesday, November 11, 2014

Obama: Broadband should be regulated as a utility

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Nov 10, 2014 2:18 PM
Subject: Obama: Broadband should be regulated as a utility
To: <aquarianm@gmail.com>
Cc:

US Postal Service suffers breach of employee, customer data

WireLurker malware threatens to destroy a key Apple advantage

Network World Daily News PM
November 10, 2014

Obama: Broadband should be regulated as a utility

President Barack Obama has made his strongest statement on net neutrality to date, calling on the Federal Communications Commission to reclassify broadband as a regulated utility, and to prohibit broadband providers from charging Web content producers for paid traffic prioritization.Obama on Monday called on the FCC to reclassify broadband as a common carrier, subject to telephone-style regulations, and to ban broadband carriers from selectively blocking or throttling Web traffic. The president waded into a contentious debate about reclassifying broadband, coming down on the opposite side of many large broadband carriers.To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. US Postal Service suffers breach of employee, customer data

2. WireLurker malware threatens to destroy a key Apple advantage

3. Home Depot IT: Get hacked, blame Windows, switch execs to MacBooks

4. When Outlook drag-and-drop stops working ...

5. Mapping the ultimate Halloween candy haul route: Sweetest use of Big Data ever?

6. Tor Project mulls how Feds took down hidden websites

7. HP's BYOD service protects mobile devices and PCs

8. INSIDER Cloud computing claims a pivotal role in 2015

9. Pica8 blends SDN with traditional networking

10. HP's strange new SlateBook: A guided tour

WEBCAST: Centrify Corporation

Enterprise SaaS Security and Governance Considerations

The security and governance impact of SaaS-based applications has been tremendous due to a lack of IT visibility and control. This Webcast explores how to mitigate the risks in applications like Salesforce, GoogleApps, Dropbox, and more. Learn more >>

US Postal Service suffers breach of employee, customer data

A U.S. Postal Service data breach has potentially compromised the personal information of 800,000 employees, as well as some customers who contacted the government service.The data breach of some USPS information systems, being investigated by the FBI, may include names, dates of birth, Social Security numbers, addresses and other information of Postal Service employees, the USPS said in a press release. The intrusion, reportedly discovered in September, also may affect customers who called or emailed the USPS customer care center between January and mid-August, the post office said.+ Also on NetworkWorld: UCLA, Cisco & More join forces to replace TCP/IP +To read this article in full or to leave a comment, please click here READ MORE

WireLurker malware threatens to destroy a key Apple advantage

The mere perception that WireLurker poses a credible threat to Macintosh and iOS systems would be a huge blow to Apple. READ MORE

Home Depot IT: Get hacked, blame Windows, switch execs to MacBooks

You may have received an email from Home Depot notifying customers that along with compromising 56 million credit card accounts, attackers stole 53 million email addresses. Home Depot If you shop at Home Depot but haven't received an email yet, then according to the FAQs (pdf): Even if you do not receive an email notification from us, it's safe to assume your email address could have been stolen. We recommend that you be on the alert for phony emails requesting personal or sensitive information.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: BMC Software

Deliver on the Promise of Digital Transformation

Rapid shifts in the ways that technology and information are consumed and delivered - through cloud computing, big data, social networking, and smart devices - are transforming how companies compete. Learn More

When Outlook drag-and-drop stops working ...

So the drag-and-drop functionality in Microsoft Outlook flat-out stopped working for me this morning, presumably because it's Monday. I've never had this problem before, so I didn't know how to fix it. Fortunately, a quick search on "drag-and-drop not working in Outlook" turned up the following simple remedy from a site called Saniac: Just hit the escape key. (Saniac warned that you may have to do it more than once, but a single try worked fine for me.)  To read this article in full or to leave a comment, please click here READ MORE

Mapping the ultimate Halloween candy haul route: Sweetest use of Big Data ever?

I know Big Data and Data Science are important and increasingly difference makers for enterprises around the world. But there's just something about the terms that usually make my eyes glaze over.But not in the case of Zeeshan-ul-hassan Usmani's sweet account of his son's Halloween candy haul this year -- and more importantly, his scheme for next year.The co-founder of North Carolina big data and predictive analytics startup Predictify.me, Usmani shares his tale on the blogging site Medium, starting off this way:To read this article in full or to leave a comment, please click here READ MORE

Tor Project mulls how Feds took down hidden websites

Little is known about how U.S. and European law enforcement shut down more than 400 websites, including Silk Road 2.0, which used technology that hides their true IP addresses.The websites were set up using a special feature of the Tor network, which is designed to mask people's Internet use using special software that routes encrypted browsing traffic through a network of worldwide servers.Tor -- short for The Onion Router -- also allows people to host "hidden" websites with a special ".onion" URL, which are difficult to trace. But law enforcement appears to have figured out a method to find out where sites are hosted, a serious flaw that could pose risks to people who aren't running websites that sell drugs and weapons.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: IBM

Improving Collaboration by Adding Social to Email

This paper looks at why email remains the primary mode of communication in business today and the fact that more and more organizations are looking at social software and other real-time communication methods to add to the email experience. Read Now

HP's BYOD service protects mobile devices and PCs

Hewlett-Packard wants to make BYOD easier for small businesses through a new cloud-based service to manage and protect mobile devices and PCs.The company's Web-based Touchpoint Manager service, launched Monday, can remotely check the health of smartphones, tablets, laptops and desktops. It can also issue alerts and remotely lock or wipe data from devices in case of theft.The service is for businesses with up to 500 employees that need a basic bring-your-own-device management plan at an affordable price, said Michael Park, vice president and general manager of Commercial Mobility, Printer and Personal Systems at HP.To read this article in full or to leave a comment, please click here READ MORE

INSIDER

Cloud computing claims a pivotal role in 2015

Martin Slominis had a problem familiar to lots of IT executives: His staff didn't have the capacity to fulfill all the demands users put on his department.Cloud adoption does continue to be stymied by security concerns, highly customized software and the complexity of systems, he says, but companies see cloud computing as offering too many benefits to resist. As a result, the real issue moving forward is how to harness those benefits to enable transformation.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

Pica8 blends SDN with traditional networking

As the SDN market shakes out, the companies that can help companies bridge the gap with traditional networks will be in a good position. READ MORE

HP's strange new SlateBook: A guided tour

HP SlateBookWith the SlateBook 14, HP has delivered a notebook computer running the Android mobile OS. The question is, why? To be clear, this isn't an Android tablet with a detachable keyboard. This is a full-fledged notebook that runs Android—and only Android, a mobile OS meant for smartphones and tablets. The SlateBook isn't officially sanctioned by Google. (The company focuses on developing its Chrome OS for notebooks.) So why did HP make it, and how well does Android work on a notebook? The company loaned me a SlateBook, which I used for a week in order to figure these questions out.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Dell | Symantec

2014 Enterprise Mobility Management Challenge

This guide addresses how IT can gain control and secure mobility without alienating users. Discover the 5 "must-have" features of mobility management, protecting data at the app level rather than the device level, the differences between MDM, MCM and MAM, and key considerations when selecting an enterprise mobility management solution. Learn More

SLIDESHOWS

Ten operating systems for the Raspberry Pi

The OSes the Raspberry Pi can run will amaze you!

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Peeping into 73,000 unsecured security cameras thanks to default passwords

2. 20 cool things you can do with a Raspberry Pi

3. Cisco, Arista disaggregating?

4. Unpatched TRENDnet IP cameras still provide a real-time Peeping Tom paradise

5. Patch Tuesday: 16 security advisories, 5 critical for Windows

6. Google: Move over cloud, the next IT disruption is upon us

7. Ghost could scare off WordPress as the top blogging platform

8. Black Friday sales promise iPhone 6 deals

9. New products of the week 11.10.2014

10. Ten operating systems for the Raspberry Pi

Follow Network World

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment