High-tech

High-tech
Light

Saturday, January 3, 2015

Think that software library is safe to use? Not so fast!

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jan 2, 2015 7:31 AM
Subject: Think that software library is safe to use? Not so fast!
To: <aquarianm@gmail.com>
Cc:

10 Top Career Stories of 2014. View it in your browser

The rise of China's smartphone makers. View it in your browser

NETWORKWORLD
Network World Daily News AM
January 02, 2015

Think that software library is safe to use? Not so fast!

In today's world of agile software development and fast release cycles, developers increasingly rely on third-party libraries and components to get the job done. Since many of those libraries come from long-running, open-source projects, developers often assume they're getting well-written, bug-free code. They're wrong.The major patching efforts triggered by the Heartbleed, Shellshock and POODLE flaws this year serve as examples of the effect of critical vulnerabilities in third-party code. The flaws affected software that runs on servers, desktop computers, mobile devices and hardware appliances, affecting millions of consumers and businesses.To read this article in full or to leave a comment, please click here READ MORE

 

Issue highlights

1. 10 Top Career Stories of 2014

2. The rise of China's smartphone makers

3. Alleged tech support scammers come up with all kinds of alibis to counter complaints

4. Gadgets in 2014: new phones, wearables and virtual reality

5. How does Internet traffic travel across an ocean? These gadgets

6. INSIDER Big data and CRM help public broadcaster attract more donors

7. 8 tips to improve cyber security in the New Year

8. IDG Contributor Network: Stop using email in 2015

9. The first 10 apps to install on your brand-new Mac

10. 2014's 25 Geekiest 25th Anniversaries

11. Wozniak calls Apple garage origin 'a myth'

White Paper: Attachmate

Why your existing solution might not be adequate

To meet the demands of today's business landscape, IT staffs must take steps to secure and integrate their information assets, while satisfying compliance mandates and optimizing corporate efficiency. This white paper presents managed file transfer (MFT) as a way to meet corporate information and data management requirements. Read More

10 Top Career Stories of 2014

CIOs had an eye-opening year in 2014: Faced with an increasingly competitive talent market, many realized they'd need to improve their IT hiring strategies and focus on retention to stay competitive. The lack of diversity and the scarcity of women in IT drew well-deserved attention. And many IT leaders began to realize just how important social media and mobile technology... READ MORE

The rise of China's smartphone makers

After Apple and Samsung, which companies are selling the most smartphones around the globe?If you guessed a growing group of Chinese smartphone manufacturers, you would be correct.Most Americans know little about the emerging Chinese smartphone makers, let alone how to pronounce some of their names. Most of these handsets are unlikely to be seen in use by U.S. customers, at... READ MORE

Alleged tech support scammers come up with all kinds of alibis to counter complaints

Companies sued by the Federal Trade Commission (FTC) and Microsoft for allegedly defrauding consumers with worthless Windows technical support have spun tales involving flakey Internet connections, it's-not-us-it's-scammers, new management software and unanswered emails to counter hundreds of consumer complaints this year, Better Business Bureau (BBB) records showed. The four companies sued by the FTC in November and by Microsoft this... READ MORE

White Paper: NetApp

Steps to Simplifying Private Cloud Deployment

Today, all the rules are being rewritten, both inside and outside the data center. The reason: virtualization. Read this paper to see how enterprises can derive competitive advantage by using virtualization technologies to build the most agile infrastructures. View Now>>

Gadgets in 2014: new phones, wearables and virtual reality

Gadgets in 2014: new phones, wearables and virtual reality The new phones didn't stop coming in 2014. We had a big hit, we had a big miss and we had a completely new idea. Plus, the hype around wearables reached new levels. Here's our look at the... From: Network World Views: 0 0 ratings Time: 05:10 More in Science &... READ MORE

How does Internet traffic travel across an ocean? These gadgets

How does Internet traffic travel across an ocean? These gadgets Optical submarine repeaters are big missile-shaped devices that lie along undersea cables carrying nearly all of the world's Internet traffic. We go inside the NEC plant that makes them. From: Network World Views: 0 0 ratings Time: 02:13 More in Science & Technology READ MORE

INSIDER

Big data and CRM help public broadcaster attract more donors

Public TV and radio station WGBH wanted to build deeper relationships with current and potential members, but the Boston-area PBS and NPR affiliate couldn't easily analyze its donor data from within its Salesforce customer relationship management system. That put targeted marketing efforts beyond reach, says Cate Twohill, the station's senior director and managing partner for CRM services.To read this article... READ MORE

White Paper: IBM

Improving the Management and Governance of Unstructured Data

Maximize efficiency with deeper insight to data value and automated, policy-based compliance, retention & disposition. Read Now

8 tips to improve cyber security in the New Year

More of the same for 2015 in the security landscapeImage by ThinkstockWhile we can—and certainly will—leverage cutting-edge technology to address new threats, we can—and must—leverage human behavior and best practices as a means for shoring defenses. Let's take a look at some ways organizations can minimize risks.To read this article in full or to leave a comment, please click here... READ MORE

IDG Contributor Network: Stop using email in 2015

That got your attention, right? Stop using email. Sounds about as likely as quitting eating food in order to lose weight, or even something as ridiculous as stopping drinking.Well, some in the enterprise world are indeed flirting with the concept.We've known for years that email is chaotic for managing projects. The idea that projects should be run on a non-prioritized... READ MORE

The first 10 apps to install on your brand-new Mac

It used to be all the rage to photograph in excruciating detail the "unboxing" of a new piece of gear, especially hardware that few people (or no one else) yet had. Unboxing was great, but it's sort of like a wedding or a birth: The actual event is relatively brief, and the really important stuff comes afterwards, as you spend... READ MORE

2014's 25 Geekiest 25th Anniversaries

Network World's 8th collection of the year's 25 Geekiest 25th Anniversaries includes the launch of the first GPS satellites, Lotus Notes 1.0, Nintendo's Game Boy and SimCity, as well as one of tech's most notorious false alarms: cold fusion. READ MORE

Wozniak calls Apple garage origin 'a myth'

Apple co-founder Steve Wozniak has done this kind of thing before, debunking – or at least degrading -- a slice of Apple lore.In 2011 he told me that the well-established date of Apple's founding -- April 1, 1976 -- was actually "murky" to his mind, meaning not that he didn't recall but that he didn't agree.And now he's told Bloomberg... READ MORE

White Paper: IBM

Quintillion Case Study

Hedge fund administration company Quintillion doubles its asset and investor portfolio while keeping staff levels almost flat, by working with Insight 2 Value to deploy an efficient content management solution, based on IBM Case Manager. Read Now

SLIDESHOWS

The Onion's 10 greatest gags about Google

Here are 10 of what we believe are its better efforts.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Peeping into 73,000 unsecured security cameras thanks to default passwords

2. Whatever happened to the IPv4 address crisis?

3. Top 20 colleges for computer science majors, based on earning potential

4. California bill proposes mandatory kill-switch on phones and tablets in 2015

5. ATM malware, controlled by a text message, spews cash

6. 8 free Wi-Fi stumbling and surveying tools

7. Computer science major ranks No. 8 for salary potential

8. 16 weirdest places you'll find Linux

9. Why TCP/IP is on the way out

10. How to solve Windows 8 crashes in less than a minute

Follow Networkworld

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

Copyright (C) 2014 Networkworld Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment