Tuesday, September 22, 2015

Early iPhone 6S reviews: Apple's got another winner

Network World Mobile & Wireless - Newsletter - networkworld.com

How IoT devices can identify the people who use them | 3 times Facebook has genuinely scared me

Network World Mobile & Wireless

Early iPhone 6S reviews: Apple's got another winner
As I await my iPhone 5 replacement -- a shiny new iPhone 6S -- to make its way from the FedEx facility in Tennessee, I'm stuck reading early access reviews of the new Apple smartphones. And while my motivation to get the phone was driven more by my son's push to get my current phone than for me to acquire a new one, the reviews now do have me looking forward to getting my hands on the 6S. Read More


WHITE PAPER: Citrix Systems

2014 Magic Quadrant for Application Delivery Controllers
Citrix is positioned in the Leaders Quadrant for Application Delivery Controllers for the eighth consecutive year: the Gartner Magic Quadrant Report focuses on vendor's ability to solve complex application deployment challenges. Don't miss this chance to learn from Gartner's independent research. Learn more >>

WHITE PAPER: IBM

The Total Economic Impact of IBM MobileFirst Platform
Review this Forrester study to understand the potential return on investment (ROI) you may realize by deploying IBM MobileFirst Platform. Learn More

How IoT devices can identify the people who use them
The networked smart environment, also known as the Internet of Things, with its connected fridges, thermostats, and so forth, will one day be ubiquitous.One thing that's almost universal in our understanding of how the tech will work is that the IoT device will connect to the Internet somehow. The device will form the network connectivity, not the user.Big Data The human that's operating the device isn't part of the network. In fact, without any authentication of the user, the IoT doesn't know who has used the smart device.It's unfortunate, because that's useful data. You could get to find out which family member has changed the temperature on the thermostat, for example.To read this article in full or to leave a comment, please click here Read More

3 times Facebook has genuinely scared me
There's no doubt Facebook is a wonder of engineering, a site that brings on vast amounts of data for a user despite it being scattered throughout data centers and external sources. No question, Mark Zuckerberg and crew have engineered a marvel.But there are times when it really spooks me. It comes with friend recommendations. Somehow, this site has the capacity to recommend people that I know in real life but have absolutely no online connections to whatsoever. It's happened so often it can't be a coincidence, either. Three recent examples come to mind: Example 1: While closing the suggestion box for recommended friends, up popped the name of my acupuncturist, whom I haven't seen in six months. She is not in my Outlook contact list, only on my cellphone. Now, I frequently share stories about holistic news and have my naturopathic doctor among my friend's list, but why of the dozens of acupuncturists in northern Orange County did she come up?To read this article in full or to leave a comment, please click here Read More

Initial supply of iPhone 6s and 6s Plus are already sold out
It looks like Apple's new iPhone models are off to a good start Read More

Moto X Pure Edition review: A clever phone with a killer price
Motorola's new Moto X Pure Edition flagship phone has a lot of compelling qualities -- and considerable bang for the buck. But it's not perfect. Read More


: Navisite

eGuide: Cloud Computing
In this eGuide, Computerworld, CSO, InfoWorld, and CIO examine some of the latest trends and most relevant advice regarding cloud strategies. Read on to learn how cloud can make a difference at your organization. Learn More

5 ways to shore up security in your BYOD strategy
You’d think after all this time that organizations would have finally gotten BYOD programs pretty much down pat. Don’t bet on it.A recent study by tyntec reveals that a vast majority of organizations still have inadequate bring-your-own-device (BYOD) policies. That’s not very encouraging, considering that 49 percent of workers now use a personal mobile device for work-related tasks and spend a great deal of time on personal devices for their job.Further, the typical U.S. worker now expects to have nothing less than total access – anywhere, anytime, from any device – to their employer’s networks, finds another study from Dell and Intel. But despite all this demand on the user side, many organizations still wrestle with security, privacy and support issues around BYOD. That is holding many employers back when it comes to giving BYOD an enthusiastic ‘thumbs up’.To read this article in full or to leave a comment, please click here Read More

California wildfire ravages telephony museum
In this day of smartphones, cell towers and wearables, the American Museum of Telephony in the Mountain Ranch community of northern California preserved artifacts of a much different world of communications. But the museum, along with surrounding residences, burnt to the ground late last week during the raging Butte Fire and it's feared that the collection is lost. Read More

Video review: Before upgrading to the iPhone 6s Plus, consider the new Moto X
Here, in the video below, is a hands-on review of the third-generation Moto X. It answers the question why consumers considering an upgrade should take a look at it, especially those considering the iPhone 6s Plus. Here, we’re reviewing is a Moto X Pure Edition. The term pure means its unlocked and will accept a SIM card from any carrier: AT&T, Google Fi, T-Mobile, etc. You can purchase the Pure Edition Moto X from the Moto X Moto Maker website, where you can personalize the phone in much the same way that Nike let's customers personalize its running shoes on its website. The site offers 26 rear case colors and materials, 2 front bezel colors, and 10 accent colors, culminating in 320 unique Moto X style configurations. You can expect to receive your customized device within a couple days of designing and ordering it.To read this article in full or to leave a comment, please click here Read More

How Apple's App Store malware is attacking iOS users
Apple did not report many details when it confirmed the XcodeGhost malware that had infiltrated the iOS App Store. The company didn't disclose the specific iOS vulnerabilities exposed by the XcodeGhost malware and didn't indicate how its iPhone users were affected, but Palo Alto Networks security analyst Claude Xiao reported that XcodeGhost had been used to phish for iCloud passwords. Wired reported that Apple had removed over 300 apps contaminated with XcodeGhost. Recent developments indicate that this malware isn't limited to China, as reported earlier by TechCrunch, though evidence indicates that the malware originated there. To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Citrix Systems

Cisco & Citrix: Opening the Way to Data Center Agility
In most enterprises today the lack of data center agility is a major drag on business agility. Applications have become far more flexible, but the promised business advantages cannot be realized while the infrastructure is rigid. Learn how leading-edge technology companies are learning to support flexible application-centric infrastructures. View now

New wireless science promises 100-times faster Wi-Fi
Terahertz radiation (T-Ray), also known as submillimeter radiation, could be the next wireless radio band to be used for data, after we move on from 5G.5G is our next-generation mobile wireless—likely made up of predominantly millimeter spectrum. I've written about 5G recently in "Next-generation 5G speeds will be 10 to 20 Gbps."T-Ray T-Ray is a step up the electromagnetic spectrum, just above microwave and short of infrared light waves. Conventional radios can't produce it—hence the need to find solutions.To read this article in full or to leave a comment, please click here Read More

Hack iOS 9 and get $1 million, cybersecurity firm says
The market for unpatched vulnerabilities has grown so much that an exploit reseller is willing to pay US$1 million dollars for an attack that can compromise iOS 9 devices.Zerodium, an exploit acquisition company, promises to pay $1 million to researchers who can provide it with an "exclusive, browser-based, and untethered jailbreak for the latest Apple iOS 9 operating system and devices."In the context of iOS devices, jailbreaking refers to bypassing the security restrictions enforced by the mobile operating system in order to install applications that haven't been authorized by Apple and are not distributed through the official app store.To read this article in full or to leave a comment, please click here Read More

AT&T says malware secretly unlocked hundreds of thousands of phones
AT&T said three of its employees secretly installed software on its network so a cellphone unlocking service could surreptitiously funnel hundreds of thousands of requests to its servers to remove software locks on phones. Read More

Galaxy Note 5: A totally subjective road-warrior test
I decided to take the sample Galaxy Note 5 provided to Network World by Samsung to CTIA's Super Mobility 2015 conference in Las Vegas – to see if Samsung has finally made a device that can replace the journalist's trusty notebook. Read More


SLIDESHOWS

8 reasons the Apple Watch is more trouble than it's worth

This hands-on review tells what it's like using an Apple Watch every day for a month, and explains why Apple's smartwatch is not worth the trouble.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 3 Big takeaways from Amazon's latest cloud outage

2. Video review: Before upgrading to the iPhone 6s Plus, consider the new Moto X

3. So you're a VW software engineer …

4. Malware implants on Cisco routers revealed to be more widespread

5. 19 free cloud storage options

6. iOS 9 breaks VPNs and prevents server access for many

7. Volkswagen has a technology problem: It fixes things by hiding them

8. When in Mexico, don't use the ATMs

9. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac

10. Cyber insurance rejects claim after BitPay lost $1.8 million in phishing attack


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wireless_alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


ads

Ditulis Oleh : Angelisa Vivian Hari: 12:35 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive