Search This Blog

Thursday, July 31, 2014

iPhone gets first free app for encrypting voice calls

Amazon Fire teardown pegs parts cost just below 32GB iPhone 5S | Apple iWatch launch may be pushed back until December

Network World Cool Tools

Forward this to a Friend >>>


iPhone gets first free app for encrypting voice calls
An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers.Signal comes from Open Whisper Systems, which developed RedPhone and TextSecure, both Android applications that encrypt calls and text messages.The application is compatible with RedPhone and eventually RedPhone and TextSecure will be combined in a single Android application and called Signal as well, according to a blog post.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: CA Technologies

Lowering Management Costs to Enable the Dynamic Data Center
Today's business consumers require rapid access to new tools, applications and services (mobile, social, analytics) and have become impatient with the slow application development/testing cycles and the inefficiency of today's data centers. Learn more!

WHITE PAPER: Riverbed Technology

Riverbed Optimization System: Technical Overview
The Riverbed Optimization System (RiOS™) powers Riverbed's unique line of SteelHead™ application acceleration appliances and Steelhead Mobile client software. RiOS is based on technologies that solve a range of problems affecting wide area networks (WANs) and application performance. View now>>

Amazon Fire teardown pegs parts cost just below 32GB iPhone 5S
New Dynamic Perspective sensors help boost cost, though display costs are minimal, IHS says Read More

Apple iWatch launch may be pushed back until December
The launch of Apple's iWatch has reportedly experienced production delays Read More

10 technologies that will transform PCs in 2015 and beyond
The future of PCs will bring new chips, new memory types, and even new cables and chargers. Take a peek at what's coming. Read More


WHITE PAPER: RES Software

Beyond the Enterprise App Store
Leverage proactive, secure and automated IT Service delivery to move beyond the traditional App Store and empower your users. Read the white paper to learn how Learn more

Analyst: Microsoft's Surface Pro 3 ranked among the best tablet displays
A report published Wednesday by DisplayMate's Raymond Soneira says Microsoft's latest Surface iteration receives top marks for color accuracy and power efficiency. Read More

Rapid Review: Amazon Fire Phone
Amazon's Fire Phone is solid, but it needs a little more time and a lot more apps to be really great. Read More

Samsung delays Tizen OS launch indefinitely due to lack of apps
Samsung is delaying the release of the Samsung Z because it wanted time to "further enhance [the] Tizen ecosystem" before releasing it. Translation: the OS has no apps. Read More


WHITE PAPER: OutSystems

HTML5 Rocks
With the release of the 5th major version of HTML (aka HTML5), new features that mainly target Web Applications have been introduced, ranging from CSS3 (related technology) to GeoLocation and WebStorage. This article explores the top 5 features that developers should be using now. Read Now

Linux will not become a gaming platform, it already is one
Why I cringe whenever I hear someone say "it's the year of Linux gaming!" Because Linux is already a gaming platform. Read More

Samsung, Apple still dominate smartphones, but their shares slip
Vendors mainly from China are offering low-cost, high-quality alternatives, IDC says Read More

Using a smartphone as a hotel room key: What could possibly go wrong?
If you have an Apple or Android smartphone and stay at one of 11 brands of hotels in Hilton’s portfolio, then your smartphone will soon double as your hotel room key. Imagine using a smartphone as room key for more than 650,000 hotel rooms, at over 4,000 hotels in 80 different countries…what could possibly go wrong?Hilton Worldwide has upgraded its technology to the tune of $550 million and then announced that by the end of 2014, guests will be able to use their phone to select their exact room from digital floor plans “for over 650,000 rooms at more than 4,000 hotels across Hilton’s portfolio of 11 brands.” Guests can also “customize their stay by purchasing upgrades and making special requests for items to be delivered to their room, on their mobile devices, tablets and computers.”To read this article in full or to leave a comment, please click here Read More

Black Hat 2014: How to crack just about everything
From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology Read More

RoboBees to save US agriculture ... in about 20 years
It looks like we're doing a great job killing off the bees with the toxic environmental mess that agricultural pesticides have created. So, how do we fix the problem? With robots, of course! Read More


SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. About those alleged backdoors in Microsoft products...

2. Apple iWatch launch may be pushed back until December

3. A breakdown of Cisco ACI pricing

4. Black Hat 2014: How to crack just about everything

5. Abuse of Larry Ellison continues unabated

6. Zero-day flaws found in Symantec's Endpoint Protection

7. 20 cool things you can do with a Raspberry Pi

8. Windows 9 in November? Don't believe it

9. Guns, vandals and thieves: Data shows US networks under attack

10. 10 disturbing attacks at Black Hat USA 2014


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cool_tools_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: