Search This Blog

Friday, April 10, 2015

What's behind Microsoft's not-so-crazy startup spending spree

How TGI Fridays put mobile efficiency on the menu | Cloud computing brings changes for IT security workers

Network World Compliance

What's behind Microsoft's not-so-crazy startup spending spree
Microsoft so far this year has been the most acquisitive company in enterprise IT, snapping up at least four firms on top of four others that it bought in the last two months of 2014. And while the buyouts might at first glance appear scattershot – we’re talking text analysis, calendaring and digital pen startups among others -- there does seem to be a grand plan here. Read More


WHITE PAPER: VMware

Cloud Services Help IT Meet Today's Business Needs
IT must become more nimble, flexible, and collaborative in order to support the organization's growth and innovation. Read about five strategic ways leveraging cloud services can improve your performance and agility. View now

In this Issue


WHITE PAPER: PC Connection

Big Changes to SQL Licensing
This document we focuses on SQL migration and how licensing changes may impact you. You may be asking, what programs are available to me? Rest assured there are options for you to evaluate and we're here to assist you in determining which the best fit for your organization is. Learn More

INSIDER
How TGI Fridays put mobile efficiency on the menu
In the thin-margined restaurant industry, companies live or die by table turnover time. Yet the process by which most eateries serve their customers is anything but efficient. After initially greeting diners who probably aren't yet ready to order, waiters and waitresses make numerous trips back and forth between the their assigned tables and the point-of-sale (POS) terminal--where, during a busy shift, their fellow servers will invariably be waiting in line to send orders to the kitchen. The to-and-fro takes place again when customers are ready to pay.To read this article in full or to leave a comment, please click here(Insider Story) Read More

Cloud computing brings changes for IT security workers
Cloud computing may help a company's bottom line, but it jeopardizes security, researcher Bruce Schneier says Read More

US drug enforcement amassed bulk phone records for decades
The bulk collection of phone records by the DEA preceded the NSA's own program Read More

Russian hackers accessed White House email, report says
Non-public details of President Obama's schedule were accessed, CNN reported Read More

Researchers show that IoT devices are not designed with security in mind
Lack of encryption and other security issues found in home automation hubs could facilitate burglary, stalking and spying Read More


WHITE PAPER: Kony Inc

5 Steps to Great Apps
Say goodbye to one-off apps and set a foundation for a comprehensive enterprise mobility strategy. Learn More

Use of Windows XP makes European ATMs vulnerable to malware attacks
While malware is a concern, skimming is still the main problem in Western Europe ATM fraud Read More

Police operation disrupts Beebone botnet used for malware distribution
The U.S. has the largest number of computers infected with Beebone Read More

INSIDER
NAS shoot-out: QNAP vs. Synology
The past few years have seen a meteoric rise in the breadth and scope of small-business NAS, and while the top names in this space may have brought the core disciplines of NAS and even SAN to maturity, they continue to add features to their hardware. The latest from QNAP and Synology -- two longtime leaders in this market -- showcase this trend.To read this article in full or to leave a comment, please click here(Insider Story) Read More

You've seen Apple logo a million times, but what's it look like?
UCLA Actual Apple logo? None of the above Even Apple fanboys and fangirls might be sick of seeing the company's logo, but that doesn't mean they actually would remember exactly what it looks like when pressed.In a new study published in the Quarterly Journal of Experimental Psychology, UCLA psychologists found that only 1 of 85 undergraduates could draw the logo correctly from memory.  Fewer than half correctly ID'd the logo when shown it among a number of similar logos. Most of the participants used Apple products.To read this article in full or to leave a comment, please click here Read More

In a mock cyberattack, Deloitte teaches the whole business how to respond
While security and IT staffers typically are trained on dealing with breaches, staffers in other departments may not always be ready Read More


WHITE PAPER: Kony Inc

How to Quantify the Success of Your Mobile Initiative
Read this whitepaper to learn how to calculate and translate mobile advantages into tangible and quantitative values. Learn More

Flaw in WordPress caching plug-in could affect over 1 million sites
Attackers could exploit the vulnerability to inject malicious code into WP Super Cache admin pages, a researcher found Read More

$1.5B Lynda.com buyout must have those at career-oriented startups smiling
I have to thank Lynda.com, the 20-year-old online learning company that LinkedIn just announced plans to buy for $1.5B, for my at least serviceable knowledge of topics from HTML to Excel. A slew of startups seeking to help people learn skills and improve their job prospects might have more than that to thank Lynda.com for if the LinkedIn purchase triggers any more buyout action in this field near-term. Lynda.com Lynda.com online course topics run the gamut from programming to photography to business.To read this article in full or to leave a comment, please click here Read More

The FTC is worried about algorithmic transparency, and you should be too
It’s no secret that algorithms power much of the technology we interact with every day, whether it’s to search for information on Google or to browse through a Facebook news feed. What’s less widely known is that algorithms also play a role when we apply for a loan, for example, or receive a special marketing offer.Algorithms are practically everywhere we are today, shaping what we see, what we believe and, to an increasing extent, what our futures hold. Is that a good thing? The U.S. Federal Trade Commission, like many others, isn’t so sure.“Consumers interact with algorithms on a daily basis, whether they know it or not,” said Ashkan Soltani, the FTC’s chief technologist. “To date, we have very little insight as to how these algorithms operate, what incentives are behind them, what data is used and how it’s structured.”To read this article in full or to leave a comment, please click here Read More

DARPA wants software that adapts, lasts over 100 years
Researchers at the Defense Advanced Research Projects Agency said announced a new program aimed at building software systems that can adapt and survive more than a century years on the job.The program, called Building Resource Adaptive Software Systems, or BRASS is expected to lead to significant improvements in software resilience, reliability and maintainability by developing the computational and algorithmic requirements necessary for software systems and data to remain robust in excess of 100 years.The program looks to address the issues of high costs and frustration with current software systems which continue to grow in complexity and require users to become accustomed to constant update cycles.To read this article in full or to leave a comment, please click here Read More

How to avoid getting hacked due to vulnerable WordPress plugins
I’m a huge WordPress fan because it’s an very powerful, effective, and amazingly extensible platform which is why it’s used by 60.4% of [websites with identifiable content management systems which amounts to] 23.7% of all websites. But there’s a risk with any platform that’s extensible trough the use of third party software (called “plugins” in WordPress): That risk is from software vulnerabilities.Part of the reason for these vulnerabilities is that WordPress is fairly complex so interactions with plugins can produce unwanted and occasionally dangerous security issues. The other major reason is that the coding practices of third parties can be inadequate so dumb vulnerabilities such as buffer overflows and SQL injections can be part and parcel of some “must have” feature added by a plugin. For a summary of current Wordpress vulnerabilities check out the WPScan Vulnerability Database, a “black box WordPress vulnerability scanner.”To read this article in full or to leave a comment, please click here Read More

INSIDER
Getting started with PowerShell: The basics
Are you a Windows administrator? Did you make a new year's resolution to learn PowerShell in 2015? If so, you have come to the right place.Now, sure, just like you start to remember familiar DOS commands or even Bash commands in Linux or Unix, you'll remember some things if you use them often enough. But PowerShell's help and the examples that you get right out of the box with no further effort (other than to update the help files as I recommended earlier) will always be there as guides to help you figure out what's going on and how to work your way out of a puzzle.To read this article in full or to leave a comment, please click here(Insider Story) Read More


SLIDESHOWS

How 20 (mostly) tech companies' logos have evolved over the years

Some of today's biggest tech companies launched with logos that are now unrecognizable.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. First Look: Microsoft's new Spartan browser for Windows 10

2. Antivirus doesn't work. So why are you still using it

3. Massachusetts police department pays $500 CryptoLocker ransom

4. Peeping into 73,000 unsecured security cameras thanks to default passwords

5. FBI: Be wary about Web searches for federal information

6. Microsoft gives one of Windows Phone's best features to iOS, Android

7. Forget SDN and NFV: It's all about LSO

8. Juniper goes after financial services with its new 'server on a switch'

9. The IT outsourcing price wars are on

10. You've seen Apple logo a million times, but what's it look like?


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: