IT News and Events
Dec 29th, 2014 — Jan 4th, 2015 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 202, Issue 5 << Previous Issue | Next Issue >>
IT News - Technology
disable
5 Technologies That Will Blow Up My Business (And Yours) In 2015
"There are technologies that are coming and there are technologies that are here," opines Gene Marks in Forbes.

"For example, in the next three to seven years your business (and mine) will be affected, in some way, by wearables, the Internet of Things, drones, bendable materials, and 3D printing. But not yet (at least, not for most). However, in 2015, there are at least five technologies that have all been around for a little while and will have finally reached a certain stage of maturity. They will become mainstream this year. And they will blow up my business (and yours). Here's how..."

Forbes, December 22nd, 2014
(Get More Information . .) open to premium members only

Google's first stab at control-free ROBOT car rolls off the line
"The engineering wizards in Google's workshops have unveiled the Chocolate Factory's first attempt at a completely control-free robot car, where passengers entrust themselves entirely to the machine," reports Iain Thomson in The Register.

"In May, Google announced it was going to start building cars without pedals or a steering wheel to test out the practicalities of such a vehicle, and this is the first of a planned 100-car production run. The car is street legal in California and denizens of Silicon Valley may see it trundling down their streets in January - and the UK is also expecting a delivery...."

The Register, December 23rd, 2014
(Get More Information . .) open to premium members only

IT News - Bitcoin
disable
2014 - The Best And Worst Year For Bitcoin So Far
Andrew Quentson writes in CryptoCoinsNews, "As the world prepares to say goodbye to another year and Bitcoin nears its sixth birthday, we look back at one of the more memorable and eventful year of Bitcoin's history. A year in which Bitcoin began to mature and, just like a six year old child going to school for the first time, left his home to meet the world and learn how to deal with hostile strangers, authoritative teacher regulators and make many, many new friends..."
CryptoCoinsNews, December 26th, 2014
(Get More Information . .) open to premium members only

Bitcoin Is (Still) Not Doomed
Tatiana Moroz writes in Bitcoin Magazine that "Washington Post columnist Henry Farrell has just added himself to the Nakamoto Institute's running list of skeptics making bold assertions about the certain demise of Bitcoin. In a post entitled 'Bitcoin's financial network is doomed,' Mr. Farrell demonstrates his short-sightedness in the face of Bitcoin's subtlety and allure, perhaps as a cunning-though-not-so-original means of acquiring cheap coins for himself. Regardless of his motivations, I couldn't resist a full rebuttal, if only to reassure the weak hands among us that no, Bitcoin is still not doomed, and yes, Mr. Farrell is in for a rude awakening if he really believes the poor arguments he makes in his Post article. Without further adieu, a rebuttal to Mr. Henry Farrell, Bitcoin Skeptic:..."
Bitcoin Magazine, December 25th, 2014
(Get More Information . .) open to premium members only

The 10 Most Influential People in Bitcoin This Year
"It's safe to say that 2014 was an interesting year for bitcoin," opines Tom Sharkey in Bitcoin Magazine.

"As core development on the bitcoin protocol continued to strengthen the technological foundation of the digital currency, members of the bitcoin community had a significant impact on the 'front-end' of the budding industry this year too....

We considered the year's biggest stories, contributions to the community and the companies working with digital currencies, and the answers of our reader poll - all within the broader context of the bitcoin industry and its growth in 2014.

Here are CoinDesk's top 10 most influential people in bitcoin this year:"

Bitcoin Magazine, December 24th, 2014
(Get More Information . .) open to premium members only

IT News - Security
disable
Crimeware-as-a-Service offers custom targeting
"Are you a criminal looking for vulnerable computers in a particular geographic area so that you can, say, attack a specific bank based in that region?" asks Maria Korolov in CSO Online.

"Or do you need some compromised computers to serve as proxies or relays?

The old days, where you had to go out and infect the computers yourself, are over. These days, you can rent part of an existing botnet for your nefarious purposes, using simple Web-based interfaces to commit your dastardly deeds..."

CSO Online, December 24th, 2014
(Get More Information . .) open to premium members only

Attackers Leverage IT Tools As Cover
"The line between attack and defense tools has blurred,"notes Jai Vijayan in Dark Reading. The task of defending enterprises against malicious intruders could become even harder for security managers with attackers beginning to increasingly leverage commonly used IT tools and services to disguise their presence on compromised networks.

Security researchers have for some time observed attack groups using popular services like Dropbox and WordPress as cover for new advanced persistent threat attacks. The DNSCalc gang that attacked The New York Times last year, for instance, used DropBox to distribute their malware and WordPress as a command and control infrastructure for managing infected systems..."

Dark Reading, December 26th, 2014
(Get More Information . .) open to premium members only

Is EMV the silver bullet to credit card fraud?
"Your holiday shopping experience will be different next year -- at least in how you pay. By October 2015, most retailers in the U.S. will have switched to accepting EMV (EMV stands for Europay, MasterCard and Visa, and is already a standard worldwide)," reports Jen A. Miller in CSO Online.

"But EMV, which relies on a chip in a credit card instead of a magnetic strip, is not going to be the magic cure for stopping credit card fraud, experts say. It will tamp down some efforts by hackers, but fraud will still continue -- just elsewhere..."

CSO Online, December 24th, 2014
(Get More Information . .) open to premium members only

Two-factor authentication oversight led to JPMorgan breach
Lucian Constantin writes in ComputerWorld, "The attackers who stole information about 83 million JPMorgan Chase customers earlier this year gained a foothold on the company's network because a server reportedly lacked two-factor authentication.

The attackers stole the login credentials of a JPMorgan employee and were able to access the server, despite the company's practice of using two-factor authentication on most of its systems, the New York Times reported citing unnamed sources familiar with the internal and external investigations at JPMorgan..."

ComputerWorld, December 23rd, 2014
(Get More Information . .) open to premium members only

Why Digital Forensics In Incident Response Matter More Now
"By understanding what happened, when, how, and why, security teams can prevent similar breaches from occurring in the future," writes Craig Carpenter in Dark Reading.

"In the 1991 movie Backdraft, Robert De Niro plays the part of Donald 'Shadow' Rimgale, a fire department detective investigating a series of arsons in Chicago. As a former firefighter himself, De Niro's character works closely with firefighters to piece together events based on the available evidence, both physical and circumstantial, and relies on his years of experience as both a firefighter and arson investigator.

Today's practice of incident response (IR) is very similar to De Niro's Backdraft character:..."

Dark Reading, December 24th, 2014
(Get More Information . .) open to premium members only

IT News - Cloud
disable
2014: The year the cloud killed the datacenter
"This year more and more CxOs pulled the life support on their own datacenter infrastructure in favor of ever-maturing public and private cloud offerings," notes Jason Perlow in ZDNet.

"Back in the summer of 2013 I wrote a series of articles on what I called the "Datacenter Zombie Apocalypse."

The first was an observation of the troubles IBM was undergoing trying to shift its very datacenter-oriented services and outsourcing business to one that was more cloud focused and how it might serve as a bellwether for the IT industry as a whole.

The other was about how, as an IT practitioner, one might transition their skills to be more cloud-oriented.

Where are we now with all of this, over a year later?..."

ZDNet, December 26th, 2014
(Get More Information . .) open to premium members only

Ten Ways to Make Your Cloud More Efficient
"Believe it or not, we are at a very critical junction point when it comes to cloud computing," reports Bill Kleyman in Data Center Knowledge.

"Although growth has been steady, we're about to hit a very big boom. According to the recent Cisco Global Cloud Index Report, 'while the amount of global traffic crossing the Internet and IP WAN networks is projected to reach 1.6 zettabytes per year by 2018, the amount of annual global data center traffic in 2013 is already estimated to be 3.1 ZB, and by 2018 will triple to reach 8.6 ZB per year.'

So in the midst of this rapid growth, how can you improve cloud efficiency to keep your environment up and running in a proactively healthy state? Remember, in the technology world, anything and everything can (and will) happen. So, here are 10 ways to improve cloud efficiency:..."

Data Center Knowledge, December 24th, 2014
(Get More Information . .) open to premium members only

Six Rules for a Modern Private Cloud
"To this day, a private cloud is still one of the most popular cloud delivery methods out there," writes Bill Kleyman in Data Center Knowledge.

"Organizations looking to bring rich content to the ever-mobile end user are updating their infrastructure, creating a more scalable data center and trying to keep up with the market.

We have a very different kind of user today. The modern user is:..."

Data Center Knowledge, December 23rd, 2014
(Get More Information . .) open to premium members only

IT News - Careers
disable
10 Top Stories for Job Seekers in 2014
Sharon Florentine writes in CIO, "As the demand for workers with IT skills continues to rise, the past year was a good one for tech pros looking to make to move. Here, we highlight the most popular career stories for job seekers from 2014....

2014 saw the economy climb even further out of recession, with increases in hiring and resulting upward pressure on salaries and benefits as the unemployment rate plummeted. Job seekers were better able to negotiate and found their skills and knowledge in great demand, and employers faced with the possibility of losing key talent realized the need to double down on engagement and retention. Here, we highlight the most popular career stories for job seekers from 2014..."

CIO, December 26th, 2014
(Get More Information . .) open to premium members only

IT News - BYOD
disable
Your New PC Needs These 22 Free, Excellent Programs
Brad Chacos writes in PCworld, "More than a mere blank slate, a new PC is a fresh opportunity - a collection of components that, with the right software installed, could accomplish anything from balancing your household budget to helping to cure cancer.

Yes, stocking your PC is an intensely personal task. Even still, some programs are so helpful, so handy, so useful across the board that we heartily recommend them to everybody. These are the programs you want to install on a new PC first..."

PCworld, December 24th, 2014
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section