High-tech

High-tech
Light

Saturday, December 20, 2014

What will 2015 bring for Microsoft?; Apple moves

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Dec 19, 2014 2:02 PM
Subject: What will 2015 bring for Microsoft?; Apple moves
To: <aquarianm@gmail.com>
Cc:

Apple's 10 biggest hits, misses, and head-scratchers of 2014. View it in your browser

Trojan program based on ZeuS targets 150 banks, can hijack webcams. View it in your browser

NETWORKWORLD
Network World Daily News PM
December 19, 2014

2015 to test Microsoft's resolve and execution

Microsoft faces not only its 40th anniversary in 2015, but a host of challenges that will define it for years to come, analysts said today.The company, which is in the midst of a strategic do-over after switching CEOs and admitting that its earlier approach to the explosion of mobile wasn't working, has a hard row to hoe, experts said.MORE ON NETWORK WORLD: 10 (FREE!) Microsoft tools to make admins happier "Next year is also the 20th anniversary of Windows 95," noted Wes Miller of Directions on Microsoft. "Remember that? People stood in line to get Windows 95. Everyone was excited. That's the big deal for 2015, whether Microsoft can reinvigorate the consumer ecosystem."To read this article in full or to leave a comment, please click here READ MORE

 

Issue highlights

1. Apple's 10 biggest hits, misses, and head-scratchers of 2014

2. Trojan program based on ZeuS targets 150 banks, can hijack webcams

3. What story are security leaders telling themselves?

4. Hybrid cloud adoption set for a big boost in 2015

5. FBI concludes North Korea 'responsible' for Sony hack

6. 10 IT roles to target when poaching talent

7. Microsoft files suit against alleged tech support scammers

8. Sony Baloney

9. Cyberattack on German steel factory causes 'massive damage'

White Paper: OutSystems

Why IT Struggles with Mobility

This paper chronicles the adventures and misadventures of the enterprise mobile app journey based on our observations working with industry leaders who have weathered three years of pain to arrive at the same conclusions. Learn More

Apple's 10 biggest hits, misses, and head-scratchers of 2014

Setting the stage for 2015Apple had a blockbuster year. New iPhones, new iPads, a mobile payment solution that might actually change the way we pay, and an entirely new product category in Apple Watch.That's not to say there weren't missteps: iOS 8.0.1, anyone?We recap the year in Apple, from the high of record-breaking iPhone orders to the low of legal... READ MORE

Trojan program based on ZeuS targets 150 banks, can hijack webcams

A new computer Trojan based on the infamous ZeuS banking malware is targeting users of over 150 banks and payment systems from around the world, security researchers warn.The new threat, dubbed Chthonic, is based on ZeusVM, a Trojan program discovered in February that is itself a modification of the much older ZeuS Trojan."The Trojan is apparently an evolution of ZeusVM,... READ MORE

What story are security leaders telling themselves?

"Welcome to the tech team, Michael. When you do a good job, no one notices. If you screw up, the whole world will come down on you. So don't screw up."That was my greeting at my first job. I think it was meant as a pep talk.When I share this with audiences and clients, I hear quiet chuckles and see... READ MORE

White Paper: PC Connection | EMC

10 Reasons: VSPEX End User Computing with XtremIO

End User Computing solutions with XtremIO deliver massive, consistent I/O performance to ensure that every desktop provides an ideal user experience. Learn More

Hybrid cloud adoption set for a big boost in 2015

Spurred in large part by enterprise interest in the hybrid cloud, the overall cloud market is likely to see great growth in the coming year.Industry analyst firm IDC predicts that the global cloud market, including private, public and hybrid clouds, will hit $118 billion in 2015 and crest at $200 billion by 2018. If the market shows that much growth... READ MORE

FBI concludes North Korea 'responsible' for Sony hack

North Korea was responsible for the devastating cyberattack on Sony Pictures, the U.S. Federal Bureau of Investigation said Friday after a two-week investigation.The attack on Sony occurred in late November and resulted in the theft of thousands of files that, after being leaked online, proved highly embarrassing for the company. Financial documents, legal and business agreements, confidential information on employees... READ MORE

10 IT roles to target when poaching talent

10 IT Roles to Target When Poaching TalentImage by ThinkStockThe boldest approach to recruiting is what John Sullivan, an internationally recognized HR thought leader, author, speaker and consultant calls a "hire-to-hurt," or H2H, a strategy which involves identifying and "… hiring in order to gain knowledge, best practices or new skills.To read this article in full or to leave a... READ MORE

White Paper: IBM

IBM Value-based Archiving Solutions

This solution brief highlights IBM Value-based Archiving Solutions, which help enable organizations to apply specific archiving logic—including content-based analytics and classification, records declarations, and metadata processing—to address the requirements of archiving projects. View Now>>

Microsoft files suit against alleged tech support scammers

Microsoft is finally cracking down on scammers who offer to fix non-existent computer problems for hundreds of dollars. In a first strike, Microsoft sued several U.S. companies it said are involved in fake tech support scams. For years, people have been receiving calls from companies pretending to be official Microsoft tech support staff, who try to convince the victim that... READ MORE

Sony Baloney

Hack at Sony Pictures exposes other cybersecurity issues: Ignorance, hype, and the lack of a national and International strategy. READ MORE

Cyberattack on German steel factory causes 'massive damage'

A German steel factory suffered massive damage after hackers managed to access production networks, allowing them to tamper with the controls of a blast furnace, the government said in its annual IT security report.The report, published Wednesday by the Federal Office for Information Security (BSI), revealed one of the rare instances in which a digital attack actually caused physical damage.The... READ MORE

White Paper: IBM

Forrester 2014 Dynamic Case Management Wave

Forrester has released its 2014 Dynamic Case Management Wave, and for the second consecutive time, IBM is a leader. View Now>>

SLIDESHOWS

A brief history of Linux malware

A look at some of the worms and viruses and Trojans that have plagued Linux throughout the years.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 6 aging protocols that could cripple the Internet

2. Worst security breaches of the year 2014: Sony tops the list

3. The weirdest, wackiest and coolest sci/tech stories of 2014

4. The Onion's 10 greatest gags about Google

5. Vulnerability in embedded Web server exposes millions of routers to hacking

6. 7 tips for speeding up OS X Yosemite (and a last resort if they don't work)

7. Six technologies that will change PCs next year

8. Think North Korea hacked Sony? Think about this

9. Suing Arista was always the plan

10. Did Alcatraz escapees survive? Computer program says they might have

Follow Networkworld

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

Copyright (C) 2014 Networkworld Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment