Search This Blog

Tuesday, April 22, 2014

Where's my gigabit Internet, anyway?

Cisco announces security service linked with new operations centers | Juniper opens arms to OpenDaylight

Network World Network Optimization

Forward this to a Friend >>>


Where's my gigabit Internet, anyway?
For Americans used to roughly 10Mbps broadband connections, the idea of gigabit Internet can feel a little like science fiction. Streaming 4K video without hiccups? Enormous file downloads happening in seconds? Oh, sure. Read More


WHITE PAPER: Spirent

Hardware Test is the Key to Accurate Network Testing
Surprisingly, many organizations are not adequately testing their networks. Network testing is crucial for any IT organization that wants to ensure availability, security and performance of applications and services running on their networks. Learn More

WHITE PAPER: Instart Logic

Overcome Web Performance Obstacles for SaaS Applications
Learn about the technology that powers and speeds up the web experiences of hundreds of thousands of enterprise SaaS application users, over Instart Logic's innovative global network. Learn More

Cisco announces security service linked with new operations centers
Cisco today announced Managed Threat Defense, a set of security services for the enterprise that Cisco is providing through two new operations centers to remotely support intrusion-detection, incident response and forensics, among other services. Read More

Juniper opens arms to OpenDaylight
Juniper has submitted a plugin for its open source SDN controller to the OpenDaylight Project, an effort Juniper's a member of but has publicly dismissed. Read More

BMC automates the mainframe change ticket
Mainframe operators using BMC software may now be able to enjoy the speedy, devops-style development pace that is quickly becoming the norm for customer-facing mobile applications and Internet services. Read More


WHITE PAPER: HP and Intel® Xeon® processors

Bridging the IT Gap
To overcome today's IT management gap, your organization needs a fresh approach to infrastructure management. There are three key requirements for this new approach to IT management. In this paper, you'll find that three key requirements create the foundation for a management environment that is poised to meet the challenges of a new era in IT. Learn More

Reddit penalizes technology subreddit for censoring headlines about 'spying', 'NSA'
I don't visit Reddit every day, but when I do, I check out /r/technology. Over the weekend, I wondered why 'technology' was no longer listed across the top of Reddit. Read More

AT&T's expanded 1 Gbps fiber rollout could go head to head with Google
U.S. broadband giant AT&T could roll out 1Gbps fiber-optic service to up to 21 new metropolitan areas, including Atlanta, Chicago, Los Angeles, San Francisco and San Jose, California, the company said. Read More

Verizon: Web apps are the security punching bag of the Internet
Verizon today issued its annual data-breach investigations report, a study of what happened in 1,367 known cases across dozens of industries in 95 countries last year, and the most common form of attack was breaking in through Web applications. Read More


WHITE PAPER: HP and Intel®

Management Insight Technologies
Understanding evolving needs of IT infrastructure decision-makers from enterprise organizations in the converged infrastructure market and how CI vendors are meeting those needs. Learn More>>

CloudFlare launches bug bounty program
CloudFlare started a bug bounty program, joining a host of companies that are turning to independent security researchers to spot bugs in their network. Read More

INSIDER
3D printing will transform these five industries
The 3D printing world is currently in limbo – the technology is developed enough to attract some attention in the real world, but not enough to bring about change on a substantial scale. New stories emerge everyday of 3D printing breakthroughs, be it through research or the development of actual products. Read More

12 ethical dilemmas gnawing at developers today
The tech world has always been long on power and short on thinking about the ramifications of this power. If it can be built, there will always be someone who will build it without contemplating a safer, saner way of doing so, let alone whether the technology should even be built in the first place. The software gets written. Who cares where and how it's used? That's a task for somebody in some corner office. Read More

Even the most secure cloud storage may not be so secure, study finds
Some cloud storage providers who hope to be on the leading edge of cloud security adopt a 'zero-knowledge' policy in which vendors say it is impossible for customer data to be snooped on. But a recent study by computer scientists at Johns Hopkins University is questioning just how secure those zero knowledge tactics are. Read More


SLIDESHOWS

10 Big Data startups to watch

These 10 startups to watch were chosen based on third-party validation, experience, and market potential.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Whatever happened to the IPv4 address crisis?

2. California bill proposes mandatory kill-switch on phones and tablets in 2015

3. ATM malware, controlled by a text message, spews cash

4. 16 weirdest places you'll find Linux

5. 28 facts about pi that you probably didn't know

6. 12 free cloud storage options

7. Top 20 colleges for computer science majors, based on earning potential

8. 8 free Wi-Fi stumbling and surveying tools

9. IRS misses XP deadline, pays Microsoft millions for patches

10. How to change Windows 8.1 to local account with no Microsoft email account required


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: