Network World Daily News AM | | In today's world of agile software development and fast release cycles, developers increasingly rely on third-party libraries and components to get the job done. Since many of those libraries come from long-running, open-source projects, developers often assume they're getting well-written, bug-free code. They're wrong.The major patching efforts triggered by the Heartbleed, Shellshock and POODLE flaws this year serve as examples of the effect of critical vulnerabilities in third-party code. The flaws affected software that runs on servers, desktop computers, mobile devices and hardware appliances, affecting millions of consumers and businesses.To read this article in full or to leave a comment, please click here READ MORE | | Issue highlights 1. 10 Top Career Stories of 2014 2. The rise of China's smartphone makers 3. Alleged tech support scammers come up with all kinds of alibis to counter complaints 4. Gadgets in 2014: new phones, wearables and virtual reality 5. How does Internet traffic travel across an ocean? These gadgets 6. INSIDER Big data and CRM help public broadcaster attract more donors 7. 8 tips to improve cyber security in the New Year 8. IDG Contributor Network: Stop using email in 2015 9. The first 10 apps to install on your brand-new Mac 10. 2014's 25 Geekiest 25th Anniversaries 11. Wozniak calls Apple garage origin 'a myth' | White Paper: Attachmate To meet the demands of today's business landscape, IT staffs must take steps to secure and integrate their information assets, while satisfying compliance mandates and optimizing corporate efficiency. This white paper presents managed file transfer (MFT) as a way to meet corporate information and data management requirements. Read More | CIOs had an eye-opening year in 2014: Faced with an increasingly competitive talent market, many realized they'd need to improve their IT hiring strategies and focus on retention to stay competitive. The lack of diversity and the scarcity of women in IT drew well-deserved attention. And many IT leaders began to realize just how important social media and mobile technology... READ MORE | After Apple and Samsung, which companies are selling the most smartphones around the globe?If you guessed a growing group of Chinese smartphone manufacturers, you would be correct.Most Americans know little about the emerging Chinese smartphone makers, let alone how to pronounce some of their names. Most of these handsets are unlikely to be seen in use by U.S. customers, at... READ MORE | Companies sued by the Federal Trade Commission (FTC) and Microsoft for allegedly defrauding consumers with worthless Windows technical support have spun tales involving flakey Internet connections, it's-not-us-it's-scammers, new management software and unanswered emails to counter hundreds of consumer complaints this year, Better Business Bureau (BBB) records showed. The four companies sued by the FTC in November and by Microsoft this... READ MORE | White Paper: NetApp Today, all the rules are being rewritten, both inside and outside the data center. The reason: virtualization. Read this paper to see how enterprises can derive competitive advantage by using virtualization technologies to build the most agile infrastructures. View Now>> | Gadgets in 2014: new phones, wearables and virtual reality The new phones didn't stop coming in 2014. We had a big hit, we had a big miss and we had a completely new idea. Plus, the hype around wearables reached new levels. Here's our look at the... From: Network World Views: 0 0 ratings Time: 05:10 More in Science &... READ MORE | How does Internet traffic travel across an ocean? These gadgets Optical submarine repeaters are big missile-shaped devices that lie along undersea cables carrying nearly all of the world's Internet traffic. We go inside the NEC plant that makes them. From: Network World Views: 0 0 ratings Time: 02:13 More in Science & Technology READ MORE | Public TV and radio station WGBH wanted to build deeper relationships with current and potential members, but the Boston-area PBS and NPR affiliate couldn't easily analyze its donor data from within its Salesforce customer relationship management system. That put targeted marketing efforts beyond reach, says Cate Twohill, the station's senior director and managing partner for CRM services.To read this article... READ MORE | White Paper: IBM Maximize efficiency with deeper insight to data value and automated, policy-based compliance, retention & disposition. Read Now | More of the same for 2015 in the security landscapeImage by ThinkstockWhile we can—and certainly will—leverage cutting-edge technology to address new threats, we can—and must—leverage human behavior and best practices as a means for shoring defenses. Let's take a look at some ways organizations can minimize risks.To read this article in full or to leave a comment, please click here... READ MORE | That got your attention, right? Stop using email. Sounds about as likely as quitting eating food in order to lose weight, or even something as ridiculous as stopping drinking.Well, some in the enterprise world are indeed flirting with the concept.We've known for years that email is chaotic for managing projects. The idea that projects should be run on a non-prioritized... READ MORE | It used to be all the rage to photograph in excruciating detail the "unboxing" of a new piece of gear, especially hardware that few people (or no one else) yet had. Unboxing was great, but it's sort of like a wedding or a birth: The actual event is relatively brief, and the really important stuff comes afterwards, as you spend... READ MORE | Network World's 8th collection of the year's 25 Geekiest 25th Anniversaries includes the launch of the first GPS satellites, Lotus Notes 1.0, Nintendo's Game Boy and SimCity, as well as one of tech's most notorious false alarms: cold fusion. READ MORE | Apple co-founder Steve Wozniak has done this kind of thing before, debunking – or at least degrading -- a slice of Apple lore.In 2011 he told me that the well-established date of Apple's founding -- April 1, 1976 -- was actually "murky" to his mind, meaning not that he didn't recall but that he didn't agree.And now he's told Bloomberg... READ MORE | White Paper: IBM Hedge fund administration company Quintillion doubles its asset and investor portfolio while keeping staff levels almost flat, by working with Insight 2 Value to deploy an efficient content management solution, based on IBM Case Manager. Read Now | | | | | | | |
No comments:
Post a Comment