Thursday, June 26, 2014

10 things to know about the smartphone kill switch

Network World After Dark - Newsletter - networkworld.com
  Gartner to IT security pros: Get ready for 'digital business' | Oracle fortifies integration suite for mobile work
 
 
  Network World After Dark

Forward this to a Friend >>>


10 things to know about the smartphone kill switch
Apple already has one, Microsoft and Google say they'll build one, Minnesota will demand it from next year and it could soon be the law in California and maybe nationwide. The smartphone kill switch appears to be on its way to every handset sold in the U.S. so what's all the fuss about? Here's a look at the main points of the technology.What is it?For more than a year, law enforcement officials across the U.S. have been pressuring the telecom industry to do more to combat smartphone theft and the kill switch has been proposed as the answer. It's a piece of software installed in every new phone that can disable a stolen handset.To read this article in full or to leave a comment, please click here Read More
 


WEBCAST: Instart Logic

Web Application Streaming: A Radically Faster Web Experience
Web publishers are in a jam. Users demand dynamic and personalized applicationswith high-quality images. But they also expect the apps to load and run quickly on their mobile devices. What's the answer? Learn more

WHITE PAPER: Limelight Networks

Step-by Step Guide to Optimizing the Digital Experience
This practical guide to superior online performance takes a closer look at the complex concept of online performance: what it is, how to measure it, and—most critically—what it takes to make it better. Learn More

Gartner to IT security pros: Get ready for 'digital business'
National Harbor, Md. -- There's a "digital business" revolution coming and IT security professionals need to grasp the significance early on to be prepared to address whatever security needs arise. That was the message from Gartner analyst Jorge Lopez in the closing keynote at the Gartner Security and Risk Management Summit today. Digital business isn't simply represented by what will be a growth in the so-called "Internet of Things." IoT connectivity will be part of cars, trash cans, road sensors, medical devices, clothing, toys, parking meters, LED lighting and much more. Beyond this, the digital business revolution means what will happen with the information that can be gleaned from IoT and shared for business purposes.To read this article in full or to leave a comment, please click here Read More
 

Oracle fortifies integration suite for mobile work
If it weren't enough of a challenge for IT architects and system managers to glue enterprise systems together, they must also now worry about connecting their systems to mobile and Web applications as well.With this in mind, Oracle has updated its Oracle SOA Suite 12c system integration software it can also handle data from mobile and Web applications, by recognizing some of the most popular data formats and communication protocols used by these external applications."You can now expose any existing application through a mobile interface without rewriting the application," said Amit Zavery, Oracle's group vice president for its Fusion Middleware line of software.To read this article in full or to leave a comment, please click here Read More
 

Google Cardboard: recycle or reuse? (Video)
You haven't had this much fun with a piece of cardboard in a long time. IDG News Service goes hands on with Google's quirky I/O gift. Read More
 

8 Internet things that are not IoT
  Cisco's big market numbers may not include smartphones, tablets and PCs. Read More
 

No more excuses, time to roll out IPv6, says registry boss
As the dwindling number of IPv4 addresses starts to cause problems for organizations around the world, time has come to roll out IPv6 on a larger scale and leave behind dead-end technologies that delay the inevitable, according to the chief of the regional Internet registry in Asia-Pacific.The newer version of the IP (Internet Protocol) adds an almost inexhaustible number of addresses thanks to a 128-bit long address field, compared to the 32 bits used by version 4. Since every connected device on the Internet needs an IP address, there is increasing pressure to move to IPv6 as more non-computer devices come online in the so-called Internet of things.To read this article in full or to leave a comment, please click here Read More
 

Carnegie Mellon system lets you get to the good parts of video, fast
While Video has become ubiquitous thanks mostly to smartphones it doesn't mean you want to actually watch all of it. Carnegie Mellon University computer scientists say they have invented a video highlighting technique called LiveLight that can automatically pick out action in videos shot by smartphones, GoPro cameras or Google Glass users. +More on Network World: NASA's coolest 'way-out' future projects+ LiveLight constantly evaluates action in a video, looking for visual novelty and ignoring repetitive or eventless sequences, to create a summary that enables a viewer to get the gist of what happened. What it produces is a miniature video trailer. Although not yet comparable to a professionally edited video, it can help people quickly review a long video of an event, a security camera feed, or video from a police cruiser's windshield camera, according to Carnegie researchers.To read this article in full or to leave a comment, please click here Read More
 

Hackers found controlling malware and botnets from the cloud
Along with all that cloud traffic coming into your business may be some malware Read More
 

Supreme Court goes 1 for 2 on big tech decisions
Wednesday was a big day for technology cases in the Supreme Court. The Justices ruled on a pair of important cases that promise to have wide-ranging implications for the development and use of modern technology for years and decades to come. But the effects of the decisions aren't necessarily what either side in the cases has been arguing.One decision rightly affirmed that cellphones cannot be searched by police without a warrant. The other rejected Aerio's claim that its unique technological model circumvented copyright restrictions, without addressing the larger cloud storage issues everyone is worrying about. Let's look at the cellphone case first.To read this article in full or to leave a comment, please click here Read More
 

17 obscure Windows tools and tricks too powerful to overlook
Windows is chock full of handy-dandy power tools, but most of them are hidden from everyday view. These are the ones you need to know about. Read More
 

 

SLIDESHOWS

5 potential Facebook killers

Outside of the obvious suspects – LinkedIn, Twitter and Google+ – who has the potential to unseat Facebook? Here are five possibilities.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 17 obscure Windows tools and tricks too powerful to overlook

2. First Look: Google's I/O announcements

3. Google trumps Microsoft's 1TB of storage with unlimited space

4. 100Mb/sec Ethernet coming to a car near you?

5. Early user of VMware NSX net virtualization tool

6. Gartner: Best practices for Amazon AWS security

7. Hungry ants knock out FiOS service … again

8. New iOS jailbreak could become sinister

9. Why One CIO Is Saying 'No' to BYOD

10. HP doubles enterprise switch capacity; calls revamped 5400R a Cisco Catalyst 4500 'killer'


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: