Search This Blog

Thursday, March 26, 2015

DSL reaches speeds of 170 Mbps

10 Android devices that were too weird to succeed | Despite its design, One M9 unlikely to be HTC's knight in shining armor

Network World Cool Tools

DSL reaches speeds of 170 Mbps
While those of us interested in obtaining the fastest download speeds possible closely watch, and then seize on, fiber and upgraded cable rollouts, salivating over speeds of 100 Mbps and up, it's easy to forget the many people still can't get cable and rely on lowly, twisted-pair DSL. Read More


WHITE PAPER: Adallom

Adallom for AWS
The Adallom cloud application security platform for AWS allows IT organizations to: enable secure access of the AWS administrative console for the right users, address security and compliance mandates that requires attestation and reporting of AWS activities, and govern and address risky behaviors. View now

WHITE PAPER: Fortinet

Threat Brief: A Detailed Analysis of Targeted Email Attacks
Curious about how email attacks can still bypass established defenses and, more importantly, what you can about it? View Now>>

10 Android devices that were too weird to succeed
Taking risks on new ideas is great, but sometimes they go too farIn less than a decade Android has gone from an ecosystem consisting of only a couple of similar devices to one of unfathomable variety. Among the thousands of Android phones and tablets that have sprung into being over the years, there are some that stand out as particularly strange.To read this article in full or to leave a comment, please click here Read More

Despite its design, One M9 unlikely to be HTC's knight in shining armor
The One M9 may be a knockout, but it’s not likely to save HTC. The device looks similar to its predecessor at a time when competitors have multiplied and stepped up their game, making it even harder for the struggling company to make a mark in the high-end segment.Design has, since the launch of the first One model, been HTC’s biggest strength. The One M9, however, doesn’t have the same wow factor as its predecessors since the design is no longer as groundbreaking.“To most consumers the One M9 will look almost identical to the One M8, which preceded it, and that’s a big challenge for HTC,” said Ben Wood, chief of research at CCS Insight.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Fortinet

A New Class of Firewall – Internal Network Firewall (INFW)
Learn about how the new INFW approach delivers continuous visibility and protection of the network from the inside out shortening the window of exposure and limiting potential damage. Get the details in this white paper. View Now>>

Imagination floats sub-$100 MIPS tablet running Firefox OS
With Android and iOS dominating the tablet market, Mozilla’s Firefox OS hasn’t had much of a look in. It’s now getting a bit of help from ARM rival Imagination Technologies, which has ported a version of Firefox to a prototype tablet based on its MIPS chip architecture.The tablet is a reference design built by China’s Ingenic and it’s designed to be priced under $100. It can run either Android 4.4, known as KitKat, or an experimental version of the Firefox OS, Imagination said in a blog post.It’s designed to help Imagination and Mozilla target the market for very low cost tablets sold in emerging markets like Brazil and India.To read this article in full or to leave a comment, please click here Read More

INSIDER
Mobile security: iOS vs. Android vs. BlackBerry vs. Windows Phone
Apple's iPhone and iPad long ago pushed out the BlackBerry as the corporate standard for mobile devices, in all but the highest-security environments. Google -- whose Android platform reigns outside the corporate world -- is now trying to push out Apple, with a new effort called Android for Work. And Samsung is upping the game with a new version of its own Android security suite, Knox.To read this article in full or to leave a comment, please click here(Insider Story) Read More


WHITE PAPER: Scribe Software

10 Best Practices for Integrating Data
Data integration is often underestimated and poorly implemented, taking significant time and resources. Yet, it continues to grow in strategic importance to the business, as customer data and touch points grow with the emergence of cloud, social and mobile technologies. Download your copy today. Learn More

Worst data breaches of 2014
Trending up?Image by Benjamin Lawless The Identity Theft Resource Center found 85,611,528 records exposed last year in the 783 breaches. The list unfortunately just seems to grow with every update. 2015 is proving to be no different with the Anthem and Premera breaches occurring. But before we move on to this year's compromises, here are the greatest number of records breached from lowest to highest from 2014.To read this article in full or to leave a comment, please click here Read More

The data breach quiz: What have we learned?
Lessons to be learnedImage by David GoehringTo read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

7 things we want to see in the Surface Pro 4

Perhaps a "Surface Pro 4" will debut at the same time or soon after Windows 10 launches. Here's what we'd like to see in the Surface Pro 4.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Meet the White House's new open source-happy IT director

2. Linux users alarmed over Windows 10 lockout

3. 'When will IPv4 become obsolete?'

4. Mobile 'sextortion' schemes on rise, Trend Micro reports

5. Seven killer Linux apps that will change how you work

6. Hot IT skills that will get you hired and well-paid

7. How Congress enables fraudulent TurboTax e-filing

8. Stallman joins the Internet, talks net neutrality, patents and more

9. Not your father's computer science building

10. 12 free cloud storage options


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cool_tools_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: