Search This Blog

Tuesday, February 24, 2015

10 tips for mastering Microsoft cloud SLAs

  Apple, Linux, not Windows, most vulnerable operating systems in 2014; IE wins worst app | Antivirus software is falling behind the bad guys

 
  Network World Microsoft  

10 tips for mastering Microsoft cloud SLAs
On Nov. 19, 2014 the IT department of a Texas contracting company started getting reports that the Microsoft Office 365 cloud-based email system was unavailable to its employees. After the outage IT leaders huddled and filed a claim with Microsoft for a breach of the company's service-level agreement (SLA). But the response they got from Microsoft surprised them: Web access was still available so the service was not technically unavailable and therefore it was not a breach of the SLA. Read More
 


: MoreDirect

eGuide: IT in Finance
In this eGuide, Computerworld, CIO, and IDG News Service examine recent attacks and highlight vulnerabilities that many financial services firms experience, as well as some approaches to better protecting financial data. Read on to learn how your organization can better protect itself from threats. Learn More

WHITE PAPER: IBM

Data Warehouse Modernization: The Queryable Data Store
Read the paper to understand how data can be stored and optimized with Hadoop, to assess whether or not you need a queryable data store, and to find out how you can try IBM InfoSphere BigInsights software's key enterprise features for free. Read More

Apple, Linux, not Windows, most vulnerable operating systems in 2014; IE wins worst app
The top spot for vulnerabilities in operating systems no longer goes to Microsoft Windows; in fact Windows isn't even listed in the top three, according to analysis by GFI Software. Instead, the most vulnerable OS was Apple Mac OS X, followed by Apple iOS and then Linux kernel. Read More
 

Antivirus software is falling behind the bad guys
Antivirus software likes to make a point of popping up a small window in the system tray to show you when they have updated their detection definitions. So your software is up to date and ready to catch all the latest malware, right? Read More
 

How machine learning ate Microsoft
At the Strata big data conference, Microsoft let the world know its Azure Machine Learning offering was generally available to developers. Read More
 


WHITE PAPER: IBM

Which SQL Engine Leads the Herd?
In a comparison of three leading SQL-on-Hadoop implementations, IBM Big SQL was found to be more compatible, faster and more scalable than competing SQL-on-Hadoop offerings. Download this short paper for an overview of the independent benchmark, the result and the importance of deploying Hadoop into your data warehouse environment. Learn More

Superfish security flaw also exists in other apps, non-Lenovo systems
On Thursday security researchers warned that an adware program called Superfish, which was preloaded on some Lenovo consumer laptops, opened computers to attack. However, it seems that the same poorly designed and flawed traffic interception mechanism used by Superfish is also used in other software programs. Read More
 

10 Reasons why the Raspberry Pi 2 Model B is a killer product
The Raspberry Pi 2 Model B was recently released and it's quite a step up from its predecessors. Read More
 

Hadoop's big step toward interoperability
In news that flew somewhat under the radar, a new consortium of tech companies – including Pivotal, Verizon, IBM and others – banded together this week to form the Open Data Platform (ODP), which could go a long way in making big data projects more palatable to everyday users. Read More
 


WHITE PAPER: IBM

Delivering Trusted Information for the Modern Data Warehouse
An agile warehouse environment helps organizations capitalize on analytics, optimize performance and uncover new insights. Learn about the capabilities and technologies required to provide trusted information for a next-generation data warehouse. Learn More

Microsoft helps Lenovo, deletes Superfish 'crapware' and rogue cert
Microsoft updated its free Windows Defender and Security Essentials antivirus programs with a signature that sniffs out and deletes the rogue certificate linked to Superfish Visual Discovery, the 'crapware' that blew up in Lenovo's face. Read More
 

Startup makes LibreOffice, OpenOffice available for Firefox smartphones
A startup that uses the cloud to bring desktop applications to mobile devices has expanded its offerings for Mozilla's Firefox OS. Read More
 

Many attackers lurk undetected for months, then pounce, study finds
Attackers who penetrate company networks often pose as legitimate users for long periods of time, causing lengthy delays before victims figure out they've been hacked. Read More
 

 

SLIDESHOWS

Top 10 DNS attacks likely to infiltrate your network

DNS-based attacks are on the rise because many organizations don't realize DNS is a threat vector and therefore don't protect it.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Low tech 'visual hacking' successful nine times out of 10

2. 10 Reasons why the Raspberry Pi 2 Model B is a killer product

3. Apple, Linux, not Windows, most vulnerable operating systems in 2014

4. 8 most intriguing gadgets of 2015

5. Is the Samsung Galaxy S6 about to become the coolest Android phone ever?

6. CuBox-i4Pro: A whole lotta Linux or Android for not a whole lotta cash

7. Learn R for beginners with our PDF

8. Hummingboard: Giving Raspberry Pi a run for less money

9. You've been hacked. Now what?

10. With $15 in Radio Shack parts, 14-year-old hacks a car


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_microsoft_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: