Search This Blog

Tuesday, January 18, 2011

Meraki adds routing to Wi-Fi cloud portfolio

Fruit fly looks to be one good bug for computer networks | Will electronic toll systems become terrorist targets?

Network World Network Optimization

Forward this to a Friend >>>


Meraki adds routing to Wi-Fi cloud portfolio
Cloud networking is taking off and could help enterprises unify their wireless and wired network operations in new, economical and convenient ways. Read More


WHITE PAPER: IBM

Six Capabilities of a Development Platform
In this thought leadership white paper, discover the six leading-edge capabilities and versatile tools needed to help ensure an accelerated return on investment and time to value for an application development environment. Read Now

WHITE PAPER: Tripwire

Where Compliance and Data Protection Overlap
Data breach detection takes too long. Often it is not a single event, but a series of minor events that combine to enable a major breach. This paper discusses the need for immediate detection and the ability to intelligently and automatically analyze the millions of changes and events as they occur in the infrastructure. Read More!

Fruit fly looks to be one good bug for computer networks
The simple yet sophisticated nervous system cells in the bodies of fruit flies are being used as a model that could make wireless sensor networks and other distributed computing systems work better. Read More

Will electronic toll systems become terrorist targets?
Weaknesses in 802.11p vehicular wireless networks could make them targets for terrorists seeking to wreak havoc on the nation's highways, according to a briefing scheduled this week at the Black Hat DC conference. Read More

Wi-Fi network designed to tackle Sundance crowds
When the annual Sundance Film Festival lands in Park City, Utah, the movers and shakers of Hollywood demand a lot more wireless capacity than the mountain town of 8,000 residents normally needs. Read More


WHITE PAPER: HP

A Necessity for the Public Sector
This paper highlights 2010 survey results and reveals the key issues facing these organizations including the serious challenge of managing unstructured data while ensuring security and providing transparency in government. Read More!

So you want to get started in Cisco certs -- now what?
You finally made the commitment to starting your Cisco certification journey, or at least you're leaning that way. Thousands of people start this journey every month, and they all have to get through some of the same basic decisions. What is the starting point? What Cisco certifications can I start with? What do I have to do to pass each? What specific steps, and tools, will I need? Read More

Military aircraft flying to all-fiber network gear
Looking to significantly reduce weight, improve on-board communications and make it easier to upgrade avionics, the US military is developing prototype phonic gear for use in all aircraft. Read More

Spectrum analyzer catches exam cheats in Taiwan
Police in Taiwan used a set of spectrum analyzers to catch at least three people suspected of cheating on an exam by monitoring them for mobile phone signals. Read More


WEBCAST: Riverbed

Accelerating Your Virtual Environment with WAN Optimization
Which applications in your virtual environment do you want to accelerate the most? This Webcast surveys the applications that suffer the most from latency and discusses the 3 root causes of poor wide-area application performance. See how you can realize dramatic improvements in replication in virtual machines. Learn More!

Only 10% of doctors using complete eHealth records systems, surveys find
The U.S. Centers for Disease Control reported preliminary data from two surveys conducted in 2009 and 2010 that show electronic health records are still not being used by the vast majority of the country's physicians. Read More

Symantec unveils backup and storage appliances
Symantec introduced its NetBackup and FileStore appliances with an eye toward offering customers choices in whether they want to mix and match software- and hardware-based backup and storage products according to business needs. Read More

IBM will not be a networking company
One of the topics that we frequently wrote about in 2010 was the ongoing coalescence of the IT industry around a few key players. We are going to use this newsletter to provide more insight into how one of the players, IBM, is likely to leverage its acquisitions to position itself in the IT market. Read More

Decoy networks, separation tactics part of AT&T security chief's infrastructure protection plans
As chief security officer at AT&T, Edward Amoroso has long observed how cyberattacks impact customer and service-provider networks. In his newly published book, Amoroso says it's time to unite to create the equivalent of a national cyber-protection shield to guard against attacks on industry and government networks by terrorists, state-sponsored attackers and plain old thieves. Read More

Survey on PCI: How it's impacting network security
A survey of 500 information technology professionals with responsibility to assure compliance with the Payment Card Industry (PCI) security standard shows just over half find it "burdensome but necessary" in their organizations and about a third see it impacting their virtualized network environments in particular in the future. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

12 geekiest snow and ice sculptures
Not all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.

2011's 25 Geekiest 25th Anniversaries
Our fifth annual collection of the year's "geekiest anniversaries" kicks off with The Mentor's "Hacker's Manifesto" and includes such memorable characters as Captain Midnight and Ferris Bueller, institutions the likes of the IETF and Spy magazine, and inventions like the Super Soaker and disposable camera.

MOST-READ STORIES

  1. Windows on verge of dropping below 90% market share
  2. Verizon iPhone antenna redesign may thwart 'death grip,' says expert
  3. Facebook, Google, Yahoo commit to 'World IPv6 Day' trial
  4. Apple is professional Linux
  5. Android OS in 2011: 12 developments to keep Apple nervous
  6. Microsoft guy slams "President of the United States of Google"
  7. Google pays record bounty for Chrome bug
  8. Facebook wants to issue your Internet driver's license
  9. Investment firm dumps Cisco stock over human rights issues
  10. Is this a BlackBerry "Dakota" I see before me?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: