High-tech

High-tech
Light

Thursday, August 21, 2014

12 oddball odes to open-source

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Aug 20, 2014 9:01 PM
Subject: 12 oddball odes to open-source
To: <aquarianm@gmail.com>
Cc:

Death notice: In Delaware your social media accounts now go to your heirs | Plug-and-play Android security layer outlined by NC State researchers

Network World After Dark

Forward this to a Friend >>>


12 oddball odes to open-source
Songs in the key of FOSS The world of free and open-source software has spawned a surprising amount of original music. Whether it's because the members of that community are unusually creative or because they just can't keep themselves from telling you how great Linux and open-source are, we don't know, but we have collected, for your listening pleasure, a dozen songs about free and/or open-source software.To read this article in full or to leave a comment, please click here Read More


WEBCAST: Cisco Systems

Evaluating Leading Breach Detection Systems
Today's constantly evolving advanced malware and Advanced Persistent Threats (APTs) can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to confront these advanced threats before, during and after attacks. Learn more >>

WHITE PAPER: BMC Software

Five Levers to Lower Mainframe MLC Costs
This paper discusses five levers you can use to lower your mainframe MLC costs by up to 20 percent or more. Explore best practices and real-world examples of dramatic savings through a mainframe MLC optimization strategy based on higher visibility, predictability, and automation. Learn More

Death notice: In Delaware your social media accounts now go to your heirs
Varied death policies of Twitter, Facebook, Instagram and others cause concern, lead to legislation Read More

Plug-and-play Android security layer outlined by NC State researchers
A modified version of Android uses a system of modularized plugins to help make sure the latest security tools make it into the hands of end users as quickly as possible.The Android Security Modules framework, as outlined in a paper from researchers North Carolina State University and Germany's TU Darmstadt, is a programmable interface for deploying security updates in the field, without the need for root access to the Android device.+ ALSO ON NETWORK WORLD: Munich reverses course, may ditch Linux for Microsoft | 5 Cool Security Breakthroughs at USENIX Security event +To read this article in full or to leave a comment, please click here Read More

US Navy goes all Iron Man for industrial duty
It may not be the job Tony Stark or his Iron Man suit had in mind, but its still pretty cool. The US Navy said it is buying two Lockheed Martin exoskeletons to test out for industrial work on ships. Lockheed says its FORTIS exoskeleton "transfers loads through the exoskeleton to the ground in standing or kneeling positions and allows operators to use heavy tools as if they were weightless. An advanced ergonomic design moves naturally with the body and adapts to different body types and heights. Using the [system], operators can effortlessly hold objects up to 36 pounds, increasing productivity by reducing muscle fatigue and avoiding muscle injury."To read this article in full or to leave a comment, please click here Read More

In his own words: Best quotes of Steve Ballmer
Steve Ballmer's decision to step down from Microsoft's board draws to a close a 34 year-long career that took him from business manager to CEO.During that time, he's spoken hundreds of times at events and in interviews. Here are some of his most memorable quotes.On Apple, the iPod and iPhone"We've had DRM (digital rights management) in Windows for years. The most common format of music on an iPod is stolen,"—in an interview with Cnet in 2004."No, I do not [have an iPod]. Nor do my children. My children—in many dimensions they're as poorly behaved as many other children, but at least on this dimension I've got my kids brainwashed: You don't use Google, and you don't use an iPod,"—to Fortune in 2006.To read this article in full or to leave a comment, please click here Read More

Samsung and Barnes & Noble debut Galaxy Tab 4 Nook
Samsung and Barnes & Noble have released a custom Nook tablet that's on sale now for $179. Read More

Moving toward smart and secure continuous software delivery
It's no surprise that security and application development teams often find themselves locking horns. One wants applications and new features to roll out – and swiftly – and the other is often more concerned with keeping systems and data snug. At some organizations, as they embrace more agile development and continuous integration/delivery methods, the tension runs even higher.MORE ON NETWORK WORLD: Free security tools you should try In continuous integration and deployment environments, teams integrate their development work continuously. Automated tests help to identify errors as work is completed, and these automated tests often include code analysts and functional testing – all occurring on a deployment pipeline.To read this article in full or to leave a comment, please click here Read More

How can the Internet have too many routes and not enough addresses?
The depletion of Internet addresses would seem to spell relief for aged routers that are struggling to deal with the Internet's growth, but the complicated interplay between those trends might cause even more problems.Last Wednesday, some older routers and switches stumbled when the Internet's table of routes surpassed 512,000 entries, the maximum they could hold in a special form of memory called TCAM (Ternary Content Addressable Memory). The event drew widespread attention, though it was actually the third time in this young century that the Internet had broken through such a threshold. The number of routes exceeded 128,000 around 2003 and 256,000 in 2008, each time causing problems for some outmoded gear.To read this article in full or to leave a comment, please click here Read More

Linux Foundation to offer new certification for IT workers
With an eye toward deepening the global Linux talent pool, the Linux Foundation today announced that it will offer two new certifications for engineers and administrators.The Linux Foundation Certified System Administrator, or LFCS, and the Linux Foundation Certified Engineer, or LFCE certificates will be granted to applicants who pass an automated online exam. The cost will be $300, although the foundation will hand out 1,000 free passes to attendees at LinuxCon, where the announcement was made.+ ALSO ON NETWORK WORLD: 2014's Hottest Certifications +To read this article in full or to leave a comment, please click here Read More

Review: VMware VSAN turns storage inside-out
VMware's Virtual SAN 1.0 combines easy setup and management with high availability and high performance -- and freedom from traditional storage systems Read More

Start-up offers up endpoint detection and response for behavior-based malware detection
Start-up SentinelOne is offering security software for behavior-based malware detection intended to augment, not replace, the type of full anti-virus endpoint protection suites that typically also have signature-based defense, a firewall and other features. However, the Mountain View, Calif.-based start-up, which has research and development roots in Israel and has received $14.5 million in venture-capital funding, does harbor ambitions to break into the multi-billion dollar anti-virus market to compete with the kind of full-featured endpoint protection suites offered today by the major vendors such as Symantec and McAfee. + ALSO ON NETWORK WORLD Start-up fights attacks on SDN, virtual-machine networks +To read this article in full or to leave a comment, please click here Read More

The best educational software for students
We give you 10 great productivity programs that are perfect for students. They'll help you improve your schoolwork, study more efficiently, and manage your hectic schedule. Read More

INSIDER
Review: Citrix Xen Mobile rates a spot on your MDM short list
XenMobile 9.0 delivers topnotch features, granular security policies. Read More


SLIDESHOWS

Top techs the CIA thinks are hot

Through its investment firm called In-Q-Tel, the CIA funds companies, mostly start-ups, to push forward technologies deemed useful to government intelligence agencies.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Munich reverses course, may ditch Linux for Microsoft

2. 5 cool new security research breakthroughs

3. Top 5 things to watch for at VMWorld 2014

4. The Samsung Z is dead: Is Tizen next?

5. 2014's Hottest IT Certification

6. New Microsoft same as the old Microsoft

7. The 5 most anticipated smartphone launches coming in September

8. Why TCP/IP is on the way out

9. Best and funniest Apple iWatch design concepts

10. Google wraps its trans-Pacific fiber cables in Kevlar to prevent against shark attacks

JOIN THE IDG CONTRIBUTOR NETWORK

The IDG Contributor Network is a collection of blogs written by YOU -- leading IT practitioners -- about the technology, business opportunities and challenges you face everyday. We invite you to become a contributor or participate by joining the conversations your peers spark.

Apply now to become a member


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment