2015-03-30

Review: Dell's Ubuntu-powered M3800 Mobile Workstation is a desktop destroyer | F8: Facebook launches open-source JavaScript library to speed mobile development

Network World Voices of Networking



How 20 (mostly) tech companies' logos have evolved over the years
Some of today's biggest tech companies launched with logos that are now unrecognizable. Read More

WEBCAST: Aerohive

Gigabit Speed Wireless Networks with 802.11ac
With the development of 802.11ac, WLANs surpass the gigabit speed barrier. Watch this webinar recording featuring author of "802.11ac: A Survival Guide" (O'Reily), Matthew Gast, for a discussion on 802.11ac and why it's posed to become the 802.11 standard of choice and how to incorporate it into your network plans. View now>>

In this Issue

Review: Dell's Ubuntu-powered M3800 Mobile Workstation is a desktop destroyer

F8: Facebook launches open-source JavaScript library to speed mobile development

Gold Apple Watch buyers will receive special treatment

Cloud and Proud: Salesforce takes umbrage at Indiana's 'Religious Freedoms' act

Facebook invites developers to monetize Messenger at F8 conference

For $60, you can hack a connected car

10 best product announcements at Enterprise Connect 2015

Crypto-ransomware attack encrypts entire New Jersey school district network

GNOME 3.16 release brings great new apps, notifications

NFV and SDNs will make up the cloud

IDG Contributor Network: Last-mile mobile optimization boosts app performance

F5 leverages LineRate to go lightweight for software defined IT environments

Smartphone owners' perception of their mobile privacy IQ doesn't match reality: Report

In cybersecurity, the network doesn't lie

BitWhisper attack on air-gapped PCs uses heat to steal data

DuckDuckGo and the corporate incentives of donating to noble tech projects

WHITE PAPER: Scribe Software

7 Traits of a World-class API
Download the 7 Traits of a World-class API and learn how to make it simple for customers to integrate your application into their infrastructure is key to sustained success. Learn More

Review: Dell's Ubuntu-powered M3800 Mobile Workstation is a desktop destroyer
I finally got my hands on Dell's M3800 Mobile Workstation and found an impressive machine. Read More

F8: Facebook launches open-source JavaScript library to speed mobile development
Open-source proponent Facebook wants more developers building more apps faster for both Android and iOS. Read More

Gold Apple Watch buyers will receive special treatment
When the upcoming Apple Watch goes on sale on April 24, it will by far be the most complex and downright confusing product Apple has ever released. With an assortment of styles, bands, and materials, there will be a seemingly never ending selection of options for users to choose from.At the same time, the Apple Watch will be the most expensive product Apple has ever released. While the Sports models will start at just $349 (for the 38mm version), the Edition models will start at $10,000 and range all the way up to $17,000. Naturally, not every Apple Store will carry the expensive gold Edition models. During Apple's most recent Apple Watch event, Tim Cook noted that only select stores will carry the device, and in limited quantities at that. What's more, it's been reported that the Edition Apple Watch models will be safely stowed away in secure safes in-store, much in the same way that boutique watch stores protect their most valued merchandise.To read this article in full or to leave a comment, please click here Read More

Cloud and Proud: Salesforce takes umbrage at Indiana's 'Religious Freedoms' act
Long ago, Salesforce founder Marc Benioff was the tallest and maybe smartest guy in Oracle's room, only to leave Oracle and make his ascension to the top of the SaaS cloud business with Salesforce. Salesforce, in turn, has grown steadily and made numerous acquisitions along the way, not unlike how Larry Ellison grew Oracle, but without Ellison's occasionally sulfurous acquisition ingestion.One of those acquisitions was ExactTarget, a strong direct email marketing organization based in Indiana. They were about to grow mightily in Indiana, where costs are but a mere fraction of those in the nearly unaffordable San Francisco Bay Area. That is, until the state proposed new legislation enabling its businesses to discriminate in the name of religion.To read this article in full or to leave a comment, please click here Read More

Facebook invites developers to monetize Messenger at F8 conference
Facebook's mantra has evolved over the past few years. It started out as "move fast and break things."But with a growing population of over 400,000 independent Facebook developers perplexed with Facebook's fast innovation cycle, breaking stuff is bad for both parties. At Facebook's F8 developer conference last year, Mark Zuckerberg changed it to "move fast with stable infra[structure]."This year, Zuckerberg kicked off F8 with yet a new mantra: "Build, Grow, and Monetize."Zuckerberg wants developers now to build and monetize apps on a Facebook platform family: Facebook, Messenger, and Parse. Known for making big product bets, acquiring users, and waiting for the right moment to make money with them, Zuckerberg advanced two new revenue streams, Messenger and new ads for publishers. WhatsApp, Instagram, Groups, and Occulus remain in incubation for the future.To read this article in full or to leave a comment, please click here Read More

WHITE PAPER: Scribe Software

eBook: Demystifying the Dynamics Jumpstart
You don't have to start your AX integration project from scratch. Be sure to get your copy of the Demystify the Dynamics JumpStart eBook to see how by you'll save time on your AX integration by having direct access to best practices, guides, and templates. Learn More

For $60, you can hack a connected car
At the BlackHat Asia conference in Singapore this week, Eric Evenchick, a hacker and former intern at Tesla, presented an open source toolkit designed to interact with the Controller Area Network (CAN) bus that controls most of the functions in many connected cars. Called CANard, the Python-based system was designed as a tool to help hackers and researchers identify security vulnerabilities in these networks, which can control nearly every function of the car. Evenchick also developed hardware that will enable users to connect the toolkit to the car. Called CANtact, the device is a CAN-to-USB interface and is available for just $59.95. Although Evenchick told Forbes that he currently only has about 100 units of the device available for sale, which he plans to begin shipping in July, he has also made the source code and design files available on Github and has invited others to build their own similar devices.To read this article in full or to leave a comment, please click here Read More

10 best product announcements at Enterprise Connect 2015
The 25th VoiceCon/Enterprise Connect was held last week under the bio-dome known as the Gaylord Palms in Orlando. The show provides an opportunity for buyers interested in the broad category known as Unified Communications to come and learn about the market, seek out new vendors, and boldly go where no UC deployment has gone before.The show has also become a launching pad for startups and for existing vendors to announce new products. As an analyst, I attend the show every year looking for products that stand out. Here are the products that caught my eye and were worth calling out. Disclaimer: these products are listed in alphabetic order to avoid any kind of perceived ranking.To read this article in full or to leave a comment, please click here Read More

Crypto-ransomware attack encrypts entire New Jersey school district network
New Jersey school district Swedesboro-Woolwich is a victim of crypto-ransomware.When Swedesboro-Woolwich school district, which has four elementary schools with a total of about 2,000 students, was hit with crypto-ransomware, big guns showed up to investigate. After the district's network was locked up due to ransomware on March 22, the local Woolwich Police, the New Jersey State Police Cyber Crimes Unit, the FBI and Homeland Security are all investigating.In an announcement about the malware, the school district said: Forensic analysis is being performed by the NJ State police. At this point there appears to be no data breach. The files affected were mainly Word documents, Excel spreadsheets and .pdf files created by staff members. Data for the student information system as well as other applications is [sic] stored offsite on hosted servers and was not affected by the virus.To read this article in full or to leave a comment, please click here Read More

GNOME 3.16 release brings great new apps, notifications
I'm finding it harder and harder to not use GNOME.It seems with every release, even the "small" ones, GNOME keeps getting significantly more enjoyable to use. No matter what desktop environment I'm using at the time (and, boy howdy, do I jump around between darn near all of them), if a new release of GNOME appears, I simply can't help myself. I install it before the sun sets on that very day.There's always one or two new goodies in every release that draw me back in. For the 3.14 release (last September), for example, it was the new multi-touch gestures. I just had to try them out.To read this article in full or to leave a comment, please click here Read More

NFV and SDNs will make up the cloud
If McLuhan was right, what we know today as "The Cloud" will be resources linked through massively and continuously variable software-designed networks using largely software-defined linking. Your compute might be in Dallas, but let's store the data in Germany where the privacy laws suit our regulatory/compliance needs.In the bad old days, huge racks filled with "datacomm" equipment and -48v racks of batteries to back them up were anchors in data communications. A big logo sat on the cabinets, claiming space for a carrier. Inside, lots of CSUs/DSUs lived, circuits and monitoring equipment running furiously, and hopefully, 24/7/365.25. The AT&T Cabinet wasn't much different than the Sprint or Verizon cabinet, and Level 3 seemed newer, at least judging by the age of the paint on the rack. Somewhere in that rack was a jack, your jack, fiber, Ethernet, SONET, ATM, and with the jack you were connected to: someplace else.To read this article in full or to leave a comment, please click here Read More

WHITE PAPER: Kaspersky Lab, Inc.

2014 Global IT Risks Report
Kaspersky Lab's report provides a look at the attitudes and strategies toward IT security including insight into the views, opinions and strategies of other IT professionals and valuable data to help benchmark your IT security against industry peers. Learn More

IDG Contributor Network: Last-mile mobile optimization boosts app performance
News watchers might have noticed a bunch of hot air and chest pounding emanating from media nuts a few days ago.The reason: the end of civilization was nigh for traditionalists, because Facebook and the New York Times had made a deal for Times content to be wrapped into Facebook pages, rather than simply linked to.Big deal, you might say. Makes sense. Add venerable 1851-launched newspaper content to a 1.3 billion-user social network, and stir thoroughly.Well, it does make sense. However, intriguingly, there's more to it than a simple you-scratch-my-back media deal. What's most interesting about this move is the technical reason prompting it.To read this article in full or to leave a comment, please click here Read More

F5 leverages LineRate to go lightweight for software defined IT environments
A little over two years ago, application delivery controller market leader F5 Networks acquired LineRate Systems to jump into the software defined networking (SDN) game. There are a number of SDN solution providers that operate at layer 2/3, but LineRate delivers application-layer services into a software-defined environment. These services include security, acceleration, optimization, and intelligent traffic management.Late last week, F5 unveiled the first fruits of the acquisition when it announced a fully virtualized, lightweight load balancing product. The pure software solution enables customers to extend F5's Synthesis framework to any application regardless of where or how it's deployed.To read this article in full or to leave a comment, please click here Read More

Smartphone owners' perception of their mobile privacy IQ doesn't match reality: Report
Do you take the necessary steps to keep the personal info on your phone private? Are you wise about guarding your privacy when it comes to your smartphone photos, contacts, emails and financial data? A new study by Lookout found that millennials, people age 18 – 35, think they are “privacy experts” yet they "partake in risky mobile behavior most often."Lookout asked 1,012 adult smartphone owners in the U.S. to determine their Mobile Privacy IQ. Then all the Mobile Privacy IQs were compared to obtain a better understanding of perception versus reality.To read this article in full or to leave a comment, please click here Read More

In cybersecurity, the network doesn't lie
In a recent ESG research report, enterprise security professionals were asked to identify the primary objectives associated with their organization’s network security strategy (note: I am an ESG employee).  It turns out that 40% of organizations plan to move toward continuous monitoring of all assets on the network while 30% of organizations plan to capture more network traffic for security analytics.This data supports a general trend – many organizations are rapidly increasing their activities around network security data collection, processing, and analysis.  Of course, this isn’t exactly news.  Many enterprises have used security analytics tools based upon NetFlow for many years.  Security analysts also have a history of including full-packet capture (PCAP) tools for their investigations.  Many use open source software like TCPdump or Wireshark.  NetWitness astutely recognized this use case a few years ago, built a successful business around PCAP collection analysis, and ultimately cashed in when RSA Security came calling.To read this article in full or to leave a comment, please click here Read More

BitWhisper attack on air-gapped PCs uses heat to steal data
If you think having a computer isolated from the Internet and other computers will keep you “safe,” then think again. The same security researchers who came out with Air-Hopper have announced BitWhisper as another method to breach air-gapped systems.This time the Cyber Security Research Center at Ben-Gurion University in Israel jump the air-gap by using heat. The researchers explained the proof-of-concept attack as: BitWhisper is a demonstration for a covert bi-directional communication channel between two close by air-gapped computers communicating via heat. The method allows bridging the air-gap between the two physically adjacent and compromised computers using their heat emissions and built-in thermal sensors to communicate.To read this article in full or to leave a comment, please click here Read More

DuckDuckGo and the corporate incentives of donating to noble tech projects
The privacy-focused search engine DuckDuckGo has just donated $125,000 to free and open source projects with a (not surprisingly) heavy focus on privacy and security initiatives. The company itself chose half of the projects that would receive a chunk of the total donation, with the other half selected from those nominated by the community.$25k went to SecureDrop, a project previously known as "DeadDrop" (and which The New Yorker refers to as "StrongBox"). The whole point of SecureDrop is to provide a secure, anonymous document submission system for whistleblowers providing information to publications. This is a project I consider to be astoundingly important – so much so that I have been tempted to set up my own SecureDrop instance. (Except that nobody ever sends me anything important. So I probably don't actually need it at the moment.)To read this article in full or to leave a comment, please click here Read More



SLIDESHOWS

7 things we want to see in the Surface Pro 4

Perhaps a "Surface Pro 4" will debut at the same time or soon after Windows 10 launches. Here's what we'd like to see in the Surface Pro 4.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

MOST-READ STORIES

1. RSA Conference bans 'booth babes'

2. Flaw in common hotel router threatens guests' devices

3. Seven killer Linux apps that will change how you work

4. Many password strength meters are downright WEAK, researchers say

5. Meet the IT dream team

6. Cloud and Proud: Salesforce takes umbrage at Indiana's 'Religious Freedoms' act

7. DSL reaches speeds of 170 Mbps

8. In Cybersecurity, the Network Doesn't Lie

9. Crypto-ransomware attack encrypts entire New Jersey school district network

10. 12 free cloud storage options

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

Show more