Search This Blog

Thursday, January 26, 2012

Wireless bandwidth: Are we running out of room?

  IBM, NEC team on OpenFlow | Apps eat more bandwidth than browsers
 
  Network World Network Optimization

Forward this to a Friend >>>


Wireless bandwidth: Are we running out of room?
Wireless bandwidth is like land in Manhattan -- it's extremely valuable because they're not making more of it. Read More


WHITE PAPER: Splice Communications

Offloading Telecom Delivers a Big Payback for IT
Inaccurate invoices, complicated contracts, slow provisioning and poor support from Telecom carriers wastes time, money and resources. Learn the difference a custom data network solutions provider can deliver. Read Now!

RESOURCE COMPLIMENTS OF: CloudPassage

CloudPassage
CloudPassage Halo is the award winning cloud server security platform that has everything you need to secure your cloud servers - from dynamic firewalls to intrusion detection, and account management. Halo is SaaS and installs in 5 minutes. Halo Basic is free for up to 25 servers. Try Halo

IBM, NEC team on OpenFlow
IBM and NEC have partnered to offer OpenFlow-based networking products to joint customers. Read More

Apps eat more bandwidth than browsers
As iPads, iPhones, Nooks, Kindles, and other mobile devices multiply like rabbits and join the established population of desktop and laptop computers, the nature of traffic to and from all device types is changing. The key reason for this change is that users are downloading more apps, which replace the browser for completing most tasks. Read More

Three warning signs of a user-unfriendly app
A user-friendly interface is paramount if you want employees and external users to adopt an enterprise application. But what, precisely, makes an app user-friendly? That's a complicated science, with detailed books and research papers devoted to it. But if your app has any of the following three elements, that's probably not a good sign. Read More


WHITE PAPER: Akamai Technologies, Inc.

Understanding Web Application Security
This paper examines current trends in Web application security, assessing the present threat environment as well as limitations in existing approaches to protection. Learn more

FBI seeking help to monitor social media
So the FBI is in the market for a technology partner that will allow it to monitor social networks? You mean they're not doing this already? Read More

Goal of new security service: More involvement from ISPs, carriers
New security analytics service purports to arm service providers with the information they need to keep their network traffic clean. Read More

The fine art of Fibre Channel troubleshooting
Troubleshooting Fibre Channel networks can be as much an art as it is a science, but there are some basic best practices you can follow to reduce the guessing and speed resolution. Here are 10 tips to help you get to the bottom of pesky problems. Read More


WEBCAST: Riverbed

5 Steps to Successful IT Consolidation
Mapping out a 5 step consolidation process can ensure that the goals of IT consolidation are achieved. Read this white paper to learn how to reduce IT management overhead, ease revision control, guarantee data security, scale systems more quickly and reduce server and software costs. Read More

No more historic SLA reports: Get it (and fix it) in real time
Businesses of almost all types are increasingly dependent on service providers for network connectivity that consistently delivers certain performance characteristics. In addition to basic service availability, these characteristics increasingly include peak, average and minimum bandwidth utilization, latency (delay) and latency variation (jitter), and packet loss -- all of which can affect operational efficiency and end user satisfaction. This is especially the case with Ethernet-based service offerings employing packet transport to deliver E-LINE services operating at speeds up to tens of gigabits per second. Read More

My thoughts on IBM, NEC, and OpenFlow
IBM and NEC announced this week that the two companies will work together to offer networking solutions based upon SDN and OpenFlow. IBM provides the switches which are integrated with the NEC Programmable Flow Controller. To me, this is bigger than just a press release and some joint marketing programs. Here's why. Read More

Enhance I/O in a virtualized environments using NIC partitioning
With virtualization comes an increase in the amount and complexity of I/O traffic. Network interface cad (NIC) partitioning enhances I/O performance in a virtualized environment, advancing hardware consolidation and flexible bandwidth provisioning for heightened IT agility. Read More

 
 
 

SLIDESHOWS

2012's 25 Geekiest 25th Anniversaries
Network World's 6th annual collection of the year's "geekiest anniversaries" this time includes the births of pioneering companies such as UUNet and NEXTEL; technologies like OS/2 and SPARC; television classics topped by "Star Trek: The Next Generation" and the first "Simpsons" shorts; disposable contact lenses; the first naked-eye supernova in four centuries; and, who could possibly forget The Woodstock of Physics?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Inside Apple's secret packaging room
  2. 2012's 25 geekiest 25th anniversaries
  3. Cloud activity to explode in 2012
  4. Google looks to speed up the Internet
  5. iPhone 5 rumor rollup for the week ending Jan. 20
  6. LTE spectrum: How much do the big carriers have?
  7. Fear the tablet: Cisco survey
  8. First look: Windows 8 breaks new ground
  9. U.S. government online security website hacked
  10. Stupid user tricks 6: IT idiocy loves company
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: