Wednesday, July 29, 2015

Windows 10 roll-out will break Internet traffic records

  Over 10 million Web surfers possibly exposed to malvertising | With its latest iPhone deal, T-Mobile takes control

 
  Computerworld Networking

Windows 10 roll-out will break Internet traffic records
Microsoft will break Internet traffic records this week as it begins to distribute Windows 10. Read More
 


WHITE PAPER: Riverbed Technology

Evolution of the Hybrid Enterprise
This piece focuses on the ability to control such deployments at scale, and covers our application centric approach, covering our network services in depth (app groups, global policy management, QoS, Path selection, etc.) View Now>>

WHITE PAPER: Booz Allen Hamilton Commercial Solutions

7 Ways to Talk Tech with Management
Savvy corporate boards are more informed about emerging technology and often have a view on the ideal time to adopt new technology for maximum benefit. To facilitate better conversation, this paper includes seven questions proactive directors should consider when "talking tech" with their management teams. Learn More

Over 10 million Web surfers possibly exposed to malvertising
Upwards of 10 million people may have visited websites carrying malicious advertisements in the last ten days, possibly infecting their computers with malware, according to computer security company Cyphort. Read More
 

With its latest iPhone deal, T-Mobile takes control
Free Apple Music streaming and a great deal on the iPhone from T-Mobile. Read More
 

No building access card? No problem if you have new Def Con tools
RFID card access systems are used by most companies to let people into their buildings. But over the last few years, researchers have shown how these systems can be easily bypassed. Read More
 

 

INSIDER
Silver Peak CEO: We're re-imagining the WAN for a cloud world
Silver Peak made its name as a top provider of wide-area network optimization capabilities. But the company has its sights set on a loftier goal today: Completely changing the way you build your entire WAN. Silver Peak is moving rapidly to support so-called software-defined WANs, which make it easier and cheaper to connect branches and end users to cloud applications. Here's our Q&A with CEO David Hughes. Read More

 

New Cisco CEO Chuck Robbins heads into "hyper-connected" mode
When Cisco Systems employees headed into work on Monday, they encountered something they hadn't seen in two decades: A new boss. Chuck Robbins -- formerly senior vice president of worldwide operations -- takes over from John Chambers, one of the most visible and quotable figures in business. Network World was granted early access to the new Cisco CEO for this Q&A. Read More
 


WHITE PAPER: HP

Understanding Advanced Threats and How to Mitigate Them
When you're a hacker, time is on your side. Time to find a soft spot in your armor, to evade defenses, to seek out your most critical data. Increasingly, today's advanced threats circumvent traditional defenses—even sandboxing. You need a new approach. Learn more >>

Cisco quits set-top box market, sells business to Technicolor
Cisco is selling its Connected Devices business -- yet at the same time counting on connecting billions of devices. Read More
 

Bug exposes OpenSSH servers to brute-force password guessing attacks
A bug in OpenSSH, the most popular software for secure remote access to UNIX-based systems, could allow attackers to bypass authentication retry restrictions and execute many password guesses. Read More
 

WordPress gets a patch for critical XSS flaw
Developers of the popular WordPress blogging platform have released a critical security update to fix a vulnerability that can be exploited to take over websites. WordPress 4.2.3 resolves a cross-site scripting (XSS) vulnerability that could allow users with the Contributor or Author roles to compromise a website, said Gary Pendergast, a member of the WordPress team, in a blog post. Read More
 

Researchers disclose four unpatched vulnerabilities in mobile IE
Security researchers published limited details about four unpatched vulnerabilities in the mobile version of Internet Explorer because Microsoft has not moved quickly enough to fix them. Read More
 

Senators call for investigation of potential safety, security threats from connected cars
U.S. Sens. Edward Markey and Richard Blumenthal urged the National Highway Traffic Safety Administration to investigate potential widespread risk for consumers because of vulnerabilities in auto information and entertainment systems. Read More
 

Cell service at U.S. airports varies from first class to middle-seat coach
Need something to watch on a flight? You can download an episode of your favorite show in less than a minute and a half on Verizon Wireless at Atlanta's airport or spend 13 hours doing the same over T-Mobile USA at Los Angeles International. Read More
 

 

Peruse our library of free digital magazines!
Choose from a collection of smartly designed digital magazines, which include our most popular departments -- News Analysis, Features, Opinions and Shark Tank -- all free for download with registration. These digital magazines also feature Computerworld signature packages, including our IT Careers 2015 Special Report, with the latest on hot skills and hiring trends, and our Forecast 2015 report, with unique insights into the IT budgets, project priorities and staffing strategies of top IT leaders.

Computerworld's 2016 Premier 100 Technology Leaders: A Call for Nominations
Computerworld is seeking to honor technology professionals who have demonstrated leadership in their organizations through the use of IT and have the strategic vision to align technology with business goals. Nominations close July 31. To make a nomination, click here.

Computerworld's 2015 mobile data service satisfaction survey is underway!
Which carrier's users are the most satisfied with their mobile data service? That's what we want to find out. For the third year, Computerworld is polling readers to find out how they feel about their mobile data provider, how much they pay, how they use their mobile data connections and more. Take the survey here.

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

Special Report: Computerworld's 100 Best Places to Work in IT for 2015
In this edition of Computerworld's July Digital Magazine: Our 22nd annual report on the top organizations across the country that offer technology pros challenging projects, robust salaries and flexible work/life options. To read the issue, click here.

Free Shark Tank T-shirt
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it gets published, you get a sharp Shark shirt. Shark Tank FAQ

Internet of Things: Get the latest news!
Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the Internet of Things (IoT). Subscribe now and stay up to date!

Computerworld Job Board
Search multiple listings now and get new job alerts as they are posted.


 
 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_networking as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2015 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 


 

ads

Ditulis Oleh : Angelisa Vivian Hari: 8:40 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive