High-tech

High-tech
Light

Thursday, January 1, 2015

15 things 'Back to the Future II' got right (and wrong)

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jan 1, 2015 7:31 AM
Subject: 15 things 'Back to the Future II' got right (and wrong)
To: <aquarianm@gmail.com>
Cc:

Connected, self-driving cars in the front seat at CES. View it in your browser

IDG Contributor Network: How to turn an old PC into a router. View it in your browser

NETWORKWORLD
Network World Daily News AM
January 01, 2015

15 things 'Back to the Future II' got right (and wrong)

Marty McFly is backHappy 2015, the year that Marty McFly visits the "future" in the 1989 movie "Back to the Future Part II". In the film, McFly (played by Michael J. Fox) travels from 1985 (the year the original movie came out) 30 years into the future, more precisely, Oct. 21, 2015.As the world has approached the actual date, we've seen some photo memes go around via social media proclaiming that 2014 or 2013 was the year, but those were Photoshopped images. If you watch the movie, you can clearly see the date in the time machine when they visit the future.To read this article in full or to leave a comment, please click here READ MORE

 

Issue highlights

1. Connected, self-driving cars in the front seat at CES

2. IDG Contributor Network: How to turn an old PC into a router

3. Zapier zaps connecting apps

4. Think that software library is safe to use? Not so fast!

5. INSIDER Big data and CRM help public broadcaster attract more donors

6. Top 10 mobile stories of 2014

7. Samsung brings curved screen from TV to PC

8. Apple declined Sony offer to host "The Interview" on iTunes

9. Experts: FCC will adopt net neutrality rules in early 2015

10. IDG Contributor Network: Stop using email in 2015

11. 2014's 25 Geekiest 25th Anniversaries

White Paper: Attachmate

Enterprise File Sharing and Management

Dynamic file sharing across multiple platforms is the new normal in the world of work, creating an urgent need for large and highly-regulated enterprises to explore file sharing solutions that do not compromise data security. Learn More

Connected, self-driving cars in the front seat at CES

Cars that can park themselves, cycle helmets that can communicate to avoid collisions and the coming battle between Apple's CarPlay and Google's Android Auto will all be hot topics at International CES in January.The Las Vegas trade show will offer a mixture of cars and accessories coming out next year, and others that are still years away from being ready.The... READ MORE

IDG Contributor Network: How to turn an old PC into a router

Regular readers of the Disruptor blog will know that I'm a big fan of self-build projects. I've written about getting started on a solar power kit and getting into drones for cheap. Well, if you liked those, here's another one that I think you might enjoy.The project is simply one of turning a redundant computer into a powerful router and firewall. In... READ MORE

Zapier zaps connecting apps

You could argue that the main task of IT is to connect stuff together. We connect data to processes, processes to people and other processes, hardware to hardware … it's all about getting stuff talking to achieve a goal. We turn shopping cart data into pick orders that result in people getting the junk they order online. We take text... READ MORE

White Paper: Attachmate

The Need for Enterprise-Grade File Transfer

From email to Dropbox and FTP, the status quo of file transfer in most organizations is UFT—or Unmanaged File Transfer. That's the troubling finding of a 2013 survey conducted by Osterman Research. Read this paper to learn how enterprise-grade Managed File Transfer (MFT) can help. View Now

Think that software library is safe to use? Not so fast!

In today's world of agile software development and fast release cycles, developers increasingly rely on third-party libraries and components to get the job done. Since many of those libraries come from long-running, open-source projects, developers often assume they're getting well-written, bug-free code. They're wrong.The major patching efforts triggered by the Heartbleed, Shellshock and POODLE flaws this year serve as examples... READ MORE

INSIDER

Big data and CRM help public broadcaster attract more donors

Public TV and radio station WGBH wanted to build deeper relationships with current and potential members, but the Boston-area PBS and NPR affiliate couldn't easily analyze its donor data from within its Salesforce customer relationship management system. That put targeted marketing efforts beyond reach, says Cate Twohill, the station's senior director and managing partner for CRM services.To read this article... READ MORE

Top 10 mobile stories of 2014

The year 2014 was a particularly eventful one in the world of mobile devices. Countless new smartphones and tablets arrived on the scene, with more features and functionality than ever before, making it even harder to pick the right device. 2014 was also a big year for the wearable technology market, which churned out gadgets like a flapjacks at your... READ MORE

White Paper: NetApp

Steps to Simplifying Private Cloud Deployment

Today, all the rules are being rewritten, both inside and outside the data center. The reason: virtualization. Read this paper to see how enterprises can derive competitive advantage by using virtualization technologies to build the most agile infrastructures. View Now>>

Samsung brings curved screen from TV to PC

Samsung is trying to smash the status quo in PCs with a new all-in-one desktop computer that has a curved screen.The idea for the Ativ One 7 Curved came partly from Samsung's TVs, which already have curved displays. Samsung has already been offering laptops and Chromebooks, and the 27-inch all-in-one will be its first desktop computer.The all-in-one looks like a... READ MORE

Apple declined Sony offer to host "The Interview" on iTunes

The ongoing Sony/hacker/North Korea has been hard to miss in recent weeks. The latest report is that Sony will be showing the now-controversial film "The Interview" at select theaters on Christmas day.Sony, of course, received quite a bit of backlash when it first acquiesced to the demands of hackers and decided not to release the movie. Even President Obama chimed... READ MORE

Experts: FCC will adopt net neutrality rules in early 2015

The U.S. Federal Communications Commission will adopt net neutrality rules in early 2015, maybe as soon as February, several observers believe, but few people want to predict what those rules will look like. The FCC is under pressure from President Barack Obama and a majority of the nearly 4 million people who have submitted comments to the agency to adopt... READ MORE

IDG Contributor Network: Stop using email in 2015

That got your attention, right? Stop using email. Sounds about as likely as quitting eating food in order to lose weight, or even something as ridiculous as stopping drinking.Well, some in the enterprise world are indeed flirting with the concept.We've known for years that email is chaotic for managing projects. The idea that projects should be run on a non-prioritized... READ MORE

2014's 25 Geekiest 25th Anniversaries

Network World's 8th collection of the year's 25 Geekiest 25th Anniversaries includes the launch of the first GPS satellites, Lotus Notes 1.0, Nintendo's Game Boy and SimCity, as well as one of tech's most notorious false alarms: cold fusion. READ MORE

White Paper: IBM

Improving the Management and Governance of Unstructured Data

Maximize efficiency with deeper insight to data value and automated, policy-based compliance, retention & disposition. Read Now

SLIDESHOWS

The Onion's 10 greatest gags about Google

Here are 10 of what we believe are its better efforts.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Peeping into 73,000 unsecured security cameras thanks to default passwords

2. Whatever happened to the IPv4 address crisis?

3. Top 20 colleges for computer science majors, based on earning potential

4. California bill proposes mandatory kill-switch on phones and tablets in 2015

5. ATM malware, controlled by a text message, spews cash

6. 8 free Wi-Fi stumbling and surveying tools

7. Computer science major ranks No. 8 for salary potential

8. 16 weirdest places you'll find Linux

9. Why TCP/IP is on the way out

10. How to solve Windows 8 crashes in less than a minute

Follow Networkworld

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

Copyright (C) 2014 Networkworld Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment