Search This Blog

Monday, November 19, 2012

Online Voting: A Challenge to the Tech Industry

  Why does packet loss destroy application performance over the WAN? | What to do when you need more Enterprise WAN bandwidth
 
  Network World Voices of Networking

Forward this to a Friend >>>


Online Voting: A Challenge to the Tech Industry
Whether who you voted for won or lost (and I do hope you voted), whether you live in a blue state or a red state, no matter your political beliefs, as Americans I think there is one thing we can all agree on. It is ridiculous that in this day and age people should have to stand on line for 4, 5 or more hours to cast a vote. Read More


WHITE PAPER: Avaya

Delivering game-changing productivity & dependability
By creating one contiguous, end-to-end Fabric, Avaya is empowering businesses to achieve unprecedented levels of infrastructure productivity, service agility, and network dependability, the very essence of the fast, flexible, and secure design aspirations. Read Now

RESOURCE COMPLIMENTS OF: AT&T

Voice Transformation: Taking the First Steps
Voice has been - and will continue to be - a foundational component in business communications. But the aging, disconnected voice infrastructures of today are doing more than just impeding productivity, they're impeding progress. Find out in this AT&T article how to transform voice communication in your enterprise today. Click Here

Why does packet loss destroy application performance over the WAN?
Before continuing on to cover which of the various technologies – those that are part of the Next-generation Enterprise WAN (NEW) architecture as well as others – addresses packet loss and how, I think it will be worthwhile to go a bit deeper into why packet loss has such a huge impact on application performance over the WAN in the first place. Read More

What to do when you need more Enterprise WAN bandwidth
Moving on in our coverage of which of the various technologies – including those that are part of the Next-generation Enterprise WAN (NEW) architecture, like WAN Optimization, WAN Virtualization and Read More


RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

RSA Buys SilverTail Systems: Great fit, tremendous upside
I recently scheduled a breakfast meeting in November with an industry buddy who is an executive at RSA. When I first reached out to him late this past summer, I really wanted to arrange this meeting to suggest that RSA take a look at SilverTail Systems, a web fraud detection and security software provider I know quite well. Looks like I'll have to find some other topics for conversation because... Read More

HP refuses to support Windows 7 downgrades
This could be the start of a very bad precedent, or HP shooting itself in the foot once more after taking so many steps to get its act together. Read More


RESOURCE COMPLIMENTS OF: Computerworld Honors program

Computerworld Honors Program Call For Entries: Deadline 1/18
Computerworld Honors Program nominations will be accepted until January 18, 2013, with the Awards Ceremony and Gala Evening taking place on June 3rd in Washington, DC. Entries selected will have their case studies published in the Honors Global Archive and receive complimentary admission to the Gala program. Submit your entry now!

Coke hacked by Chinese and kept it a secret
"I'd like to buy the world a Coke and keep it company"... it's the real thing according to an old musical slogan . . . and it was the real thing when Coca-Cola was targeted by Chinese hackers in 2009. Once upon a time, Coca-Cola wanted "perfect harmony" and even cokes for everyone in the world, including polar bears and penguins, but that meant sharing soft drinks and not company secrets. Read More

The Long Tail of Virtualization
Virtualization has become so common in our IT infrastructure that we take it for granted. But it wasn't that long ago when VM servers were not as common in our data centers or even on our desktops. I remember in security when best practices were never to run a security function in a virtual environment for fear it could be compromised. But all of that has changed over the years. Virtualization is well... Read More

 
 
 

SLIDESHOWS

How to set up secure Wi-Fi for BYOD
QuickConnect and XpressConnect offer cloud-based methods to automate BYOD client configuration and connection.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Palo Alto Networks founder: Our competitors are on 'death row'
  2. Get a grip: 18 winter gloves that work with smartphones, tablets
  3. Hottest Android news and rumors for the week ending Nov. 16
  4. General David Patraeus used clever Gmail trick during affair
  5. IBM kills Lotus brand, readies beta of Notes/Domino Social Edition
  6. The ugly, scary year in Apple iPhone and iPad thefts
  7. 2013 IT salaries: 15 titles getting the biggest pay raises
  8. Amazon: Our cloud powered Obama's campaign
  9. $1.5 million iPad heist reported at JFL airport
  10. Is Surface Pro manufacturing set to start in December?
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: