High-tech

High-tech
Light

Friday, February 28, 2014

10 smartphones that caught our eye at Mobile World Congress

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Feb 28, 2014 8:39 AM
Subject: 10 smartphones that caught our eye at Mobile World Congress
To: <aquarianm@gmail.com>
Cc:

What Sundar Pichai really said about Android security

IBM workforce cuts raise questions

Network World Daily News AM
February 28, 2014
Share this email

10 smartphones that caught our eye at Mobile World Congress

READ MORE
 

Issue highlights

1. What Sundar Pichai really said about Android security

2. IBM workforce cuts raise questions

3. 5 Ways to Improve Your PCI Compliance Program

4. California court rules it is okay for drivers to check mobile maps

5. CIA chief: Internet of Things, infrastructure attacks are big security headaches

6. Security researchers urge tech companies to explain their cryptographic choices

7. Chrome users attack Google for zapping unsanctioned Windows add-ons

8. Know where your mobile data is going? A new app can tell you

9. The wearables of Mobile World Congress: These are the best we saw

10. Security firm discloses Apple iOS 'malicious profile' vulnerability impact on MDM

11. 8 Great Lightning Charging Gadgets for iPhone Aficionados

12. Salesforce.com CEO Benioff says company landing more big deals

13. Tip of the Hat: Google's Project Ara unmasked

14. As Web's 25th anniversary approaches, 87% of U.S. is online

WEBCAST: SAP

SAP IT Transformation Forum

On March 6, join us in an exclusive live event featuring Nolan Bushnell, a technology pioneer, entrepreneur, and scientist who’s often cited as the father of the video game industry. This event will feature topics on laying the foundations for mobile, Big Data, and cloud applications that business teams require to stay competitive. Learn more

What Sundar Pichai really said about Android security

Riding off of an article that appeared in FrAndroid, we reported on Thursday morning that Android head Sundar Pichai explained during a talk at the Mobile World Congress that Android was designed to be more open than it was designed to be safe. In the wake of that article, Google PR was able to reach out to me and provide a full and accurate transcript of what Pichai actually said. READ MORE

IBM workforce cuts raise questions

IBM is laying off employees this week, a job action that began in a curious way, with the announcement with an agreement with New York to maintain minimum staffing levels in the state. READ MORE

5 Ways to Improve Your PCI Compliance Program

High-profile data breaches seem to be becoming the norm these days. Retailers like Target and Neiman Marcus have been among the most recent victims. READ MORE

California court rules it is okay for drivers to check mobile maps

An appeals court in California ruled that it is legal for a person to hold his phone to look at a map application while driving, though he is prohibited from "listening and talking" on the phone unless it is used in a hands-free mode. READ MORE

RESOURCE COMPLIMENTS OF: CSO40 Security Confab + Awards Conference

CSO40 Security Confab + Awards

Meet CSO40 Award winners and learn from the best about security challenges and solutions across areas including: Advanced Threats and Cybersecurity, Identity and Access Management, Security Intelligence/Leveraging Big Data for Security, Mobile and BYOD Risks, Privacy, and more. Register now.

CIA chief: Internet of Things, infrastructure attacks are big security headaches

CIA Director John Brennan told an audience that when he served at the White House, "I must admit that after a while, just hearing the word "cyber" was enough to make my head hurt." READ MORE

Security researchers urge tech companies to explain their cryptographic choices

Fourteen prominent security and cryptography experts have signed an open letter to technology companies urging them to take steps to regain users' trust following reports over the past year that vendors collaborated with government agencies to undermine consumer security and facilitate mass surveillance. READ MORE

Chrome users attack Google for zapping unsanctioned Windows add-ons

Chrome users are up in arms again, this time over Google's plan to automatically disable some browser add-ons, according to scores of messages posted to Google's support forum. READ MORE

Know where your mobile data is going? A new app can tell you

Tools to secure mobile devices for personal and business use debuted at the RSA Conference in San Francisco. READ MORE

WEBCAST: Citrix Systems

Defining a cloud computing strategy for your enterprise

Transitioning to the cloud is a massive change which can be disruptive, but the good news is that it doesn't have to be. View Now.

The wearables of Mobile World Congress: These are the best we saw

READ MORE

Security firm discloses Apple iOS 'malicious profile' vulnerability impact on MDM

At the RSA Conference today, security start-up Skycure plans to disclose a vulnerability in Apple iOS devices that can impact mobile-device management (MDM) systems running on them. READ MORE

8 Great Lightning Charging Gadgets for iPhone Aficionados

iPhone lovers will find a friend in each of these eight must-have Lightning charging devices, all of which are functional, stylish and unique. READ MORE

Salesforce.com CEO Benioff says company landing more big deals

Salesforce.com's rapid growth is now being fueled increasingly by large deals for its cloud software, according to CEO Marc Benioff. READ MORE

Tip of the Hat: Google's Project Ara unmasked

Since disclosing last fall that an internal research team is developing an open hardware platform for creating highly modular smartphones, Google has offered few details of the effort, dubbed Project Ara. READ MORE

As Web's 25th anniversary approaches, 87% of U.S. is online

As the 25th anniversary of the World Wide Web approaches, 87% of U.S. adults use the Internet, according to a Pew Research Center survey. READ MORE

WHITE PAPER: Crittercism

Top 10 Internet Applications Most Likely to be Mobilized

Effective mobile application performance management optimizes application availability and response time, ensuring the best user experience. Learn the difference the right management tools make and why tools that monitor the network or focus only on performance at the device level are not enough. Read now!

SLIDESHOWS

Free tools for Windows Server admins

There are endless software tools and utilities out there to help you in managing your network. Here are some of the best free ones.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. RSA security attack demo deep-fries Apple Mac components

2. Google Glass backlash escalates to violence

3. 10 cities that provide 1-Gig internet services

4. No hard feelings, Alan? Ford reportedly will dump Microsoft's Sync

5. 14 Tech Conventions You Should Attend in 2014

6. Ultimate cloud speed tests: Amazon vs. Google vs. Windows Azure

7. Are Apple iOS, OS X flaws really backdoors for spies?

8. 13 of today's coolest network research projects

9. Danger! Danger! iOS update may brick your iPhone 5S or iPad Air

10. Best new technology from Mobile World Congress 2014

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

Ultimate cloud speed tests: Amazon vs. Google vs. Windows Azure

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Feb 27, 2014 9:01 PM
Subject: Ultimate cloud speed tests: Amazon vs. Google vs. Windows Azure
To: <aquarianm@gmail.com>
Cc:

  9 wireless battery chargers: No power? No problem! | FTC: Identity theft is the plague of the country

  Network World After Dark

Forward this to a Friend >>>


Ultimate cloud speed tests: Amazon vs. Google vs. Windows Azure
A diverse set of real-world Java benchmarks shows that Google is fastest, Azure is slowest, and Amazon is priciest Read More


WEBCAST: SAP

SAP IT Transformation Forum
On March 6, join us in an exclusive live event featuring Nolan Bushnell, a technology pioneer, entrepreneur, and scientist who’s often cited as the father of the video game industry. This event will feature topics on laying the foundations for mobile, Big Data, and cloud applications that business teams require to stay competitive. Learn more

In this Issue


9 wireless battery chargers: No power? No problem!
    Tired of having to fumble for the USB port every time your mobile device runs out of power? With these wireless chargers, just put your device down and let it it power up. Read More

FTC: Identity theft is the plague of the country
The Federal Trade Commission today issued its annual look at what consumers in the United States are complaining about the most. Read More

INSIDER
Is Your IT Shop a Scrambler or a Leader?
An IT veteran describes the four stages of the technology organization -- and what it takes to move up a notch Read More

How Unemployed CIOs Can Survive the Dark Days
A long job hunt takes a personal and professional toll. CIOs have family and financial concerns while they reassess their careers and face a changing job market. But here's how CIOs can emerge stronger than ever. Read More

FBI expects to roll out malware-analysis system to help businesses identify attacks
    The director of the Federal Bureau of Investigation (FBI) said this week his agency plans to introduce a malware-analysis system later this year that will let businesses and the public, report newly identified malware attacks, upload malware samples and receive reports on them. Read More

Intel kills SSD overclocking, unleashes its fastest-ever consumer drive
Intel won't be releasing an SSD whose performance can be customized by overclocking after all. Instead, it announced plans today to overclock a new flagship drive and begin selling that in March. Read More

Video tutorial: What is Conficker?
Today’s advanced malware threats are capable of changing behavior to block attempts to discover and remove them from systems. One of the most successful examples of malware deploying these techniques in recent years was Conficker. Conficker was an unusually successful piece of malware that first surfaced in November 2008. It exploited a vulnerability in Windows server operating systems and went on... Read More

iPads, smartphones on the front lines in Syria
War-torn country involved in high-tech conflict Read More

Life at an iPhone factory in China
Foxconn is transforming the area around its factory in Zhengzhou, China. Here's a visual tour of the scene. Read More
   

Cloud security concerns are overblown, experts say
Security concerns should not deter enterprises from using public cloud technologies when it makes business sense. Read More

UK man charged with hacking US Federal Reserve
A British man faces new charges in the U.S. for allegedly hacking into the U.S. Federal Reserve Bank's servers and stealing names, email addresses and other personal information of the bank's computer users. Read More

Boeing's new smartphone will self-destruct in 3…2…
Aerospace and defense company Boeing this week rolled out the Boeing Black – a heavily secured Android smartphone designed for use by the U.S. military and intelligence agencies, which – no kidding – will essentially self-destruct if tampered with. Read More

Intel vs. ARM: Two titans' tangled fate
Intel has barely made a dent in the mobile market, while ARM has been wildly successful. Does that spell doom for Intel -- or is ARM's triumph overblown? Read More

Danger! Danger! iOS update may brick your iPhone 5S or iPad Air
Read More

IBM's Rometty makes developers an offer: the Watson mobile app challenge
IBM CEO Ginni Rometty took to the Mobile World Congress stage Wednesday to announce a global competition to encourage developers to create mobile consumer and business apps powered by its Watson supercomputer platform. Read More

14 Tech Conventions You Should Attend in 2014
Taking the time each year to learn, grow and network should be part of your career plan, and tech conferences are a great way to do that. Here is a guide to the hottest tech events of 2014 (as well as a couple to look for in 2015). Read More

 

SLIDESHOWS

Free tools for Windows Server admins

There are endless software tools and utilities out there to help you in managing your network. Here are some of the best free ones.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. RSA security attack demo deep-fries Apple Mac components

2. Google Glass backlash escalates to violence

3. 10 cities that provide 1-Gig internet services

4. No hard feelings, Alan? Ford reportedly will dump Microsoft's Sync

5. 14 Tech Conventions You Should Attend in 2014

6. Ultimate cloud speed tests: Amazon vs. Google vs. Windows Azure

7. Are Apple iOS, OS X flaws really backdoors for spies?

8. 13 of today's coolest network research projects

9. Danger! Danger! iOS update may brick your iPhone 5S or iPad Air

10. Best new technology from Mobile World Congress 2014


 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **