Search This Blog

Monday, July 01, 2013

How you invade your own privacy

  Microsoft's Windows 8 team could learn from its Xbox One turnaround | A case for smartphone tracking
 
  Network World Voices of Networking

Forward this to a Friend >>>


How you invade your own privacy
A new study from consulting firm Infosys shows consumers globally are far more relaxed about sharing their private data than we knew and far more relaxed than they should be Read More


WHITE PAPER: Wildpackets

Essential Reference for Monitoring Your IT Infrastructure
How do you choose a network monitoring solution that is appropriate for your IT infrastructure? This ebook is essential for your crash course in network monitoring for analysis, & learning to use multi-segment analysis to diagnose performance problems with distributed application architectures. Download this ebook

WEBCAST: Fluke Networks

Best Practices Performance Monitoring Recorded Webinar
Webinar will examine the driving factors, objectives, requirements, and best practices surrounding converged network and application performance management. Learn More

Microsoft's Windows 8 team could learn from its Xbox One turnaround
I may be generous with my criticism of Microsoft, but I'll also acknowledge when it does something right. And in two very different instances this week, Microsoft has done the right thing. First, the company dropped all of the DRM restrictions on the Xbox One. All of them. There will be no daily check-in required, and trading with friends will be allowed. All of this is detailed on the Xbox One site.... Read More

A case for smartphone tracking
It's time for smartphone users to give up the fear of smartphone tracking in favor of letting mobile apps use location for relevancy. The challenge with using location to improve context in mobile apps is engineering a balance of power consumption, accuracy, and coverage. Android has unique advantages in giving app developers the tools for power conservation course and fine-grained control over location,... Read More


WHITE PAPER: Wildpackets

The State of 802.11 Briefing
Gigabit and Multi-Gigibit Wi-Fi – as well as applications that need them – are closer than ever. This eBook will help you understand the differences between 802.11n/ac/ad and get ready today for changes to your wireless infrastructure. Read the ebook. Download this ebook

Hacking and attacking automated homes
If you added a home automation system to create your version of a "smart" house, it could give you access from anywhere in the world to remotely control your lights, door locks, house temperature, electric appliances, water valves, alarm system, garage door, the ability to open and close your shades and blinds, or even to turn on music and crank up the volume. While that might seem pretty sweet, it... Read More

License-plate readers nab German road-rage shooter
In a bizarre story out of Germany, authorities recently arrested a truck driver believed to be responsible for more than 700 shootings at other cars on German roads since 2008. The key to the investigation was a high-tech surveillance system equipped with license-plate readers, which one police official said helped them find the "needle in a haystack." Read More


WHITE PAPER: Netscout Systems Inc.

Good APM Practices Get Results
According to NetForecast's survey, enterprises with application performance management (APM) best practices benchmark scores above six on a ten-point scale experience 75% better results in critical areas. This research paper reveals the survey results as well as discusses the best practices for APM. Learn More.

Dutch abandon tried-and-true solution in favor of 'big data'
Apparently no longer content to rely on the proven quick thinking, digital dexterity and dogged determination of the nation's youth, Dutch officials are abandoning a 150-year-old flood-control methodology in favor of one fashioned upon technology's flavor of the month: big data. Read More

Mobile Devices and BYOD are Driving IPv6 Adoption
Read More

Neatly naming network nodes
Gibbs ponders how to name machines on a network Read More

 

SLIDESHOWS

Ultimate ultrabook shootout

Testing of eight Windows 8 ultrabooks reveals that users looking for a sleek form factor will have to accept tradeoffs.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. FTC wins monster $7.5 million penalty against 'Do Not Call' list violator

2. 8 Skype interview no-nos

3. Stuart Biggs, the first Cisco CCIE, dies at age 53

4. How will cloud, virtualization and SDN complicate future firewall security?

5. 8 hot mobile startups to watch

6. Scientist out to break Amdahl's law

7. Chambers: Cisco waited too long to address SDNs

8. Cisco fixes serious vulnerabilities in email, Web and content security appliances

9. Cisco, Insieme tout 'penalty-free' fabric architecture

10. Breaking down Cisco's new data center strategy

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: