Monday, April 21, 2014

Best and worst celebrity tech moments of 2014

  Aereo court case: Consumer control over TV vs. broadcaster copyrights | Risk and the Android Heartbleed vulnerability

 
  Network World After Dark

Forward this to a Friend >>>


Best and worst celebrity tech moments of 2014
The year in good and bad celebrity tech moments got off to its usual screaming start at the International CES conference in Las Vegas and it hasn't let up. For better or worse, big names from movies, TV, sports and more are intertwined with the world of technology today. Read More
 


WHITE PAPER: Spirent

Top 5 Reasons You Need Network Testing NOW
The availability, security, and performance of applications and services on the network are among the most important aspects of an IT organization, and must be tested to ensure performance. Download this white paper to learn the top 5 reasons why you should test your network sooner rather than later. Learn More

WHITE PAPER: RES Software
 
Automation for a Better Tomorrow
Check out the five most common annoyances facing enterprise IT service desks today, and how automation can resolve all of them. Download the white paper Learn more

Aereo court case: Consumer control over TV vs. broadcaster copyrights
The ability of television viewers to control and watch programs may be at stake when the U.S. Supreme Court hears arguments Tuesday in a copyright infringement case brought by TV networks against Aereo, a service that streams over-the-air television online. Read More
 

Risk and the Android Heartbleed vulnerability
I haven't written about the Heartbleed vulnerability. Anything I had to say would have just added to the atmosphere of fear, uncertainty, and doubt, or might have caused a 15-year-old who has been coding since he was five to track me down through stackoverflow to reprimand me for some inexcusable oversight. Don't laugh, it happens. But now that the dust has settled, here are a few thoughts about... Read More
 

IT Departments Not Losing Ground to Managed Service Providers (Yet)
Many business users say they're fed up with what they perceive as sluggish IT departments, but cringe at the thought of outsourcing to a managed services provider. However, the rise of BYOD, consumer tech and cloud computing may be clearing a path for change. Read More
 

Microsoft to close Nokia acquisition Friday
Microsoft will be in the smartphone manufacturing business as of this Friday, the day it expects to close the acquisition of the Nokia Devices and Services business. Read More
 

12 ethical dilemmas gnawing at developers today
The tech world has always been long on power and short on thinking about the ramifications of this power. If it can be built, there will always be someone who will build it without contemplating a safer, saner way of doing so, let alone whether the technology should even be built in the first place. The software gets written. Who cares where and how it's used? That's a task for somebody in some corner office. Read More
 

New products of the week 4.21.14
Our roundup of intriguing new products from companies such as Riverbed and MongoDB Read More
 

Most but not all sites have fixed Heartbleed flaw
The world's top 1,000 websites have been patched to protect their servers against the "Heartbleed" exploit, but up to 2% of the top million were still vulnerable as of last week. Read More
 

 

INSIDER
3D printing will transform these five industries
The 3D printing world is currently in limbo – the technology is developed enough to attract some attention in the real world, but not enough to bring about change on a substantial scale. New stories emerge everyday of 3D printing breakthroughs, be it through research or the development of actual products. Read More

 

Even the most secure cloud storage may not be so secure, study finds
Some cloud storage providers who hope to be on the leading edge of cloud security adopt a "zero-knowledge" policy in which vendors say it is impossible for customer data to be snooped on. But a recent study by computer scientists at Johns Hopkins University is questioning just how secure those zero knowledge tactics are. Read More
 

 

SLIDESHOWS

10 Big Data startups to watch

These 10 startups to watch were chosen based on third-party validation, experience, and market potential.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Whatever happened to the IPv4 address crisis?

2. California bill proposes mandatory kill-switch on phones and tablets in 2015

3. ATM malware, controlled by a text message, spews cash

4. 16 weirdest places you'll find Linux

5. 28 facts about pi that you probably didn't know

6. 12 free cloud storage options

7. Top 20 colleges for computer science majors, based on earning potential

8. 8 free Wi-Fi stumbling and surveying tools

9. IRS misses XP deadline, pays Microsoft millions for patches

10. How to change Windows 8.1 to local account with no Microsoft email account required


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: