Thursday, 29 August 2013

IBM starts restricting hardware patches to paying customers

Tech CEOs' first jobs: Licorice maker, housekeeper, scuba diver

New York Times site hack shifts attention to registry locks

Network World Daily News AM
August 29, 2013
Share this email

IBM starts restricting hardware patches to paying customers

Following through on a policy change announced in 2012, IBM has started restricting availability of hardware patches to paying customers, spurring at least one advocacy group to accuse the company of anticompetitive practices.

READ MORE
 

Issue highlights

1. Tech CEOs' first jobs: Licorice maker, housekeeper, scuba diver

2. New York Times site hack shifts attention to registry locks

3. Hacker points Syrian telecom website to AT&T, T-Mobile

4. How technology is transforming the NFL

5. Will Microsoft Office Finally Play Nice on the iPad?

6. Tesla Model S vulnerable to hackers, kind of

7. Three types of DNS attacks and how to deal with them

8. Srsly? Bitcoin, selfie added to Oxford dictionary

9. VMware's virtualization quest could help shake up storage, too

10. Social engineering: Study finds Americans willingly open malicious emails

11. INSIDER Seven things you need to know about hardware disposal

RESOURCE COMPLIMENTS OF: Ipswitch

The Single Dashboard Network Monitoring and Management Tool

Ipswitch WhatsUp Gold lets you monitor your networks, servers, VOIP, applications and wireless devices from a single dashboard. Rapidly discover and map your infrastructure, isolate root cause, and define policies and actions that keep your network the way you want it. From SMB to Enterprise. Try it on your network free for 30 days.

Tech CEOs' first jobs: Licorice maker, housekeeper, scuba diver

It can be a long climb to the top of the corporate ladder. With Labor Day in mind, we asked tech CEOs who've reached the highest rung to share their first job experiences. Some were entrepreneurs at an early age, offering lawn-mowing and scuba diving services. Others toiled in the fields and factories. Many got their hands dirty, scrubbing oil stains off asphalt, cleaning bathrooms, and shoveling monkey cages. READ MORE

New York Times site hack shifts attention to registry locks

One way that owners of major websites can mitigate the risk of their domains being hijacked like The New York Times' site was on Tuesday is to apply what is known as a registry lock on the domain, security researchers say. READ MORE

Hacker points Syrian telecom website to AT&T, T-Mobile

The website of a Syrian telecommunications provider redirected to AT&T's website and then T-Mobile's on Wednesday, an apparent prank by a hacker who has been probing the country's Internet infrastructure for several days. READ MORE

RESOURCE COMPLIMENTS OF: BlackBerry

Trade up to devices that are built for business

The BlackBerry® Smartphone Trade Up Program makes it easy for you to empower your employees with BlackBerry® 10. Trade in your used BlackBerry® smartphones or other mobile devices to receive cash back to use towards a new BlackBerry 10 device. Plus, you'll feel confident that your old devices will be securely wiped and responsibly recycled. Learn more about the BlackBerry Smartphone Trade Up Program and request a quote.

How technology is transforming the NFL

READ MORE

Will Microsoft Office Finally Play Nice on the iPad?

For all the success the iPad has enjoyed, it's only big drawback has been that Microsoft Windows software - and Microsoft Office, in particular - doesn't perform well. However, now Parallels has unveiled an app that brings full versions of Windows desktop software to the touch-based iPad. READ MORE

Tesla Model S vulnerable to hackers, kind of

It's the curse of the connected car – once it's linked to the Internet, it's, well, on the Internet. In the case of the Tesla Model S, this means that malicious hackers could, in theory, control some functions of the vehicle and even track it without the owner's knowledge. READ MORE

WHITE PAPER: Dimension Data

Dimension Data's 2013 Network Barometer Report

The Network Barometer Report provides in-depth insight into the trends, behaviors and drivers in network management. It is an annual aggregation and analysis of the data and knowledge collected from Technology Lifecycle Management Assessments. Learn More.

Three types of DNS attacks and how to deal with them

The Syrian Electronic Army, a pro-Assad hacking group, altered the DNS records used by the New York Times, Twitter, and the Huffington Post. The changes forced one site offline and caused problems for the others. Here are three ways such attacks happen, and how they can be mitigated READ MORE

Srsly? Bitcoin, selfie added to Oxford dictionary

What do bitcoin, emoji and selfies have in common? They're all now official words, at least according to the Oxford dictionary. READ MORE

VMware's virtualization quest could help shake up storage, too

The jam-packed VMworld show this week in San Francisco has been VMware's launchpad for flights deeper into storage, an area that the company thinks is due for more virtualization. READ MORE

Social engineering: Study finds Americans willingly open malicious emails

In a study conducted by TNS Global for Halon, an email security service, 30 percent of those surveyed admitted they would open an email, even if they were aware that it contained a virus or was otherwise suspicious. To be fair, the study only included 1,000 adults within the U.S., so this isn't a national index by any means. READ MORE

INSIDER

Seven things you need to know about hardware disposal

From the first day that you plug in a new piece of IT hardware, the clock starts ticking toward the day when it will be pulled out of service. READ MORE

WHITE PAPER: Motorola Solutions Inc.

What You Need to Know About 802.11AC

The first standard wireless LANs emerged at 1Mbps and 2Mbps to serve niche applications such as warehouse picking, inventory scanning and, in office buildings where mobility wasn't a requirement, cordless PC connections aimed at lowering cabling costs. Fast forward through several WLAN generations to today, and the story has completely changed. Learn more.

SLIDESHOWS

Hot products from VMworld 2013

Click through to see all the latest from the show in San Francisco.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Old electronics don't die, they pile up

2. Microsoft will craft XP patches after April '14, but not for you

3. Linus Torvalds celebrates 22 years of Linux with nostalgic message

4. Cisco in for a virtual fight

5. Microsoft Windows 8 is not Ballmer's biggest regret

6. 9/11 hero & Akamai co-founder Danny Lewin recalled in new book

7. Hot products from VMworld 2013

8. 12 seriously cool "toys" for big boys and girls

9. Is the rumored 64-bit Apple chip for iPhone 5S just wishful thinking?

10. Top 10 Amazon cloud challengers

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as buzzhairs@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment