Issue highlights 1. Cisco releases security patches to mitigate attack against Unified Communications Manager 2. iPad 5 rumor rollup for the week ending July 18 3. Google Glass susceptible to poison-pill QR code 4. 'This is a 3D printed jet engine' 5. 'Free iPhone' text spammer gets small smack on the behind from FTC 6. Most enterprise networks riddled with vulnerable Java installations, report says 7. Chrome 28 on iOS bolsters browser's ties to Google app ecosystem 8. Is Microsoft starting from scratch with Windows Phone 9? 9. Nokia has best quarter for Lumia smartphones sales, trims losses 10. Ballmer's chance of changing Microsoft? Don't bet on it |
WHITE PAPER: Oracle This whitepaper explores how Project Portfolio Management (PPM) can help financial institutions become more agile and to execute on strategy, which will drive down costs, minimize risk and deliver results to key stakeholders. Learn More |
Cisco Systems released a security patch for its Unified Communications Manager (Unified CM) enterprise telephony product in order to mitigate an attack that could allow hackers to take full control of the systems. The company also patched denial-of-service vulnerabilities in its Intrusion Prevention System software. READ MORE |
The sweltering heat gripping much of the U.S. seems to be the cause of an even more intense than usual rumor delirium about the iPad 5 and iPad mini 2. READ MORE |
Researchers at Lookout mobile security say that they've figured out a way to make Google Glass execute potentially harmful commands by getting it to read a maliciously crafted QR code. READ MORE |
WHITE PAPER: Netscout Systems Inc. According to NetForecast's survey, enterprises with application performance management (APM) best practices benchmark scores above six on a ten-point scale experience 75% better results in critical areas. This research paper reveals the survey results as well as discusses the best practices for APM. Learn More. |
The tweet from General Electric reads: "This is a 3D printed jet engine." Is it real? Well, yes and no. "While it's not to scale, this 1.5 inch long model was made entirely from direct metal laser melting and required no assembly," explains GE in another tweet. Does it work? "Not quite," GE acknowledges. "However, the fan blades are able to rotate!" READ MORE |
An Internet marketer who blasted consumers with millions of deceptive spam text messages promising free iPhones and iPads settled charges with the Federal Trade Commission today. The settlement doesn't amount to much as it, as is typical in lots of these cases, forces the defendant Henry Nolan Kelly to pay back the $60,950 he made from the scam, but suspends the payment for "Kelly's inability to pay,"... READ MORE |
Despite the significant Java security improvements made by Oracle during the past six months, Java vulnerabilities continue to represent a major security risk for organizations because most of them have outdated versions of the software installed on their systems, according to a report by security firm Bit9. READ MORE |
WHITE PAPER: IBM IBM Customer Experience Suite and IBM Intranet Experience Suite help organizations delight customers through a consistently exceptional web experience and empower employees with the social business tools they need to drive better business results. Learn More. |
Google has updated Chrome for iOS, which now opens some links in other Google apps, yet more evidence of the search giant's push to subvert rivals' ecosystems by keeping users corralled within its own. READ MORE |
Windows Phone 8 is what can best be described as a slow-moving success. Each quarter, it gains just a little more ground, and now sits at about 5% of the smartphone market. Considering that it has essentially one OEM, that's not too shabby, but it does pale in comparison to Samsung and Apple. Microsoft moved rather quickly with Windows Phone 8 and 8.5, bringing the same kernel and vital code from the... READ MORE |
Nokia sold 7.4 million Lumia smartphones in the second quarter, its best yet for sales of the Windows Phone devices, but still made a net loss. READ MORE |
Microsoft's attempt to transform its dog-eat-dog corporate culture into a kinder, gentler cooperative climate is likely doomed, an expert in failed business strategies said today. READ MORE |
WHITE PAPER: Tripwire Today's attackers vigilantly wait for you to slip up before they strike your information systems and compromise your data. Learn five actions you can take to improve your information risk management and security strategy and stay one step ahead of the information age adversary. Read More |
SLIDESHOWS Can your IP address give away your identity? Can hackers, stalkers, criminals, and other Internet users track you down by your Internet Protocol (IP) address? JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn MOST-READ STORIES 1. Hacking to rig election earns college student one-year prison sentence 2. Facebook Open Compute project has "weaknesses," Cisco CEO says 3. Citrix edges Microsoft and VMware in VDI face-off 4. Firefox OS for phones is shipping, and it is impressive 5. iPhone 5S specs leaked: NFC, 12-MP camera, and fingerprint authorization sensor expected 6. Cisco building an Internet of Everything router: Chambers 7. Can your IP address give away your identity? 8. Is Microsoft starting from scratch with Windows Phone 9? 9. FBI Ransomware spotted on Mac OS X 10. Yahoo buys Admovate to ramp up its mobile advertising | |
No comments:
Post a Comment