Search This Blog

Tuesday, September 04, 2012

Enlisting the help of infrastructure to cope with the BYOD explosion

IBM pumps up high-end mainframe speed, capacity | Software that lies (so you don't have to!)

Network World Network Optimization

Forward this to a Friend >>>


Enlisting the help of infrastructure to cope with the BYOD explosion
Mobility is one of the key drivers of technology today, but now users are not only connecting corporate-issued laptops, but also a bevvy of bring-your-own devices. Over 80% of workers surveyed bring personal devices to work, and 80% of those users are connecting them to the corporate network for work-related activities. Read More


WHITE PAPER: HP

Bring Your Own Mobile Devices to School
In today's educational environments, more and more students, guests, and faculty are bringing in their own Wi-Fi devices into the school's network. This paper discusses the challenges and solutions IT administrators are facing and how to address the security and management of the multiple devices being introduced into the wireless/wired network. Learn more.

WHITE PAPER: Xirrus

Tablets in the Enterprise
Tablets are replacing laptops at lightning speed. Whether company-issued or part of the BYOD phenomenon, the increased use of smart devices has resulted in a dramatic shift in network traffic with an emphasis on wireless. This paper explains how to predict Wi-Fi demands and architect a best-fit wireless network strategy for your environment. Learn more.

IBM pumps up high-end mainframe speed, capacity
IBM today continued the evolution of its mainframe family by introducing a system it says is 25% faster and has 50% more capacity than the current high-end machine. Read More

Software that lies (so you don't have to!)
Mike Elgan uncovers a massive lies-for-sale industry in the mobile and social networking world. Read More

Dell: SDN won't turn enterprise switches into commodity gear for 3-5 years
Software-defined networking won't turn enterprise switches into an inexpensive commodity until three to five years from now, according to Arpit Joshipura, the former Force10 Networks executive who now manages Dell's networking products. Read More


WHITE PAPER: Blue Coat Systems

Optimize and Secure Cloud, SaaS, BYOD, and Social Media
Today's threat landscape has migrated to the web causing many security professionals to prevent direct Internet access at the branch. But with new cloud-based security solutions from Blue Coat you can re-architect your network to embrace the Internet – safely – and optimize application performance. Learn more.

How to watch football on the Internet
I'm not a big football fan, but like almost everyone from the United States, I have my particular favorites—the West Virginia University Mountaineers and the Pittsburgh Steelers--that I want to watch. Read More

Boot up showdown: Windows 8 vs Windows RT
We tested the boot up of a Samsung ATIV Tab running Windows RT and an ATIV Smart PC running Windows 8 at IFA. One got smoked. Find out which one and by how much. (Video content) Read More

Yes, Apple won. But what did it actually win?
Apple won a judgment of $1 billion in damages from Samsung. A billion dollars is a lot of money, but in context it is as if Steve Jobs's threat to "go thermonuclear" on Samsung has been delivered by Austin Power's nemesis Dr. Evil. Read More


WHITE PAPER: F5

Top Considerations When Choosing an ADC
The Application Delivery Controller (ADC) chosen as the foundation for a flexible, efficient application delivery strategy can significantly affect network performance, availability, and security while providing opportunities to add business value. Learn More!

Second Java zero-day found: Time to disable it, say experts
Companies that want to avoid becoming victims of the latest zero-day Java vulnerability are being advised to disable the software platform's browser plugin until a patch is available. Read More

How malware defeats strong security controls
It's widely acknowledged that the computer networks of organizations large and small are under sustained attack. As networks become more heavily and broadly used, the potential impact will continue to grow. Read More

How to catch a tumbling, aging satellite
How do you catch a speeding, tumbling, aging satellite? Very carefully. Levity aside, the question is central to the plan scientists at DARPA have for catching up to and grabbing old satellites in an effort to ultimately refurbish and reuse the systems. Read More

Cloud security company Zscaler attracts $38 million in funding
Cloud-security provider Zscaler Thursday announced it has received $38 million in venture-capital funding, naming Lightspeed Ventures as a strategic investor but not the other venture-capital partners involved in the round. Read More

Google should speed up Apps' enterprise social networking development
Google may be moving too slowly in building up Google Apps' enterprise social networking (ESN) features, at a time when this type of software has become a key component in workplace collaboration suites. Read More



SLIDESHOWS

Tech CEOs' first jobs: Licorice maker, housekeeper, scuba diver and more
Before their corporate jobs, many tech CEOs got their hands dirty, scrubbing oils stains off asphalt, cleaning bathrooms, and shoveling monkey cages. Here are their stories.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Hottest Android news and rumors for the week ending Aug. 31
  2. 10 Cisco executive departures over the past year
  3. Yes, Apple won, but what did it actually win?
  4. The security skills shortage is worse than you think
  5. Mysterious Wiper malware possibly connected to Stuxnet and Duqu, researchers say
  6. Windows 8 is awesome ...
  7. 18 great IT tools for Android
  8. 5 reasons Android users will switch to the iPhone 5
  9. Java security threats: What you need to know
  10. Toyota accuses fired worker of major security breach

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: