Search This Blog

Wednesday, January 28, 2015

Windows 10: The best tips, tricks, and tweaks

IT hiring: 4 things you're doing wrong (and how to fix them) | How to stay ahead of threats to DNS servers

Network World Network/Systems Management

Windows 10: The best tips, tricks, and tweaks
Despite still being very much an early preview, Windows 10 is already brimming with dozens of handy tweaks and tricks—and, because the operating is still in preview, a handful of those tricks unlock powerful functionality hidden to everyday users. Read More


WHITE PAPER: IBM

2014 Gartner Magic Quadrant for Client Management Tools
IBM is positioned in the leaders quadrant. The Gartner Magic Quadrant for Client Management Tools evaluates tools that manage configurations and support system administration tasks for client devices.These tools automate system administration and support functions that would otherwise be done manually. Learn More

WHITE PAPER: Agari

How Big Data Can Stop Brand Abuse and Phishing for Commerce
Tools that use big data to analyze from the world's inboxes are providing a new way to prevent cyberattacks and stop brand abuse. Learn how Agari's cloud-based solution can guarantee rejection of phishing messages across the Internet to protect your brand, reduce your liability and enhance your consumer trust. Learn more>>

INSIDER
IT hiring: 4 things you're doing wrong (and how to fix them)
IT organizations may be their own worst enemies when it comes to effective strategies for sourcing, screening and hiring IT talent. Read More

How to stay ahead of threats to DNS servers
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach. Gartner predicts more than 30 billion devices will be connected by the Internet of Things (IoT) by 2020, and Domain Name System (DNS) servers are critical to keeping it all running. However, the number, frequency and variety of attacks on DNS servers is rising, putting businesses and initiatives like IoT at enormous risk. The good news is, there are steps you can take to mitigate these attacks. The DNS system translates easily memorized domain names into the numerical IP addresses needed for locating computer services and devices worldwide. According to the Internet Corporation for Assigned Names and Numbers (ICANN), there are 30 to 50 million DNS servers on the planet. These servers are being hit by four main types of attacks: zero-day, cache poisoning, denial of service (DoS) and distributed denial of service (DDoS).To read this article in full or to leave a comment, please click here Read More

France wants to hold social media networks accountable for hate speech
French president François Hollande wants to hold social media companies accountable for hate speech spread on their services.Social networks should be held responsible for what their users say online by the creation of a new European legal framework, he said in Paris on Tuesday.Hollande referred to "well-known large operators" without naming them—but companies such as Facebook, Google and Twitter are typically the target of such remarks.They should be subject to sanctions in case of a breach of the proposed rules, Hollande said, adding that he plans to present a draft law to fight racism and anti-Semitism to the French government by the end of February, including proposals for measures to curb hate speech on the Internet.To read this article in full or to leave a comment, please click here Read More


: Nasuni

High-Performance Protected Storage Across the Enterprise
Nasuni allowed world-class architecture and design firm Perkins+Will to deploy a high performance storage platform that delivers data protection and synchronization at a fraction of the cost and complexity of any existing solution. Learn More

Androids will greet guests at Japanese smart hotel
For centuries, hospitality in Japan has meant kimono-clad innkeepers attentive to the last detail. Now, androids from the company that licenses Hello Kitty will staff a new hotel.A theme park near Nagasaki in southern Japan will open a smart hotel featuring female androids that greet guests, and robots that carry luggage and serve coffee.Henn-na Hotel at the Dutch-inspired Huis Ten Bosch theme park will be partly powered by solar panels and guests will have the option of using facial-recognition software instead of door keys.Henn-na Hotel, meaning "Strange Hotel" in English, will feature three uniformed reception androids, four service and porter robots, an industrial robot arm serving as a cloak room attendant and several cleaning robots.To read this article in full or to leave a comment, please click here Read More

10 tips to secure your iPhone
iPhone securityImage by KelvinsongHere, we provide some very straightforward but effective ways you can secure your iPhone, and help ensure that your private data stays available and secure.To read this article in full or to leave a comment, please click here Read More

How to assess the security of SaaS applications
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.Enterprises have made many attempts to standardize the security evaluation of SaaS applications, including establishing certifications to improve clarity and normalize risk, purchasing compliance suites, and building frameworks to keep all of the information aligned, but none of these attempts have succeeded in establishing consistency. Organizations need a model that will effectively assess every type of SaaS application so comparisons can be made across the board.To read this article in full or to leave a comment, please click here Read More


WEBCAST: Aerohive

Gigabit Speed Wireless Networks with 802.11ac
With the development of 802.11ac, WLANs surpass the gigabit speed barrier. Watch this webinar recording featuring author of "802.11ac: A Survival Guide" (O'Reily), Matthew Gast, for a discussion on 802.11ac and why it's posed to become the 802.11 standard of choice and how to incorporate it into your network plans. View now>>

'Ghost' vulnerability poses high risk to Linux distributions
A fault in a widely used component of most Linux distributions could allow an attacker to take remote control of a system after merely sending a malicious email.The vulnerability, nicknamed "Ghost," is in the GNU C Library known as glibc, according to security vendor Qualys, which disclosed the issue on Tuesday as many Linux distributions released patches. Glibc is a C library that defines system calls.Red Hat, Debian, Ubuntu and Novell have issued fixes. It is advised administrators should patch as soon as possible.To read this article in full or to leave a comment, please click here Read More

Microsoft previews free, updated Power BI business intelligence tool
Aiming at a mass business-user audience, Microsoft has released a preview of the next version of its cloud-based data visualization software, Power BI, with a promise to maintain a free option even after its general release.Starting Tuesday, businesses can sign up at PowerBI.com to test it (the first version premiered last February). A free version of the software is available immediately from the Apple App Store for the iPad. Power BI will also be available for free later this year for the iPhone, Android, and Windows 10.Through a free, downloadable component of the software called Power BI Designer, users can produce dynamically updated dashboards, with interactive, animated charts of corporate data. The software is designed so that elements of those dashboards can be easily shared with other Power BI users, with or without Excel. A variety of connectors allow Power BI users to set up live links to a wide range of data sources.To read this article in full or to leave a comment, please click here Read More

Microsoft's stream processing engine boosts Bing, Azure services
A streaming analytics engine developed by Microsoft Research is giving advertisers on the company's Bing Web search service more timely analysis on how their ad campaigns are faring, according to the company.The streaming analytics engine, called Trill, can process data at two to four orders of magnitude faster than today's typical streaming engines, Microsoft said. The company plans to expand its use to other Microsoft computing services as well.Trill functionality could be of interest to companies looking to analyze their data as it is streamed in from a live source, such as a social networking feed or live sensor data. Trill could compete with a new crop of open source stream processing engines built for these kinds of tasks, such as Apache Storm—which was created by Twitter—and Apache Spark.To read this article in full or to leave a comment, please click here Read More

FTC: Best Practices for businesses facing Internet of Things onslaught
In order to best reap the benefits of the myriad Internet-connected devices can offer, businesses need to better enhance security and protect consumers' privacy. Those were the not too-surprising chief observations coming from a report the Federal Trade Commission issued this week on the Internet of Things and its impact on businesses and consumers. +More on Network World: FTC: IRS imposter complaints up more than 2,300% in 2014+To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

Cooler than cubicles: 18 new designs for the office

Sit, stand, lean, curl up – today's commercial furniture designs let users choose how they want to work.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

MOST-READ STORIES

1. 8 Wi-Fi mistakes to avoid

2. Is the ASUS X205 Microsoft's Chromebook killer?

3. Oracle is quietly becoming a cloud giant

4. IBM Hong Kong calls Cringely report of 100,000 layoffs 'ludicrous;' Cringely fires back

5. DEA cameras tracking hundreds of millions of car journeys across the US

6. Our bullet-proof LAN failed. Here's what we learned

7. Microsoft finally does the right thing, makes Windows 10 a free upgrade

8. Sad state of U.S. broadband as cable industry balks at FCC's 25Mbps definition

9. All signs point to the demise of Microsoft's Surface RT tablet

10. Peeping into 73,000 unsecured security cameras thanks to default passwords


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: