Thursday, January 8, 2015

Democrats' bill would ban paid prioritization by ISPs

Democrats' bill would ban paid prioritization by ISPs | 6 social engineering tricks that can be avoided if you're careful

ITworld Enterprise Networking

Google Plus LinkedIn Facebook Twitter


Hackers steal $5M in bitcoin currency during Bitstamp exchange attack
Around 19,000 bitcoins were looted during the weekend hack, which targeted hot wallets Read More


: Venafi

Securing Keys and Certificates to Critical Assets
Today's most devastating cyber attacks—including ShellShock, Heartbleed and Zombie Zero—prey on trust. And that puts your digital certificates at risk. This informative resource center explores how next-generation trust protection can help you combat today's attacks, ensuring trusted access to critical assets. Learn More

WHITE PAPER: NetBrain Technologies

A Fully Dynamic Network Mapping Solution
Accurate network diagrams are the Holy Grail in enterprise network management – most network teams know they should be documenting their networks but haven't found a universally good way of doing it. Learn More

Democrats' bill would ban paid prioritization by ISPs
Legislation would require the FCC to prohibit traffic priority deals between ISPs and Web content providers Read More

6 social engineering tricks that can be avoided if you're careful
From phishing to dumpster diving, there's nothing a social engineer won't do Read More

Wireless smart bulbs could scare away burglars
Qualcomm-based reference design for light bulbs may expand their functions for security, convenience and efficiency Read More

Bitstamp claims its bitcoins are secure after attack forces exchange shutdown
The exchange hasn't offered many details on the attack, except that it targeted an operational wallet Read More


WHITE PAPER: Level 3 Communications

Infographic: Managed Security Solutions
Read this infographic to learn how to detect, prevent, and remediate security threats before they occur. Learn More

Twitter suffers outage just as Sony took the stage at CES
The outage came after the devastating cyberattack against Sony Read More

IDG Contributor Network: Google announces AirPlay competitor Google Cast for Audio
You can actually stream just audio to any device connected through Chromecast. I use Pandora, Google Music, Plex, etc. to stream music to devices with HDMI ports. However the Google ecosystem lacks features that allow me to stream audio to networked devices without using Chromecast.That is going to change.Google has announced something called Google Cast for Audio. Unlike Chromecast it doesn't need dedicated hardware for streaming. The technology will be built right into the hardware such as soundbars, speakers, and receivers. Just like Apple's AirPlay.And Google Cast for Audio will work just like AirPlay or Chromecast. There will be a 'Cast' button on compatible apps and clicking on that button will start pouring the music through the supported device.To read this article in full or to leave a comment, please click here Read More

Why SDN all-stars are heading to Brocade
Why is it that a who's who of SDN developers is landing at Brocade?Over the past two years, the company has lured a handful of industry All-Stars to work on software enabling its networking portfolio, including Fibre Channel storage-area network switches, and Ethernet switches and routers. The most recent hire is Michael Bushong, who jumped from start-up Plexxi to Brocade late last year to run product management.To read this article in full or to leave a comment, please click here Read More

Energous shows wireless charging via Bluetooth
Wireless power has been a lab experiment for Intel for a few years now, and a few companies like Qi and PMA have managed to get a few devices on the market, but the power transmission was only good for a few feet. A startup called Energous is showing off wireless power charging at the Consumer Electronics Show that could be a game changer, because Energous claims its wireless power system, called WattUp, can power up a device from up to 20 feet away. WattUp uses a hub, or what it calls a power router, that is basically a powerful RF transmitter using the 900MHz spectrum. The power router scans the local environment for devices, which announce their presence via Bluetooth 4.0. Power is then transmitted via Bluetooth to the device. A custom Energous ASIC then converts the RF signal to DC current. Proximity is still an issue, and the closer you are to the power router, the more power you will get. Also, while power routers can charge multiple devices at once, a number of devices will slow down the charging process. What's rather neat is that Energous also has proprietary technology that can hand off the power charging process from one hub to another, just like when you move around your cell phone connection is handed off from one tower to another without dropping the connection. The Energous software also recognizes the state of your devices. Say your cell phone is fully charged but your tablet is low. It will stop feeding the cell phone and shift to the tablet. Energous still has to address the issues of spectrum – it uses the same spectrum as cordless phones – and how it will secure devices. You all know stories about neighbors leeching unsecured Wi-Fi. The same thing could happen with this. All that said, it's an encouraging development and I look forward to a few less wires in my house. To read this article in full or to leave a comment, please click here Read More

Will enhanced servers do away with need for switches?
With seemingly everything in IT converging – servers, switching, storage, virtualization – will servers ultimately take on the role of the top-of-rack data center switch? Read More


FOR INSIDERS ONLY

Get exclusive access to premium content from CIO magazine, Computerworld, InfoWorld, Network World, CSO, and ITworld -- the best publications in the business.

- 7 tips for landing a job at a coding competition (ITworld)

- 6 simple tricks for protecting your passwords (Network World)

- Free and cheap ways to learn about network administration (Computerworld)

- IT Resume Makeover: Top 11 tips from 2014 (CIO)

- How-to: Get started with Nginx (InfoWorld)

- Incident response survival guide (CSO)

What are you waiting for? Sign up today!


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_enterprise_networking as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2015 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.