 | Windows 10: The best tips, tricks, and tweaks Despite still being very much an early preview, Windows 10 is already brimming with dozens of handy tweaks and tricksand, because the operating is still in preview, a handful of those tricks unlock powerful functionality hidden to everyday users. Read More WHITE PAPER: IBM
2014 Gartner Magic Quadrant for Client Management Tools IBM is positioned in the leaders quadrant. The Gartner Magic Quadrant for Client Management Tools evaluates tools that manage configurations and support system administration tasks for client devices.These tools automate system administration and support functions that would otherwise be done manually. Learn More WHITE PAPER: Agari
How Big Data Can Stop Brand Abuse and Phishing for Commerce Tools that use big data to analyze from the world's inboxes are providing a new way to prevent cyberattacks and stop brand abuse. Learn how Agari's cloud-based solution can guarantee rejection of phishing messages across the Internet to protect your brand, reduce your liability and enhance your consumer trust. Learn more>> IT hiring: 4 things you're doing wrong (and how to fix them) IT organizations may be their own worst enemies when it comes to effective strategies for sourcing, screening and hiring IT talent. Read More How to stay ahead of threats to DNS servers This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach. Gartner predicts more than 30 billion devices will be connected by the Internet of Things (IoT) by 2020, and Domain Name System (DNS) servers are critical to keeping it all running. However, the number, frequency and variety of attacks on DNS servers is rising, putting businesses and initiatives like IoT at enormous risk. The good news is, there are steps you can take to mitigate these attacks. The DNS system translates easily memorized domain names into the numerical IP addresses needed for locating computer services and devices worldwide. According to the Internet Corporation for Assigned Names and Numbers (ICANN), there are 30 to 50 million DNS servers on the planet. These servers are being hit by four main types of attacks: zero-day, cache poisoning, denial of service (DoS) and distributed denial of service (DDoS).To read this article in full or to leave a comment, please click here Read More France wants to hold social media networks accountable for hate speech French president François Hollande wants to hold social media companies accountable for hate speech spread on their services.Social networks should be held responsible for what their users say online by the creation of a new European legal framework, he said in Paris on Tuesday.Hollande referred to "well-known large operators" without naming thembut companies such as Facebook, Google and Twitter are typically the target of such remarks.They should be subject to sanctions in case of a breach of the proposed rules, Hollande said, adding that he plans to present a draft law to fight racism and anti-Semitism to the French government by the end of February, including proposals for measures to curb hate speech on the Internet.To read this article in full or to leave a comment, please click here Read More : Nasuni
High-Performance Protected Storage Across the Enterprise Nasuni allowed world-class architecture and design firm Perkins+Will to deploy a high performance storage platform that delivers data protection and synchronization at a fraction of the cost and complexity of any existing solution. Learn More Androids will greet guests at Japanese smart hotel For centuries, hospitality in Japan has meant kimono-clad innkeepers attentive to the last detail. Now, androids from the company that licenses Hello Kitty will staff a new hotel.A theme park near Nagasaki in southern Japan will open a smart hotel featuring female androids that greet guests, and robots that carry luggage and serve coffee.Henn-na Hotel at the Dutch-inspired Huis Ten Bosch theme park will be partly powered by solar panels and guests will have the option of using facial-recognition software instead of door keys.Henn-na Hotel, meaning "Strange Hotel" in English, will feature three uniformed reception androids, four service and porter robots, an industrial robot arm serving as a cloak room attendant and several cleaning robots.To read this article in full or to leave a comment, please click here Read More 10 tips to secure your iPhone iPhone securityImage by KelvinsongHere, we provide some very straightforward but effective ways you can secure your iPhone, and help ensure that your private data stays available and secure.To read this article in full or to leave a comment, please click here Read More How to assess the security of SaaS applications This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.Enterprises have made many attempts to standardize the security evaluation of SaaS applications, including establishing certifications to improve clarity and normalize risk, purchasing compliance suites, and building frameworks to keep all of the information aligned, but none of these attempts have succeeded in establishing consistency. Organizations need a model that will effectively assess every type of SaaS application so comparisons can be made across the board.To read this article in full or to leave a comment, please click here Read More WEBCAST: Aerohive
Gigabit Speed Wireless Networks with 802.11ac With the development of 802.11ac, WLANs surpass the gigabit speed barrier. Watch this webinar recording featuring author of "802.11ac: A Survival Guide" (O'Reily), Matthew Gast, for a discussion on 802.11ac and why it's posed to become the 802.11 standard of choice and how to incorporate it into your network plans. View now>> 'Ghost' vulnerability poses high risk to Linux distributions A fault in a widely used component of most Linux distributions could allow an attacker to take remote control of a system after merely sending a malicious email.The vulnerability, nicknamed "Ghost," is in the GNU C Library known as glibc, according to security vendor Qualys, which disclosed the issue on Tuesday as many Linux distributions released patches. Glibc is a C library that defines system calls.Red Hat, Debian, Ubuntu and Novell have issued fixes. It is advised administrators should patch as soon as possible.To read this article in full or to leave a comment, please click here Read More Microsoft previews free, updated Power BI business intelligence tool Aiming at a mass business-user audience, Microsoft has released a preview of the next version of its cloud-based data visualization software, Power BI, with a promise to maintain a free option even after its general release.Starting Tuesday, businesses can sign up at PowerBI.com to test it (the first version premiered last February). A free version of the software is available immediately from the Apple App Store for the iPad. Power BI will also be available for free later this year for the iPhone, Android, and Windows 10.Through a free, downloadable component of the software called Power BI Designer, users can produce dynamically updated dashboards, with interactive, animated charts of corporate data. The software is designed so that elements of those dashboards can be easily shared with other Power BI users, with or without Excel. A variety of connectors allow Power BI users to set up live links to a wide range of data sources.To read this article in full or to leave a comment, please click here Read More Microsoft's stream processing engine boosts Bing, Azure services A streaming analytics engine developed by Microsoft Research is giving advertisers on the company's Bing Web search service more timely analysis on how their ad campaigns are faring, according to the company.The streaming analytics engine, called Trill, can process data at two to four orders of magnitude faster than today's typical streaming engines, Microsoft said. The company plans to expand its use to other Microsoft computing services as well.Trill functionality could be of interest to companies looking to analyze their data as it is streamed in from a live source, such as a social networking feed or live sensor data. Trill could compete with a new crop of open source stream processing engines built for these kinds of tasks, such as Apache Stormwhich was created by Twitterand Apache Spark.To read this article in full or to leave a comment, please click here Read More FTC: Best Practices for businesses facing Internet of Things onslaught In order to best reap the benefits of the myriad Internet-connected devices can offer, businesses need to better enhance security and protect consumers' privacy. Those were the not too-surprising chief observations coming from a report the Federal Trade Commission issued this week on the Internet of Things and its impact on businesses and consumers. +More on Network World: FTC: IRS imposter complaints up more than 2,300% in 2014+To read this article in full or to leave a comment, please click here Read More |  |
| | SLIDESHOWS Cooler than cubicles: 18 new designs for the office Sit, stand, lean, curl up today's commercial furniture designs let users choose how they want to work. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn Join the IDG Contributor Network The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today. MOST-READ STORIES 1. 8 Wi-Fi mistakes to avoid 2. Is the ASUS X205 Microsoft's Chromebook killer? 3. Oracle is quietly becoming a cloud giant 4. IBM Hong Kong calls Cringely report of 100,000 layoffs 'ludicrous;' Cringely fires back 5. DEA cameras tracking hundreds of millions of car journeys across the US 6. Our bullet-proof LAN failed. Here's what we learned 7. Microsoft finally does the right thing, makes Windows 10 a free upgrade 8. Sad state of U.S. broadband as cable industry balks at FCC's 25Mbps definition 9. All signs point to the demise of Microsoft's Surface RT tablet 10. Peeping into 73,000 unsecured security cameras thanks to default passwords |
No comments:
Post a Comment