Monday, August 10, 2015

iPhone 7 Rumor Rollup: A real release date! Plus, Apple puts kibosh on carrier scuttlebutt

Review: Free and low-cost Wi-Fi stumblers for the Mac | Verizon eliminates subsidies, contracts in effort to simplify phone plans

Network World Mobile & Wireless

iPhone 7 Rumor Rollup: A real release date! Plus, Apple puts kibosh on carrier scuttlebutt
I’ve become pretty jaded about iPhone 6S and iPhone 7 announcement date headlines. The ones that I’ve been seeing up until now have mainly pinned down the announcement event "date" to… a month.But all that has changed over the past week and now Sept. 9 has been anointed as THE date for Apple to unveil its next iPhone, along with a revamped Apple TV and maybe even a 12.9-inch iPad Pro tablet (one question is whether Apple might be feeling pressure to prop up flagging iPad sales with a big new product). Read More


WEBCAST: OpenText

OpenText Output Accessibility Solution
This video presents the first-to-market PDF document accessibility solution developed by OpenText (formerly Actuate). Based on patented technology, it automates the remediation of high-volume, system-generated PDF documents. Learn More

WEBCAST: EMA Research

Big Data Impacts on Hybrid Infrastructure and Management
Join Shamus McGillicuddy, senior analyst at Enterprise Management Associates (EMA) in this on-demand webinar to get research highlights from the new Big Data Impacts on Hybrid Infrastructure and Management study. Learn More

INSIDER
Review: Free and low-cost Wi-Fi stumblers for the Mac
We recently reviewed low-cost Windows-based Wi-Fi stumblers. Now, here’s our take on wireless stumblers that run on Mac OS X for all you Apple fans.To read this article in full or to leave a comment, please click here(Insider Story) Read More

Verizon eliminates subsidies, contracts in effort to simplify phone plans
When Verizon’s geese come home to roost, they’re going to find a whole different set of smartphone plans. Big Red is eliminating subsidies, service contracts, and building its plans around a fixed cost for unlimited talk and text with data usage on top, an industry trend largely pushed by T-Mobile. Why this matters: As the nation’s largest carrier, what Verizon does impacts not just its customers but the entire industry. The American carrier landscape continues to move in the direction of no contracts and easier-to-understand plans. The days of subsidized smartphones are surely numbered.To read this article in full or to leave a comment, please click here Read More

Huge stakes involved in FCC's spectrum auction rules
The agency will decide on conditions that could prevent AT&T and Verizon from bidding on some spectrum in a 2016 auction Read More


WHITE PAPER: Red Hat, Dell & SAP

Agility, Simplicity, Modernization
CIOs today have more responsibility than ever to fulfilling business: increasing revenue growth, reducing operating costs and driving productivity improvements. Read how vendors are creating state-of-the-art systems to accommodate these systems in one solution. Learn More

FCC rejects proposal favoring small carriers in spectrum auction
The commission declines to streamline conditions for triggering a spectrum set-aside locking out AT&T and Verizon Read More

Top 10 technology schools
Top technology schoolsEvery year, Money releases its rankings of every college and university in the U.S., and not surprisingly, a number of those top schools are leaders in the tech space. Here are the top 10 technology schools, according to Money's most recent survey of the best colleges in America. <A href="http://newsletters.networkworld.com/t/11130013/258950550/623194/82/" TARGET="blank" TITLE="Stanford University website">Stanford University</A>Image by Stanford UniversityTo read this article in full or to leave a comment, please click here Read More

Android vulnerabilities are scary, but could be a blessing in disguise
The headlines, as ever, were alarming – an Android vulnerability that could compromise a phone with nothing more than a malicious text message? With no user input? That’s enough to curdle the blood of the hardiest admin.But even with the advent of worrying vulnerabilities like Stagefright and a similar issue disclosed this week by hackers from Check Point, the people responsible for managing BYOD environments probably aren’t exactly quaking in their boots.+ ALSO ON NETWORK WORLD: Did Android get a case of Stagefright? + Black Hat: Hackers urged to protect Internet freedom +To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Symantec

Winning the Cybersecurity War Within
Over half of the organizations surveyed in ESG's recent report, The Endpoint Security Paradox, reported a cybersecurity shortage, and 80% agreed that managing endpoint security has become increasingly difficult over the last two years. The good news is that organizations can immediately improve their security posture. Learn more

Black Hat 2015: Spectacular floor distractions
As if hacked cars and massive Android vulnerabilities weren't enough to keep the attention of security experts attending Black Hat 2015 in Las Vegas, the vendors at this increasingly vendor-driven show were wheeling out shiny distractions ranging from food and drink to celebrity lookalikes to custom art and free giveaways. Read More

Microsoft offers Windows developers a bridge to Apple iOS
Having promised developers to be less Windows-centric and more cross platform friendly, Microsoft has released software that helps programmers more easily bridge the divide between Apple applications and Windows applications.The Windows Bridge for iOS, now available as a preview on GitHub, is designed to make it easy to port applications written for Apple iOS devices so that they run on Microsoft Windows computers.The library, abbreviated as WinObjC, will also ease the process of developing iOS applications on Windows machines.“Microsoft’s move here illustrates that the only serious way to engage developers today is with open source,” noted Al Hilwa, IDC program director for enterprise software development.To read this article in full or to leave a comment, please click here Read More

Black Hat 2015: IoT devices can become transmitters to steal data
It’s possible to get a printer and other inexpensive network and Internet of Things devices to transmit radio signals that are detectable far enough away that they could be used to steal data from compromised networks, a researcher tells the Black Hat 2015 conference.By rapidly turning on and off the outputs from I/O pins on chips within the printer, it’s possible to generate a signal strong enough to pass through a concrete wall and beyond to a receiver, says Ang Cui, a researcher who works at Red Balloon Security and did the research at Columbia University.+ Follow all the stories out of Black Hat 2015 +To read this article in full or to leave a comment, please click here Read More

INSIDER
Understanding and using objects in PowerShell
One of the things most people do not realize about PowerShell, at least up front, is that PowerShell is based on the .NET Framework, which means that PowerShell can be considered a programming language. In fact, each response you get from running a cmdlet in PowerShell, no matter how simple or complex that cmdlet may be, is actually a .NET object. It might look like text to you, but it can be programmatically manipulated in ways that Linux and UNIX command line diehards can only dream about.To read this article in full or to leave a comment, please click here(Insider Story) Read More

Did Android get a case of Stagefright?
At the Black Hat security conference this morning, Adrian Ludwig, Google’s lead engineer for Android security, assuaged fears about the recent Android Stagefright vulnerability reported to affect nearly a billion Android devices.The surge in interest in the Stagefright vulnerability was precipitated by the Black Hat security conference taking place in Las Vegas. It began when Joshua Drake – security analyst with Zimperium who discovered the vulnerability – tweeted about it to promote his Black Hat talk about his discovery, pointing to his place on the conference schedule. A few days after the tweet, Drake gave an interview about the Stagefright vulnerability to National Public Radio (NPR). It was subsequently reported in Forbes, Fortune and Wired, followed by a deluge of related stories across the tech blogosphere.To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

How much do CIOs really make? Pay packages of 25 Fortune 500 execs revealed

Compensation for CIOs includes cash, equity, perks.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Windows 10 is possibly the worst spyware ever made

2. Proposed solutions for fixing Reserve Windows 10 problems

3. Has Epson killed the printer ink cartridge?

4. How to set up a local account in Windows 10 during or after installation

5. 12 obscure new Windows 10 features that eliminate everyday hassles

6. Windows 10 installation: Customize settings vs. express settings

7. Black Hat 2015: IoT devices can become transmitters to steal data

8. Prominent healthcare CIO: FDA medical device security warning "will be the first of many"

9. Tweaks to Windows 10 settings for privacy

10. 19 free cloud storage options


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wireless_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: