Search This Blog

Thursday, November 20, 2014

How does a Windows bug go undetected for 19 years?

Gartner's cloud showdown: Amazon Web Services vs. Microsoft Azure | Microsoft Azure thrown out of gear during a performance update

Network World Microsoft

How does a Windows bug go undetected for 19 years?
The disclosure of a two-decade-old bug in Windows exposes the realities about software development. Read More


WHITE PAPER: Lenovo

Choosing Your Tablet: 5 Steps to Cut Through Confusion
This paper will help you sort through your device and solution options to arrive at the right choice for your organization. Learn More

WHITE PAPER: Dell Software

The Top 10 Things DBAs Should Know About Toad for IBM DB2
Toad for IBM DB2 is a powerful tool for the database administrator. But it's some of its newer and lesser known features that provide the great productivity benefits in the DBA's day-to-day work. Do you know the top 10 features of Toad for IBM DB2? Download this white paper and find out. View now

Gartner's cloud showdown: Amazon Web Services vs. Microsoft Azure
Gartner IaaS Research Director Kyle Hilgendorf says one of the most common questions he gets from enterprise customers looking to go to the cloud is: AWS or Azure? Amazon Web Services has been anointed the public IaaS cloud leader by Gartner and many others, but over the past year or so Satya Nadella's Microsoft has made significant advancements to its public cloud platform. AWS now has competition. Read More

Microsoft Azure thrown out of gear during a performance update
A service interruption on Azure storage services late Tuesday was caused by Microsoft's attempts to roll out a performance update that had been earlier tested for several weeks. Read More

Ransomware: City of Detroit didn't pay, TN sheriff's office did pay to decrypt
At the North American International Cyber Summit, Detroit Mayor Mike Duggan admitted that Detroit's entire city database was encrypted and held for a ransom of 2,000 bitcoins worth about $800,000. No, Detroit didn't pay back in April, as the database wasn't needed by the city, but Duggan described the wake up to ransomware as a "good warning sign for us." Read More


WHITE PAPER: CDW

Steps to Rightsize Your Storage
EMC's unified storage solution provides the efficiency, scalability and performance needed to manage today's influx of data. It consolidates your growing piles of data into a single, easy-to-use system and can easily expand with your organization's needs View Now

INSIDER
How to set up 802.1X client settings in Windows
Understanding all the 802.1X client settings in Windows can certainly help during deployment and support of an 802.1X network. This is especially true when manual configuration of the settings is required, such as in a domain environment or when fine-tuning wireless roaming for latency-sensitive clients and applications, like VoIP and video. Read More

Microsoft releases emergency patch to stymie Windows Server attacks
Microsoft today released one of its rare "out-of-band" security updates to patch a vulnerability in all versions of its Windows Server software. Attackers have already exploited the underlying vulnerability, Microsoft acknowledged. Read More

IBM's new enterprise email aims to organize your day
IBM is going up against cloud-apps powerhouses Google and Microsoft with its next generation email client, called Verse, designed to enrich email with social media and analysis. Read More


WHITE PAPER: IBM

IBM is a Leader in The Forrester Wave
"The Forrester Wave™ for Enterprise Social Platforms offers in depth vendor evaluation based on 65 criteria to help your organization choose an enterprise social platform. The full report evaluates 13 social software vendors, with specific information on their core functionality and strategy. Learn More

Attackers trading malware for privilege
Hackers will use malware, among other techniques, to break into enterprise systems but once they're in, they're likely to switch away from malware to abusing privileged accounts, according to a report released today by CyberArk Software, Ltd., an Israel-based vendor of security solutions for privileged accounts. Read More

Debian general resolution against systemd coupling fails, sponsor steps down
Debian developers voted down a proposal that would have weakened the Linux distribution's integration with a controversial system software package on Tuesday, in a victory for systemd supporters. Read More

8 free online courses to grow your tech skills
At one time, universities and colleges were institutes of higher learning for those who were passionate about acquiring knowledge. Today, education discussions tend to to center around how much individuals can make with their degree. Thanks to the Internet there are still places that offer open learning initiatives designed to help a new generation of technologists succeed. Read More


SLIDESHOWS

Pi, translated: The evolution of Raspberry Pi

It's only been two years, but the Raspberry Pi has already come a long way.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

MOST-READ STORIES of 2014

1. How does a Windows bug go undetected for 19 years?

2. 20-plus eye-popping Black Friday 2014 tech deals

3. Microsoft releases emergency patch to stymie Windows Server attacks

4. 10 hottest IT skills for 2015

5. Cisco open sources security

6. The SWAMP: How to avoid the coming software armageddon

7. Peeping into 73,000 unsecured security cameras thanks to default passwords

8. The 10 mightiest supercomputers on the planet

9. Cool Yule Tools: Best techie gifts for 2014

10. 10 enterprise Internet of Things deployments with actual results


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_microsoft_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: