FAA deems Amazon delivery drowns 'airworthy,' with heavy regulations | A visual history of Microsoft's Internet Explorer
Network World Voices of Networking
Inside look at Google's Android Auto in action
I was given a test ride in a Hyundai Sonata featuring Android Auto, and got a glimpse into the future of the in-car experience. Read More
WHITE PAPER: EMC
Intelligence-Driven Threat Detection and Response
The challenge for organizations of coping with constant infiltration is addressed in this paper by Intelligence Driven Security, an information security strategy that delivers the visibility, analytical insights, and corrective actions needed to help organizations mitigate the risk of operating in a digital world. Learn More
In this Issue
FAA deems Amazon delivery drowns 'airworthy,' with heavy regulations
A visual history of Microsoft's Internet Explorer
USB C - What you need to know about Apple's newest port
Windows 10 will end OS reinstall headaches
IDG Contributor Network: How your car will help control your home
FCC's net neutrality rules are complex, and that might be a good thing
How Google's partnership with Intel, TAG Heuer could fight off Apple Watch
Microsoft reportedly porting Cortana to Android, iOS
Zap! This USB drive will sizzle a PC or turn a laptop into toast
Yahoo starts kicking passwords to the curb, unveiled single-use 'on demand' passwords
IDG Contributor Network: Why storing data in DNA is better than in hard drives
Apple Watch app development pales in comparison to Android Wear
Happy Sunshine Week: National Security Archive names E-Delinquents in 2015 E-FOIA Audit
Tim Cook talks Apple Watch, Steve Jobs, and more
It's a smartphone world, everyone else just lives in it
Another Bitcoin robbery: Evolution drug market closes, taking $11.7 million
WHITE PAPER: EMC
The Critical Incident Response Maturity Journey
This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident. It provides a framework to help organizations determine where they are in the security journey and where they want to be. Learn More
FAA deems Amazon delivery drowns 'airworthy,' with heavy regulations
The Federal Aviation Administration announced yesterday that it issued an "experimental airworthiness certificate" to Amazon, allowing it to legally use drones for "research and development and crew training."Amazon has been planning to eventually launch a drone delivery program for years, which company CEO Jeff Bezos first announced during an interview with 60 Minutes last January, even though the FAA had yet to issue rules on the use of drones for commercial purposes.The certification is a good sign for Amazon's long-term drone plans, but it comes with a lot of stipulations, suggesting that it may still be a long time before drones replace delivery trucks. From the FAA's announcement:To read this article in full or to leave a comment, please click here Read More
A visual history of Microsoft's Internet Explorer
RIPMicrosoft confirmed this week that it will be killing the Internet Explorer brand in favor of a new web browser in Windows 10. The IE replacement is currently referred to as "Project Spartan," though it will likely get a different name before it launches.Although Internet Explorer has been either mocked or ignored by most in the tech world over the past few years, it also played a pivotal role in the early days of the web, and due to Windows' massive market share, remains in use on a global scale. Here is a look back at the rise and demise of Microsoft's Internet Explorer.To read this article in full or to leave a comment, please click here Read More
USB C - What you need to know about Apple's newest port
Apple's special media event wasn't all about the upcoming Apple Watch. Per usual, Apple had a few tricks up its sleeve. Specifically, Apple surprised almost everyone when they introduced a new and incredibly thin 12-inch Retina MacBook.What makes Apple's new MacBook so fascinating is that it only comes with one port -- USB C. Just one solitary USB port to rule them all, as many people have jokingly characterized it. In other words, there's no MagSafe, there's no Thunderbolt, and there are no additional USB ports. All of the ports we've come to know and love are nowhere to be found on Apple's new super light and stylish MacBook.But just what is USB C, exactly, and why are so many people exceedingly excited about its inclusion on the soon to be released MacBook?To read this article in full or to leave a comment, please click here Read More
Windows 10 will end OS reinstall headaches
We've all been there. After several years, your Windows installation is a mess of old libraries and half-uninstalled apps making the machine slow. Or perhaps you got a virus and needed to wipe the C: drive.So you install Windows 7 (or 8). That takes all of 20 minutes, but the process of downloading the hundreds of updates ends up taking hours. That was my recent experience. It took about 15 minutes to install Windows 7 (SSD drive made it fast), but 3 hours of updating.Well, Windows 10 aims to end that headache with an improved backup system that creates a recovery system that uses runtime system files that build the new operating system from files that are already on the PC.To read this article in full or to leave a comment, please click here Read More
IDG Contributor Network: How your car will help control your home
AT&T is one company that is planning on consumers being able to control elements of their home from the dashboard of connected cars.AT&T says that it is planning to link its connected car and smart home products via a voice recognition-enabled dashboard control. Home security will be the principal driver of the new tech in that case. But others are also in a race to bring functioning products to market and obtain consumer acceptance.Two existing AT&T products – AT&T Digital Life, a home management system, and AT&T Drive, its connected car platform – will be merged together to create its platform.To read this article in full or to leave a comment, please click here Read More
WHITE PAPER: IBM
5 Fundamentals to Extract Maximum Value from the Cloud
This whitepaper identifies and explores the core foundational elements of a mature cloud strategy. As the basis of this research, The Economist Intelligence Unit solicited the views of eight leading experts, based on their real-world experience. Learn More
FCC's net neutrality rules are complex, and that might be a good thing
Last week, the Federal Communications Commission released a 400-page document laying out the official orders for how it plans to regulate net neutrality under Title II common-carrier provisions. Not surprisingly, reactions to the document's specifics immediately separated out along ideological lines, with supporters of the doctrine praising the rules while opponents attacked them for leading to "years of litigation, serious collateral consequences for consumers, and ongoing market uncertainty."Stay flexible, my friendsTo read this article in full or to leave a comment, please click here Read More
How Google's partnership with Intel, TAG Heuer could fight off Apple Watch
Apple should take notice of the partnership announced today at the Baselworld watch and jewelry conference, because Google has put together partners that could build a watch that even iPhone customers would want. One can't dispute that Apple will sell a lot of watches. Just take a look at investment bankers UBS and Bernstein's forecasts. But if this Android Wear partnership is effective, it might be hard for Apple to achieve its optimistic forecasts.To read this article in full or to leave a comment, please click here Read More
Microsoft reportedly porting Cortana to Android, iOS
In what has to be the oddest Microsoft rumor so far this year, Reuters is reporting that Microsoft is planning to port its Cortana digital assistant to the iPhone and Android platforms.All three smartphone platforms have their own digital assistant: Cortana for Windows Phone; iOS has Siri; and Android has Android Now. Each has their own quirks and unique capabilities. Cortana is notable for its fuller integration into a phone's contacts and taking time to learn your likes and preferences, plus its Bing integration.Microsoft is already working to bring Cortana to Windows 10. It will likely be a cloud-based service, with just the basic client for input and content delivery on the PC but much of the heavy lifting done in the background online. That has yet to be confirmed, though.To read this article in full or to leave a comment, please click here Read More
Zap! This USB drive will sizzle a PC or turn a laptop into toast
You arrive at work and find a USB flash drive on your desk; it’s not yours but would you plug it in? Over the years you’ve heard a plethora of security-related reasons not to plug in random USB drives, yet as penetration testers know, curious people who know better still plug in a USB drive found in a parking lot. The scenario about finding a drive on your desk at work is one asked by an engineer who developed a USB drive that could turn your laptop or desktop into toast.An engineer going by the alias of “Dark Purple” was allegedly inspired to build USB killer, what is basically a USB bomb, after reading about a guy who plugged in a USB and “burnt half” of his laptop down. Within a week, Dark Purple came up with a plan and ordered the components. While testing the prototype, Dark Purple “burnt down everything I could. Then I developed and ordered printed circuit boards in China and made a combat model.”To read this article in full or to leave a comment, please click here Read More
Yahoo starts kicking passwords to the curb, unveiled single-use 'on demand' passwords
Yahoo took its first step toward kicking passwords to the curb by introducing “on demand” passwords. Yahoo’s on demand passwords may sound similar to two-factor authentication, but it is not the same thing as it only requires one step. Instead, the single-use passwords are similar to clicking “I forgot my password” every time you tried to sign into email.When Yahoo announced “on demand” passwords being available to users in the US, it said the steps to set up single-use passwords are easy to follow. Sign in to your Yahoo.com account. Click on your name at the top right corner to go to your account information page. Select “Security” in the left bar. Click on the slider for “On-demand passwords” to opt-in. Enter your phone number and Yahoo will send you a verification code. Enter the code and voila! Of course, that means you have no issue with giving Yahoo your phone number. It seems like all the major email providers want your phone number for the sake of security; if you don’t give it to them, then you are pestered endlessly to hand it over each time you sign into email. Microsoft is one of the most persistent and annoying by sending you to the page to input your phone number without an easy way to navigate away from it…unless you tweak the URL. Or at least it used to, as I rarely sign in nowadays.To read this article in full or to leave a comment, please click here Read More
WHITE PAPER: PC Connection
Adobe Creative Cloud for Team Security Overview
Adobe takes the security of your digital experience seriously. A proactive approach to security helps to protect your Creative Cloud data. Learn More
IDG Contributor Network: Why storing data in DNA is better than in hard drives
Data can be stored in DNA. In fact, organic DNA can hold massive amounts of data, and it can last a long time. However, one of the main problems with it as a storage medium is that it's been unreliable.But that might be about to change. Scientists are beginning to get a handle on error correction and longevity issues.DNA as network storageScientists think DNA might be a solution for the degrading data storage of the future. They think that magnetic storage, of the kind found in hard drives, microfilm, or flash memory, will not last forever, and possibly not as long even as yellowing bits of paper—the oldest known paper document in the West dates from the 11th century.To read this article in full or to leave a comment, please click here Read More
Apple Watch app development pales in comparison to Android Wear
When compared side-by-side, the Apple Watch and Android Wear platforms have some similarities, but not many. A look at Apple's WatchKit, the programming tools used to create apps, gives a first impression that the Apple Watch's capabilities are currently limited.The first release of Google Glass gave developers limited access for building their apps, which captured developers' imaginations. Nine months later, Google released a comprehensive software development kit (SDK.) After listening to Augmate senior engineer Mike DiGiovanni's talk comparing WatchKit and Android Wear at the Wearable Tech Conference, the Apple Watch-like early Google Glass appears incomplete, and will likely get a comprehensive SDK update after Apple has field-tested WatchKit with its developer community.To read this article in full or to leave a comment, please click here Read More
Happy Sunshine Week: National Security Archive names E-Delinquents in 2015 E-FOIA Audit
It’s Sunshine Week! In fact, it’s the 10th anniversary of Sunshine Week! To celebrate, let’s look at some Sunshine Week editorial cartoons for enjoyment purposes as well as hopefully making it easier to swallow the not-so-happy new 2015 E-FOIA audit of 165 federal offices that was conducted by the National Security Archive.Did you know it’s been 19 years since Congress passed the Electronic Freedom of Information Act Amendments (E-FOIA)? Yet “only 40% of agencies have followed the law's instruction for systematic posting of records released through FOIA in their electronic reading rooms.” To mark Sunshine Week, the National Security Archive published a FOIA Audit showing the best agencies as well as the worst. According to FOIA, agencies are supposed to have e-reading rooms where the public can inspect and copy agency records.To read this article in full or to leave a comment, please click here Read More
Tim Cook talks Apple Watch, Steve Jobs, and more
With about a month to before the Apple Watch launches, Apple CEO Tim Cook sat down with Fast Company for a wide-ranging interview that touched on a number of pertinent topics.When asked rather directly about the perception among many that the Apple Watch still lacks an overarching use case, Cook articulated that similar pessimism colored previous Apple product launches. With the iPod, the expectations for Apple itself at that time were very low. And then most people panned the iPod's price. Who wants this? Who will buy this? We heard all the usual stuff. On iPhone, we set an expectation. We said we'd like to get 1% of the market, 10 million phones for the first year. We put that flag in the sand, and we wound up exceeding it by a bit.To read this article in full or to leave a comment, please click here Read More
It's a smartphone world, everyone else just lives in it
It doesn't take perfect vision to see that smartphones and mobile computing are the hottest part of the modern technology infrastructure. Open your eyes almost anywhere in the world and it's instantly obvious that mobile devices are continuing to revolutionize…well, just about everything.Still, those of us who work in technology may sometimes be too close to the situation to fully understand how much the industry continues to tilt away from legacy PC and server platforms—and even wannabe platforms like tablets—toward building everything around the ubiquitous smartphone. We still live and work with older categories—and in many cases still rely on them to run our businesses—and so may not always see how much the global center of gravity is shifting to the devices in the palms of our hands.To read this article in full or to leave a comment, please click here Read More
Another Bitcoin robbery: Evolution drug market closes, taking $11.7 million
At this point, people who use Bitcoin have to know that their money could simply disappear at any moment, right?The latest example is Evolution, the largest black market website left standing after the Silk Road was taken down by authorities on multiple occasions, whose owners appear to have shut down the service and run off with more than $11.7 million in Bitcoin, Ars Technica reported yesterday.Former users of the Evolution marketplace are pointing at a Bitcoin wallet that was active earlier this week and holds more than 43,000 Bitcoins, according to Reddit posts quoted at Ars Technica.To read this article in full or to leave a comment, please click here Read More
SLIDESHOWS
Google Inbox: A guided tour
This guide compares and contrasts Gmail with Inbox to help you get started with what could become Google's next-generation email service.
JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn
Join the IDG Contributor Network
The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.
MOST-READ STORIES
1. Windows 10 will end OS reinstall headaches
2. EMC eying Arista, Brocade?
3. Cisco replaces UCS server head; software leaders also depart
4. A visual history of Microsoft's Internet Explorer
5. After hitting Raspberry Pi 2, Windows 10 will head to Qualcomm's board
6. Custom browsers that crush Chrome, Firefox, and IE
7. Is it time to adopt a military-style approach to cyber security
8. IT manager gets certificate for Microsoft domain, tries to report it but gets in trouble
9. To avoid NSA, Cisco gear gets delivered to strange addresses
10. What network technology is going to shake up your WAN?
Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.
You are currently subscribed to networkworld_voices_of_networking as security.world@gmail.com.
Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy
When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Network World, please send an e-mail to customer_service@nww.com.
Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **