High-tech

High-tech
Light

Wednesday, December 3, 2014

IBM fixes serious flaw in mobile device manager

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Dec 3, 2014 2:15 PM
Subject: IBM fixes serious flaw in mobile device manager
To: <aquarianm@gmail.com>
Cc:

FIRST LOOK: Firefox 34

Data analytics scores marketing wins for the Texas Rangers

Network World Daily News PM
December 03, 2014

IBM fixes serious flaw in mobile device manager

A vulnerability in the IBM Endpoint Manager for mobile devices could allow attackers to execute malicious code on the servers used by companies to manage devices.

READ MORE
 

Issue highlights

1. FIRST LOOK: Firefox 34

2. INSIDER Data analytics scores marketing wins for the Texas Rangers

3. Announcing a new switching arrival

4. Qualcomm hopes to cure Wi-Fi rage with enterprise platform

5. Steam Broadcasting privacy settings control who can watch you play games

6. Avaya Speaks Out on 2015 UC Trends

7. IDG Contributor Network: Missing pieces in network design

8. Dropbox pursues enterprises with new Business API

9. SDN tools increase WAN efficiency

10. Public cloud storage can be efficient, but the potential is still limited

11. How to get the most out of your IT talent

12. How to get more out of your virtualized and cloud environments

13. How UPS uses analytics to drive down costs (and no, it doesn't call it big data)

14. New products of the week 12.01.2014

WHITE PAPER: OutSystems

Mobile App Backlog

New research conducted by Opinion Matters reveals that 85% of enterprises have a mobile app development backlog because they can't cope with business demands. With the average application taking anywhere between three and 12 months to get out the door, this slow approach to app development is resulting in competitive disadvantage. Learn More

FIRST LOOK: Firefox 34

The fact that modern browsers update silently and often occasionally takes some of the savor out of a new release. Rapid releases mean new features are deployed in a dribble, rather than in bursts. With Firefox 34, however, Mozilla has bucked the trend, giving us a swath of new features to enjoy all at once. Have a look. READ MORE

INSIDER

Data analytics scores marketing wins for the Texas Rangers

When it comes to convincing your boss of the value of a data dashboard, nothing works better than when you can save money as a result of a trend that you visualized. This is what Sarah Stone, one of the data-driven marketing staff, did for the Texas Rangers baseball team; her dashboard saved about $45,000 in annual costs.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

Announcing a new switching arrival

Branded and white box switches would like to welcome their new entrant into the world: brite box. The hybrid love child of the tempestuous couple is proof that sometimes, opposites attract.Gartner analysts Andrew Lerner and Joe Skorupa actually christened "Branded White Box" and provided some keen analysis into its role in life, growth potential and challenges. Like mother white box, brite box was put on this Earth to reduce the capital cost of physical underlay networks supporting software defined networking overlays. But brite box inherits the familiarity of father branded, and thus brings a sense of comfort and security when employed as a lower cost physical underlay for SDN.To read this article in full or to leave a comment, please click here READ MORE

Qualcomm hopes to cure Wi-Fi rage with enterprise platform

Using Wi-Fi networks in crowded environments can be a soul-destroying experience, but next-generation access points powered by Qualcomm chipsets will use a new antenna technology to ease the pain.Wi-Fi has become a victim of its own success, leaving busy networks simply unable to handle all the laptops, smartphones and tablets we use today.+ ALSO ON NETWORK WORLD What you should know about SDN and Wi-Fi +The problem is that access points or wireless routers use short time slots to communicate with only one user at a time, and as more users get connected networks get overloaded. New antenna technology MU-MIMO (multi user-multiple-input multiple-output) will help change that by letting 802.11ac networks transmit data to many users simultaneously.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: CommVault

Enhancing Application Protection and Recovery

This CommVault Business Value and Technology White Paper explains how Simpana IntelliSnap® Recovery Manager can make your application recovery fast and reliable. Learn More

Steam Broadcasting privacy settings control who can watch you play games

Valve is giving Twitch some competition by announcing that PC gamers using the Steam Beta client can broadcast their games or watch their friends playing games. For any Steam beta gamers concerned with the privacy implications of Steam Broadcasting, there are several solutions. READ MORE

Avaya Speaks Out on 2015 UC Trends

What's ahead for 2015? Avaya asked leading thinkers from across their organization to offer ideas about what IT departments, contact centers, and enterprises can expect in 2015 for communications support services. They identified six key trends. Some of the highlights: While mid-size enterprises still value the simplicity and total-cost-of-ownership offered with premise equipment, they are increasingly moving to cloud-based solutions. Video will become a formidable interaction channel. Businesses that haven't begun to make the move to video will be challenged to catch up with their competitors. As omni-channel support matures, Web chat plays a pivotal role. Businesses are beginning to offer a true "omni-channel" support experience to customers. Other trends Avaya executives discussed included how businesses will use social media and crowd-sourcing and how support services transparency will evolve with a high-accountability support model for support organizations.To read this article in full or to leave a comment, please click here READ MORE

IDG Contributor Network: Missing pieces in network design

My five year old likes to build things. When I get home from work, she says, "daddy, let's build something!" and then pulls out a box of Legos or blocks or something. I usually respond, "sure, what should we build?" And she replies, "I don't know!" and then she proceeds to start building it. Usually "it" ends up being a spaceship or a house or a three-legged pony, or maybe a three-legged-spaceship-house-pony. In my last post, I concluded with the statement "at the end of the day, the lesson is this: first define your requirements, then design the system." But as we all well know, it is a rare day indeed when you actually get defined requirements before you have to begin designing a system. And just like my daughter with and her three-legged-spaceship-house-pony (or is it a bullfrog with three ears and square eyes?), without defined requirements you may end up with a whimsical result, but probably not a very effective one.To read this article in full or to leave a comment, please click here READ MORE

Dropbox pursues enterprises with new Business API

Though it offers a business-tier plan, Dropbox has historically lacked a full-blown business platform on the order of Box and its APIs. That's about to change with the introduction of the Dropbox for Business API.The API is an attempt by Dropbox to leverage the massive user base it's built up both inside and outside of enterprises. The company is gambling that a sufficient number of companies haven't already made a commitment to a competitor.MORE ON NETWORK WORLD: 12 Free Cloud Storage options Dropbox's existing APIs allow the development of apps that connect to Dropbox. The new Business API set connects Dropbox to more than 20 third-party services in seven categories: e-discovery and legal hold, data loss prevention, event analytics (for events generated by Dropbox activity logs), DRM and encryption, single sign-on, backup and migration, and custom workflow creation.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: BMC Software

Five Levers to Lower Mainframe MLC Costs

This paper discusses five levers you can use to lower your mainframe MLC costs by up to 20 percent or more. Explore best practices and real-world examples of dramatic savings through a mainframe MLC optimization strategy based on higher visibility, predictability, and automation. Learn More

SDN tools increase WAN efficiency

Configuring, maintaining and changing WAN infrastructure can be a nightmare given the distributed nature of the beast and all the remote touch points, but emerging Software Defined Networking (SDN) tools promise to make these operations more efficient. Usually touted as a data center tool, SDN can be used to automate and manage WAN operations, says Zeus Kerravala, principal of ZK Research. WAN issues are hard to address because of the dispersed nature of the resources, he says. "There's no perfect way of making changes to the WAN," but "SDN brings automation and orchestration from a centralized location and allows you to react faster."To read this article in full or to leave a comment, please click here READ MORE

Public cloud storage can be efficient, but the potential is still limited

Public cloud storage can be a cost efficient alternative to rolling your own, but observers warn that it isn't a cure all. Price is the lure. Even if you have room in your data center for expansion, in-house storage infrastructure won't ever be as cost-scalable as a public cloud option, says Forrester analyst Henry Baltazar. And cloud storage will always give you more agility, he says: Once you add storage capacity in your data center, it is likely yours for the life cycle of the equipment.To read this article in full or to leave a comment, please click here READ MORE

How to get the most out of your IT talent

As the spotlight on cost reduction has dimmed, IT has picked up plenty of new directives: to deliver business agility, drive innovation, and increase its value to the business, to name a few. Yet at the same time, IT remains responsible for all the tactical and operational activities it has always performed, such as keeping systems running, delivering new capabilities, and securing intellectual property and corporate data.For CIOs and IT leaders, the management challenge is how to help IT employees break the tactical habit and use their strategic skills more effectively. We asked for advice from three tech professionals with different perspectives on IT talent. Their expertise can help IT leaders who want their teams to work smarter and be more engaged. Some of the tactics can be adopted without a lot of investment, while others require outside help or more significant cultural overhauls.To read this article in full or to leave a comment, please click here READ MORE

How to get more out of your virtualized and cloud environments

After Dammions Darden arrived as the new senior systems administrator for the city of Garland, Texas, he knew that the 50 to 60 physical hosts for this 234,000-person city outside of Dallas were not running nearly as efficiently as they could be. Some had excess capacity, others were running way too hot. Traditionally if apps are slow and virtual machines need more memory the easy answer is an unfortunate one: Throw more hardware at the problem. But Darden wasn't satisfied with that. While roaming the expo floor at VMworld two years ago he stumbled across VMTurbo, a company that specializes in analyzing virtual environments.To read this article in full or to leave a comment, please click here READ MORE

How UPS uses analytics to drive down costs (and no, it doesn't call it big data)

When you have an organization the size of UPS – with 99,000 vehicles and 424,000 employees – every single little bit of efficiency that can be squeezed out of daily operations translates into a big deal. UPS has been using analytics to do just that for a long time now, and keeps getting better and better at it. Network World Editor in Chief John Dix caught up with UPS Senior Director of Process Management Jack Levis for an update on their latest achievements. How does UPS use analytics to optimize its operations? Let me take you back 15 years ago and then work our way back to today, and then I'll give you a glimpse into the future. Also, to frame the discussion, let's think of analytics in three forms: descriptive analytics says, "Where am I today?"; predictive analytics says, "With my current trajectory, where will I be headed tomorrow?"; and then at the highest level you have prescriptive analytics, and that's where you say, "Where should I be?"To read this article in full or to leave a comment, please click here READ MORE

New products of the week 12.01.2014

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Thunder TPS 3.1 Key features:  Programmability enhancements include improved aFleX TCL-based scripting and the addition of regular expressions (regex). Bolstered mitigation tools for TLS/SSL protection and added advanced rate limiting. Expanded detection and visibility features. More info.To read this article in full or to leave a comment, please click here READ MORE

WEBCAST: APC by Schneider Electric

Building Tomorrow's Data Center with Converged Technologies

A number of forces are converging: the cloud, converged infrastructure, big data and fabric architectures to name a few. And if those weren't enough, data center professionals must keep systems up 24 by 7, keep data secure, meet compliance obligations and keep costs and energy usage under control. It's a tall order. Learn More

SLIDESHOWS

14 go-to tools for Mac sysadmins

Mac pro Gerard Allen shares his must-have sysadmin tools for enterprise Apple deployments.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. FIRST LOOK: Firefox 34

2. The Best IT Resume Tips of 2014

3. Why there's no open-source standard-bearer for the network

4. Unreleased Sony movies leak after hack; Sony may suspect North Korea

5. Peeping into 73,000 unsecured security cameras thanks to default passwords

6. Imagine traveling in an airliner without access to any of your personal electronic devices

7. The Linux holiday shopping guide

8. BYOD is saving serious money for IT

9. How UPS uses analytics to drive down costs (and no, it doesn't call it big data)

10. Network slowdowns are the biggest issue for IT, survey shows

Follow Network World

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment