Monday, April 29, 2013

Directly connected to the Internet of Things

  Hacktivists take on 'Olympus Has Fallen' scare tactics style | Verizon report: China behind 96% of all cyber-espionage data breaches
 
  Network World Voices of Networking

Forward this to a Friend >>>


Directly connected to the Internet of Things
Last week here in Backspin I discussed how real-world "things" that aren't easily augmented with digital instrumentation, such as bicycles, cars and even dogs, can be indirectly connected to the Internet of Things (IoT) using physical ID tags and online proxies. This is, as I pointed out, a powerful concept. Read More


WEBCAST: Riverbed Technology

Eliminate Network Finger-Pointing
Cascade Demo: With Cascade, you get visibility into network optimization and analysis, application performance management, IT consolidation, and security. Watch as Jack, the manager of the network team, deals with user complaints about application performance. See how he uses Riverbed Cascade to solve them. Learn more!

Hacktivists take on 'Olympus Has Fallen' scare tactics style
Twitter is a great place if you want news that is so red-hot off the press that the e-ink is still wet. But with the likes of the Syrian Electronic Army hijacking Twitter accounts and tweeting disastrous fake news as if Olympus Has Fallen is a reality and not a movie, Twitter is finally going to implement two-factor authentication. Read More


WHITE PAPER: Netscout Systems Inc.

Good APM Practices Get Results
According to NetForecast's survey, enterprises with application performance management (APM) best practices benchmark scores above six on a ten-point scale experience 75% better results in critical areas. This research paper reveals the survey results as well as discusses the best practices for APM. Learn More.

Verizon report: China behind 96% of all cyber-espionage data breaches
Verizon's 2013 Data Breach Investigation Report is out and includes data gathered by its own forensics team and data breach info from 19 partner organizations worldwide. The report covers about 621 confirmed breaches and about 47,000 security incidents that occurred in 2012. Security incidents do not necessarily mean the attackers were able to breach an organization and could include DoS attacks. Read... Read More


WHITE PAPER: VMware, Cisco and NetApp

Oracle RAC Built on FlexPod with VMware
This technical white paper for Database Administrators (DBA) and Data Architects demonstrates how enterprises can apply best practices to deploy Oracle Database 11g R2 GRID Infrastructure with RAC option. Read Now!

Bringing the benefits of SDN to the enterprise (Hint: It's not SDN). Breaking down VMware's talk at ONS
Read More

Life in a Dual Stack World
Last week was the 2013 North American IPv6 Summit conference. This was the 6th year of the IPv6 conference held in Denver, CO. One of the items that all attendees received at the registration booth was an IPv6 Buddy keypad. This got people thinking about what other changes we might expect to experience as we move into a dual-protocol Internet world. Picture of my new little IPv6 Buddy. Read More

Post Boston: Privacy advocates warn about coming tsunami of surveillance cameras
In The Dangers of Surveillance, Neil Richards, law professor at Washington University in St. Louis, made a case for legally recognizing why surveillance is harmful. Read More

 
 
 

SLIDESHOWS

25 weirdest things in the 'Internet of Things'

The Internet is slowly creeping into every part of our lives, so much so that it's becoming easier to look around the house and find objects that can be connected to the Internet.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. A vendor-independent comparison of NoSQL databases

2. Will we see Key Lime Pie at Google I/O after all?

3. Windows 8 update: Transition from Android to Windows Phone made easier

10. SDN market about to explode

9. Apple's Cook resets 3 popular, and wrong, Apple rumors

6. DHS use of deep packet inspection technology raises serious privacy questions

5. Apple WWDC sells out in 2 minutes, first tickets on eBay less than 1 hour later

4. Extreme Networks replaces its CEO again

7. Top 10 programming skills that will get you hired

8. Cisco nemesis: Huawei retreating from the U.S.

 

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment