Monday, December 23, 2013

When bad things happen to good apps, Part 1

2014 tech industry conferences and events for enterprise network pros | Wireless: Is Radical Innovation Still Possible?

Network World Voices of Networking

Forward this to a Friend >>>


When bad things happen to good apps, Part 1
There are fewer disappointments worse than getting hooked on a piece of software and then, with one revision, seeing everything go wrong. Microsoft did that to us last year with Windows 8, and in 2013, I'd say Tune-Up Media takes the prize for the most fouled-up software of the year. Read More


WHITE PAPER: Limelight Networks

Web Site Performance for the Speed of Business
IT organizations must look beyond raw network speed to increase website performance and deliver the superior online user experiences that drive business. Web performance is a multi-layered problem, encompassing reliability, scalability and mobile reach as well as speed. Learn More

WHITE PAPER: Attachmate

Why your existing solution might not be adequate
To meet the demands of today's business landscape, IT staffs must take steps to secure and integrate their information assets, while satisfying compliance mandates and optimizing corporate efficiency. This white paper presents managed file transfer (MFT) as a way to meet corporate information and data management requirements. Read More

2014 tech industry conferences and events for enterprise network pros
I've begun cobbling together a running timeline of conferences and events of interest to enterprise network pros (with a bit of consumer stuff tossed in, too). Feel free to touch base regarding events I'm missing here. (I'm using Knight Lab's timeline tool, by the way, to create this timeline) Read More

Wireless: Is Radical Innovation Still Possible?
I spoke this week with a senior executive of wireless technology startup MagnaCom a company that made some pretty impressive claims with their announcement of Wave Modulation, or WAM. Among those claims are that WAM offers an additional 10 dB of processing gain over 4096QAM (quadrature amplitude modulation), a high-end version (802.11ac, for example, uses only 256QAM) of the current standard of modulation... Read More

Privacy plays an important part in cloud predictions for 2014
Privacy plays a major role when it comes to 2014 cybersecurity predictions for the cloud. Read More


WHITE PAPER: CDW

Software Asset Management: Practices for Success
This white paper discusses best practices that can dramatically increase your success rate of a SAM deployment. Make sure and follow these steps and verify that your SAM toolkit has the necessary functionality to keep your organization steps ahead of the competition -it's a long term investment. Read Now

Enterprise Organizations Identify Incident Detection Weaknesses
In the past, many large organizations spent about 70% of their security budgets on prevention and the remaining 30% on incident detection and response. Prevention is still important but given the insidious threat landscape, enterprises must assume that they will be breached. This means that they need the right processes, skills, and security analytics to detect and respond to security incidents effectively,... Read More

Security Threat Landscape: Predictions for 2014
Welcome to another edition of "Security Threat Landscape", a joint production between Network World and Fortinet. Keith Shaw and Derek Manky discuss some of the latest security threats via this monthly video podcast. This month, Derek rolls out some of his security predictions for 2014. Read More

IBM: Smart machines set to rule the world
IBM today took the wraps off of its eight annual "IBM 5 in 5" appraisal of the key technologies that could change high-tech life in the coming five years. Perhaps not surprisingly Big Blue this year says future tech developments will revolve around cognitive or smart learning systems that will learn, reason and involve human interaction like never before. Read More


WHITE PAPER: Limelight Networks

Pitfalls To Avoid In Combining Acceleration Technologies
This May 2013 Forrester Research, Inc. report looks at the impact of website performance on customer satisfaction and revenue, and why meeting high expectations is more complex than ever. Learn More

Looking for Access? Try the iPass Hotspot Finder
I've been playing with Hotspot Finder from iPass, which, as you might already be guessing, helps users find iPass' APs, which the company bills as the world's largest commercial Wi-Fi network. Read More

Help make DevOps better
DevOps is an area where people still spend a decent amount of time wrapping their head around exactly what it means, what it does and who does it. I personally don't think it is all that mysterious, but it is always good to find our more. Puppet Labs last year conducted a survey that drew over 4,000 respondents. Read More

Bruce Schneier leaving 'security futurologist' position at telco employer BT
What does the future hold for security and privacy expert Bruce Schneier after parting ways with the UK telecommunications company BT Group? It's where Schneier was employed for eight years as a security futurologist. Schneier said of his future plans: "Answer cloudy, ask again later." Read More

Inside Dropbox's plans for enterprise domination
Last week, Dropbox announced a deal calling for Dell's global sales team to sell its Dropbox for Business cloud-based storage and file-sharing services, with or without Dell Data Protection encryption, and for Dell to pre-install Dropbox on all its PC and tablets. Read More

Addressing advanced malware in 2014
In the cybersecurity annals of the future, 2013 may be remembered as the year of advanced malware. Yes, I know that malware is nothing new and the term "advanced" is more hype than reality as a lot of attacks have involved little more than social engineering and off-the-shelf exploits. That said, I think it's safe to say that this is the year that the world really woke up to malware dangers... Read More


SLIDESHOWS

Avaya builds massive Wi-Fi net for 2014 Winter Olympics

BYOD for 30,000 people creates extraordinary demands on the network.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Target says 40 million cards likely skimmed in security breach

2. The weirdest, wackiest and coolest sci/tech stories of 2013

3. What Microsoft did right and wrong in 2013

4. Frustrated users complain about SkyDrive problems after Windows 8.1 update

5. New DDoS malware targets Linux and Windows systems

6. University of Florida gets 100Gbps link to Internet2, upgrades campus research net to 200Gbps

7. Microsoft warns customers to update to Windows 8.1 final or face ruin

8. Cisco teams with VMware, Citrix to counter Amazon's new cloud-based desktop

9. 8 products you should not rush to upgrade

10. FIRST LOOK: Gigabit Wi-Fi adapters


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment