Search This Blog

Wednesday, June 25, 2014

Up close videos of three cool gadgets

How do mobile location services threaten users? | 10 things to know about the smartphone kill switch

Network World Mobile & Wireless

Forward this to a Friend >>>


Up close videos of three cool gadgets
Check out videos of the LEGO Fusion iPad app, the Drop iPad kitchen scale and LifeTrak activity monitor watch. Read More


RESOURCE COMPLIMENTS OF: ConnectIT

Top Reasons to Attend ConnectIT - 7/16, Atlanta
Get the latest research on collaboration, mobile and document management technologies. Meet solution providers to advance your collaboration strategy. Network with social-, mobile and document management-oriented IT professionals. Register today at: http://www.cwconnectit.com/atlanta

In this Issue


WHITE PAPER: Radware

ITaaS and Virtual Application Delivery Infrastructure
Cost reduction, business agility and operational efficiency: three main drivers for any CIO considering the adoption of cloud computing and virtualization technologies as part of an IT-as-a-service initiative. Learn More

How do mobile location services threaten users?
GAO report says rules governing use of location data need to get tougher Read More

10 things to know about the smartphone kill switch
Apple already has one, Microsoft and Google say they’ll build one, Minnesota will demand it from next year and it could soon be the law in California and maybe nationwide. The smartphone kill switch appears to be on its way to every handset sold in the U.S. so what’s all the fuss about? Here’s a look at the main points of the technology.What is it?For more than a year, law enforcement officials across the U.S. have been pressuring the telecom industry to do more to combat smartphone theft and the kill switch has been proposed as the answer. It’s a piece of software installed in every new phone that can disable a stolen handset.To read this article in full or to leave a comment, please click here Read More

Yahoo launches Aviate app for a 'smarter' Android home screen
Aviate plays a role in Yahoo's efforts in contextual search Read More

Spec showdown: Motorola Moto E vs. Nokia X2
The battle for the “next billion users” is heating up with better performance from low-cost phones. The latest contender is the Android-based Nokia X2, which will go head-to-head with the excellent Moto E from Motorola Mobility.The X2, launched by Microsoft Tuesday, costs about $130 and is a close match up with Motorola’s Moto E, so a buyer’s decision could come down to one or the other. Here’s a spec comparison:ProcessorsThe smartphones are powered by a 1.2GHz dual-core Snapdragon 200 processor, which is Qualcomm’s entry-level processor. But the Moto E doesn’t seem to need more than that to offer snappy performance, which also bodes well for the X2.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: BMC Software

Cloud Benefits for the IT Service Management Market
This paper explores the reasons for the rapid growth of cloud-based IT service management (ITSM) solutions and the benefits they offer for enterprises. Learn More

Companies warned of major security flaw in Google Play apps
University researchers have found that developers often store authentication keys in the Android apps on Google Play, making it possible for criminals to steal corporate or personal data. Read More

The future of networking is a NOS on your choice of bare metal, says Cumulus Networks
If Cumulus Networks has its way, companies will use its Cumulus Linux to decouple the network operating system from the hardware and break free of the integrated approach that has driven the industry for decades. Read More

Android 4.4.4 fixes OpenSSL connection hijacking flaw
A new version of Android for Nexus devices is primarily a security update that patches the bundled OpenSSL library Read More

UK student develops antidote for first Android file-encrypting ransomware
A hardcoded encryption key allows recovering files held hostage by the Simplocker Android malware Read More


WHITE PAPER: APC by Schneider Electric

Data Center Projects: Advantages of Using a Reference Design
It is no longer practical or cost-effective to completely engineer all aspects of a unique data center. Re-use of proven, documented subsystems or complete designs is a best practice for both new data centers and for upgrades to existing data centers. In this paper reference designs are defined and their benefits are explained. Learn more

Build mobile apps directly within the Firefox browser
A new code editor from Mozilla allows developers to build and test mobile apps from within a browser window Read More

10 things to know about the smartphone kill switch
Apple already has one, Microsoft and Google say they’ll build one, Minnesota will demand it from next year and it could soon be the law in California and maybe nationwide. The smartphone kill switch appears to be on its way to every handset sold in the U.S. so what’s all the fuss about? Here’s a look at the main points of the technology.What is it?For more than a year, law enforcement officials across the U.S. have been pressuring the telecom industry to do more to combat smartphone theft and the kill switch has been proposed as the answer. It’s a piece of software installed in every new phone that can disable a stolen handset.To read this article in full or to leave a comment, please click here Read More

At Google I/O, expect smartwatches as Android spreads to new screens
Expected news around smartwatches, health systems and Android-connected devices at Google’s I/O conference, which starts Wednesday, is sure to draw attention from consumers as the search giant tries to connect a wide range of home and personal devices.Google I/O, the company’s biggest event of the year, is officially aimed at helping third-party engineers build products using Google tools for the Android and Chrome platforms. The tech tools, though, are aimed at the development of new consumer products. Some of these products make a splash during the show itself, such as with the launch of Glass two years ago and the handout of Google’s US$1,000-plus Chromebook Pixel laptop last year.To read this article in full or to leave a comment, please click here Read More

Microsoft introduces Interflow: Sharing cybersecurity threats in near real-time
Microsoft announced Interflow, a new platform for sharing cybersecurity threats in near real-time. Although it’s currently available only in “private preview” for Microsoft Active Protections Program (MAPP) members, security threat information will be shared faster, creating a “collectively stronger cybersecurity ecosystem.” In the long run that means protecting people better and more quickly.What exactly does it means to share security and threat information using Interflow? MSRC’s Jerry Bryant said the answer is simple:To read this article in full or to leave a comment, please click here Read More

Researchers expect large wave of rootkits targeting 64-bit systems
Rootkits are again on the rise with the number of new samples reaching levels not seen since 2011, a McAfee report said Read More

Android developers craving new tools, hardware at Google I/O
Developers have Wear smartwatches, a stable version of the Android Studio development environment and a lightweight programming language on their wish lists ahead of the Google I/O conference.Google’s plan to extend the use of Android to new types of devices, including smartwatches, will be one of the main themes at this year’s I/O conference. The smartwatches will run Wear, an extension of Android that’s been customized for smaller screens.Google is trying to drum up interest for the platform on its developer website before the arrival of the first devices, with blog posts on how applications can be customized for round displays and integration with smoke detectors from the company’s Nest.To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

5 potential Facebook killers

Outside of the obvious suspects – LinkedIn, Twitter and Google+ – who has the potential to unseat Facebook? Here are five possibilities.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 CEOs who took drastic pay cuts

2. Gartner: Top trends in IT security technology

3. Why Facebook's SDN switch won't affect Cisco's customers

4. SDN system controls hundreds of Cisco routers; saves contractor time, money

5. The 10 baddest supercomputers on Earth

6. Will perimeter firewalls give way to 'RASP'?

7. Microsoft introduces Interflow: Sharing cybersecurity threats in near real-time

8. Oracle says Oregon governor spiked Obamacare site for political reasons

9. Encrypted Web traffic can reveal highly sensitive information

10. Microsoft cuts OneDrive prices, increases capacity


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wireless_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: