Search This Blog

Monday, August 25, 2014

Yes, there's a tech bubble: Facebook's mobile ad success proves it

A review of Swing Copters: Under no circumstances should you play this game | Silver Peak looks to the clouds and redefines WAN Optimization

Network World Voices of Networking

Forward this to a Friend >>>


Yes, there's a tech bubble: Facebook's mobile ad success proves it
Despite gaudy numbers for Facebook's mobile business, spending on mobile ads may not be sustainable. Read More


WHITE PAPER: Riverbed Technology

Network Monitoring and Troubleshooting for Dummies
The Network Monitoring and Troubleshooting for Dummies Book introduces you to common network performance management (NPM) issues and give you a new way of looking at solving them. This perspective allows you to see your network from your users' point of view, namely, the services and applications they use and their experience with them. Learn More

WHITE PAPER: Equinix

How Network Connections Drive Web Application Performance
Users around the globe, on all sorts of devices, expect Web applications to function as seamlessly as desktop applications. This paper discusses the challenges and solutions for effectively delivering applications in today's global marketplace. View now

A review of Swing Copters: Under no circumstances should you play this game
It's like Flappy Bird, but even worse. Read More

Silver Peak looks to the clouds and redefines WAN Optimization
Last week, Silver Peak announced a new product called Unity that can be thought of as an intelligent WAN optimization "fabric" that enables network managers to track the location of cloud services and have a real-time "weather map" of Internet traffic to help find the optimum path for traffic flows. Read More

Why Microsoft needs to reveal Windows 9 sooner than later: The end of Windows 7
After October, there will be no way to buy a Windows 7 PC and nothing but Live Tiles on the horizon. Unless Microsoft, as widely anticipated, announces Windows 9. Read More

The Linux desktop-a-week review: Ubuntu Unity
I set out to use Ubuntu Unity for one full week, even if it killed me. Read More


WEBCAST: CA Technologies

Business-driven data protection
Setting up data protection infrastructures with your organizations' core mission or business in mind is key. In this webinar, the Arcserve team will offer insights and solutions to make data protection a strategic component of your business. Learn more!

Hacking traffic lights with a laptop is easy
Armed with a laptop, University of Michigan security researchers hacked nearly 100 wirelessly networked traffic lights and were able to change the state of the lights on command. Read More

Apple iWatch release may be pushed back to 2015
As any Apple critic will be quick to tell you, it's been a while since Apple has released a game-changing product. And despite mountains of cash that would make most other companies on the planet green with envy, some of these same critics are quick to proclaim that Apple's influence as a tech innovator is waning. Read More

New BYOD trouble ahead via Android for Work
The future should be looking more favorable for workplace Bring-Your-Own-Device, or BYOD, with Android's upcoming embrace. But is it really? Someone's forgotten something. Read More

The 6 best tablets for getting work done in 2014
Can you be productive with a tablet? You betcha, provided you buy the right one. Read More


WEBCAST: Bit9, Inc

Developing a Continuous Response Architecture
Compromise is inevitable and detection can be bypassed at will. This is largely because many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or use scans or signatures to detect, respond or prevent advanced threats in your environment. Learn More

Is Wi-Fi killing us...slowly?
What would it take to get you to stop using cellphones and WiFi completely? How about your kids getting cancer? Read More

Twitter tells tale of LinkedIn outage
Cause of weekend outage still a mystery. Read More

The Samsung Z is dead: Is Tizen next?
Just days after postponing the launch of its high-end Tizen phone, Samsung has scuttled the device all together, which begs the question of how long the Tizen OS itself has. Read More

Virtual Security Remains Anathema to Many Organizations
VMworld hype masks the fact that many enterprises remain wedded to security appliances and are only "toe-dipping" with virtual security appliances Read More

Ahead of VMWorld, VMware promotes Casado to lead NSX
Casado is now VMware's top SDN guru Read More

Windows Phone isn't dead, but it needs a new reason to live
As Microsoft chases the low-end phone market where Android already dominates, it could be neglecting one of its own core strengths: productivity. Read More


SLIDESHOWS

Top techs the CIA thinks are hot

Through its investment firm called In-Q-Tel, the CIA funds companies, mostly start-ups, to push forward technologies deemed useful to government intelligence agencies.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Does Microsoft Really Love Open Source?

2. Is Wi-Fi killing us...slowly?

3. A review of Swing Copters: Under no circumstances should you play this game

4. The Linux desktop-a-week review: Ubuntu Unity

5. The top 14 hidden features in Windows, iOS, and Android

6. Internet of Overwhelming Things

7. 2014's Hottest IT Certification

8. Why TCP/IP is on the way out

9. 11 Big Data Certifications That Will Pay Off

10. Ten tech products that died on arrival

JOIN THE IDG CONTRIBUTOR NETWORK

The IDG Contributor Network is a collection of blogs written by YOU -- leading IT practitioners -- about the technology, business opportunities and challenges you face everyday. We invite you to become a contributor or participate by joining the conversations your peers spark.

Apply now to become a member


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: