Monday, July 22, 2013

Apple's developer site hacked; customer info said to be safe

HP, NEC to develop next-generation x86 servers

Geek-themed Meme of the Week: No. 5

Network World Daily News AM
July 22, 2013
Share this email

Apple's developer site hacked; customer info said to be safe

An unsuaul thing happened to Apple's Developer Center over the last few days. It was down. And stayed down. And though Apple put up a message on the developer website indicating that things would be back to normal soon, no one quite knew what was going on. Until now. Apple on Sunday emailed developers and informed them that there was a security breach on Apple's developer site this past Thursday. The...

READ MORE
 

Issue highlights

1. HP, NEC to develop next-generation x86 servers

2. Geek-themed Meme of the Week: No. 5

3. US court renews permission to NSA to collect phone metadata

4. SIM cards vulnerable to hacking, says researcher

5. Ubuntu forum defaced, breached by hackers

6. Diagnosis – bloatware: 9 empty-calorie pieces of code

7. About those iPhones that apparently didn't electrocute anyone

8. INSIDER Seven things you need to know about hardware disposal

9. How to Screw up an IT Project

10. Software employment grows 45% in 10 years, as angst in engineering grows

11. SAP's Snabe to step down in 2014, McDermott to become sole CEO

12. True tales of (mostly) white-hat hacking

RESOURCE COMPLIMENTS OF: Data+ Conference

Computerworld Data+ Conference: Sept. 8-10, Scottsdale, AZ

Data+, which evolved from the former BI & Analytics Perspectives Conference, takes place September 8-10, 2013 in Scottsdale, Arizona. Over the course of this two-day event, 250+ IT decision-makers and business leaders, like you, connect with peers and leading big data business and technology solution providers. Register now.

HP, NEC to develop next-generation x86 servers

Hewlett Packard and Japan's NEC will expand their existing partnership to develop high-end x86-based servers for cloud and Web applications. READ MORE

Geek-themed Meme of the Week: No. 5

They are like fast-food joints: everywhere. Most are lame. A few are funny, so I have started publishing a weekly selection of memes that amuse me. Here is No. 5. If you'd like more: Geek-themed Meme of the Week: No. 1 Geek-themed Meme of the Week: No. 2 READ MORE

US court renews permission to NSA to collect phone metadata

The Foreign Intelligence Surveillance Court has renewed permission to the U.S. government for a controversial program to collect telephone metadata in bulk. READ MORE

SIM cards vulnerable to hacking, says researcher

Millions of mobile phones may be vulnerable to spying due to the use of outdated, 1970s-era cryptography, according to new research due to be presented at the Black Hat security conference. READ MORE

RESOURCE COMPLIMENTS OF: Cisco

Cisco Nexus 1000V delivers data center consistency to cloud

Knowing is half the battle. And there are many technical challenges for virtualized network environments on the way to cloud-readiness. Gary Kinghorn, Senior Solution Marketing Manager at Cisco, and Bob Laliberte, Senior Analyst at the Enterprise Strategy Group (ESG), discuss these obstacles in this informative webinar. Learn how Cisco Nexus 1000V helps

Ubuntu forum defaced, breached by hackers

A website dedicated to discussion of the Ubuntu Linux distribution was breached on Saturday, with hackers gaining access to encrypted passwords and email addresses. READ MORE

Diagnosis – bloatware: 9 empty-calorie pieces of code

A look at the slowing, fattening, system-gunkifying software that gives us all indigestion. READ MORE

About those iPhones that apparently didn't electrocute anyone

Question: If, as multiple press reports suggest, it appears to be unauthorized iPhone chargers built by third parties that have been responsible for an electrocution and a near-fatal shock in China, why do headlines about these tragedies almost all call them "iPhone electrocutions?" That's a rhetorical question. Of course I know why. READ MORE

INSIDER

Seven things you need to know about hardware disposal

From the first day that you plug in a new piece of IT hardware, the clock starts ticking toward the day when it will be pulled out of service. READ MORE

RESOURCE COMPLIMENTS OF: LogMeIn

Powerful and secure remote support with LogMeIn Rescue

For companies that want to compete in their industry, improving the customer experience is a top priority. To do that, having an on-demand remote support solution is essential. That's why companies around the world choose LogMeIn Rescue to provide powerful, secure support of any device, anytime, anywhere. Rescue offers a simple, reliable interface packed with all the features technicians want. Check out LogMeIn Rescue to learn more and start your free trial today.

How to Screw up an IT Project

Project management experts discuss sure-fire ways to delay or derail a project and--more importantly--how you can avoid these common project management pitfalls. READ MORE

Software employment grows 45% in 10 years, as angst in engineering grows

Software development employment has increased over the past 10 years, but not all IT areas have done as well. The number of jobs for engineers fell over the same period. READ MORE

SAP's Snabe to step down in 2014, McDermott to become sole CEO

SAP co-CEO Jim Hagemann Snabe will leave his post in May 2014 to become a member of the enterprise software vendor's supervisory board, leaving Bill McDermott as sole CEO. READ MORE

True tales of (mostly) white-hat hacking

Stings, penetration pwns, spy games -- it's all in a day's work along the thin gray line of IT security READ MORE

WEBCAST: Hitachi and SAP

A High-Performance, Scalable Big Data Appliance

The ability to store data in-memory is crucial to move business from traditional business intelligence to business advantage through big data. Hitachi Data Systems offers a scalable, high-performance solution for SAP HANA that delivers real-time answers to the business based on a platform that supports mission-critical use cases. Learn more

SLIDESHOWS

Can your IP address give away your identity?

Can hackers, stalkers, criminals, and other Internet users track you down by your Internet Protocol (IP) address?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPad 5 rumor rollup for the week ending July 18

2. 'This is a 3D printed jet engine'

3. Just like that, Android 4.3 is out, ahead of its release date

4. Hijacking Office 365 and other major services via cookie re-use flaw

5. New vulnerability found in Java 7 opens door to 10-year-old attack

6. Apple, Samsung phone security features to be scrutinized

7. Yahoo chief Marissa Mayer's first year

8. Facebook Open Compute project has "weaknesses," Cisco CEO says

9. Cisco building an Internet of Everything router: Chambers

10. Citrix edges Microsoft and VMware in VDI face-off

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments: