Search This Blog

Monday, May 05, 2014

The Camera That Killed the Jeep – Part 2

Credit-Card Fraud has Met Its Match: Ondot Systems New CardControl Solution | Are these the first OpenFlow 1.4 switches ready for prime time?

Network World Voices of Networking

Forward this to a Friend >>>


The Camera That Killed the Jeep – Part 2
So you may recall from my last posting on this subject that I have a Wi-Fi camera that can drain the battery in Donna Diamond's brand new Jeep Cherokee simply by being powered up nearby the car. All I have to do it turn the camera on and the instrument panel lights up; a few hours later, the huge battery in the car is dead. Weird, to say the least, and last Friday I had the opportunity to find out... Read More


WHITE PAPER: Brocade Communications

Business Impact from IT Agility and Data Center Automation
Live Webcast Date: Tuesday, May 20, 2014, 2:00 PM EDT How are your IT peers achieving IT agility? Get the inside scoop from Forrester and Brocade on how enterprise organizations are overcoming IT agility challenges and the results they are achieving – plus get key recommendations and steps you can take to achieve similar results. View now>>

WHITE PAPER: Network Instruments

Your Guide to Troubleshooting VoIP
Real-time voice communications are sensitive to delay and variation in packet arrival times. This paper guides you through the essentials of VoIP troubleshooting, including common problems as well as the metrics you should employ to fix and prevent them. Learn More

Credit-Card Fraud has Met Its Match: Ondot Systems New CardControl Solution
My recent column on minimizing credit-card fraud suggested getting retailers out of the loop via a proxy relationship with credit-card processors. This at least minimizes the number of entities with access to sensitive information and could absolutely eliminate theft of such data from retailers, because they would never have the data. Read More

Are these the first OpenFlow 1.4 switches ready for prime time?
This may be hard to believe, but OpenFlow is now about four years old, and late last year version 1.4 of OpenFlow was unveiled. This week, startup Pica8 became the first vendor to support 1.4, which may be the first OpenFlow version that's ready for prime time. OpenFlow features a number of new features, improvements, and one change. The new features are: Read More

Enterprises Are Not Monitoring Access to Sensitive Data
If you want to make a cybersecurity professional uncomfortable, simply utter these two word: 'Data exfiltration.' Why will this term garner an emotional response? Because data exfiltration is a worst-case outcome of a cyber-attack - think Target, the NY Times, Google Aurora, Titan Rain, etc. Simply stated, 'data exfiltration' is a quasi-military term used to describe the theft of sensitive... Read More


WHITE PAPER: Network Instruments

The Hidden Costs of APM
APM solutions can deliver relevant network visibility and help to prevent problems before they negatively impact the business. But which solution is best for your organization? With this white paper, you will learn key questions to ask your vendor to ensure that you are getting the best value for your investment. Learn More

Catching up with the guy who 'live-blogged' bin Laden raid
Three years ago today, software consultant/coffee shop proprietor Sohaib Athar was working on his laptop at home in Pakistan when he tweeted: "Helicopter hovering above Abbottabad at 1AM (is a rare event)." And then: "A huge window-shaking bang here in Abbottabad Cantt. I hope it's not the start of something nasty :-S." It was ... for Osama bin Laden. Read More

The software defined enterprise WAN is now a business imperative
It seems that we in the networking industry have been talking about evolving the WAN for well over 20 years now. The traditional "hub and spoke" WAN that we've all grown accustomed to was ideally suited for client/server computing, where users were in branches and applications were located in the data center. Read More

How many screens does one person reallfy need?
Not long ago, my favorite monitor gave up the ghost, and I'm still in mourning. It was a splendid 21.3-inch Samsung SyncMaster 214T with a wonderful 1600 x 1200 resolution that made it especially useful for viewing long documents and tall images. But one day it just wouldn't turn on any more, and a quick consultation revealed that it was fried beyond reasonable repair. Unfortunately, no one makes non-widescreen... Read More


WEBCAST: CDW

Compose a software Management Symphony
Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel View Now

JumpCloud just made cron obsolete
For just about as long as I have been in technology, when I spoke to engineers about having a specific task run on schedule I was told that we could "run a cron job" to make it happen. Over the years I realized that sys admins and engineers had a love/hate relationship with cron. It was a simple way of running repetitive tasks over and over again on a schedule, but it was just too simple. Read More

How one woman kept her pregnancy a secret from online advertisers
By now, the story of Target's role in informing a Minnesota father of his teenage daughter's pregnancy has become sort of an urban legend about the risks of data-based advertising. Read More

How smartphones won the tablet war
You might think that Apple's financial results wouldn't mean that much for enterprise IT folks. For the most part you'd be right, but reading between the lines and connecting the dots can sometimes reveal stuff that matters far beyond the hushed halls of Apple's Cupertino headquarters. Read More

Why we should preserve useless, old software
Open Source (and Free) Software provides a number of obvious, and often talked about, benefits – such as that whole "freedom" thing that the kids today like so much. Read More

Judge to Microsoft: Hand over cloud data no matter where in the world it is stored
"The U.S. government doesn't have the power to search a home in another country, nor should it have the power to search the content of email stored overseas," wrote Microsoft Deputy General Counsel David Howard. That was last week when Microsoft challenged the power of US government-issued search warrants seeking customer content stored exclusively outside the US. Read More


SLIDESHOWS

Fave Raves: 33 tech pros share their favorite IT products

It takes many tools to keep IT systems running smoothly, and tech pros have their personal favorites. What made the cut?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. How Adobe Is Moving on From Flash to Embrace HTML5

2. 2014 technology industry graveyard

3. Florida commuter's illegal jammer blocked more than cell talkers

4. 6 free network vulnerability scanners

5. Unplugging the data center

6. Don't forget how close Microsoft came to losing Novell lawsuit

7. SDN start-up targets enterprise WAN complexity

8. Microsoft warns Internet Explorer 6 to 11 vulnerable to zero-day spotted in the wild

9. VMware outlines 'vision' for unified mobile security and management

10. 10 users IT hates to support


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: