Thursday, August 21, 2014

Sprint's cut in data prices won't help its network woes

Hacking traffic lights with a laptop is easy | Linux Foundation to offer new certification for IT workers

Network World Network Optimization

Forward this to a Friend >>>


Sprint's cut in data prices won't help its network woes
Sprint's new lower-priced shared data plan sounds ambitious, but analysts say it doesn't go far enough and won't address the carrier's network performance sore spot. On top of that, some analysts say that carrier-revenues overall could drop in the current price war, cutting into network technology advancements for all the major carriers over the long run. Read More


WHITE PAPER: BMC Software

Guide to Managing and Lowering Mainframe Software Charges
Monthly license charges (MLC) are rising by 7% or more each year, and account for 30% of total mainframe costs. Yet managing MLC costs is an inexact science. This best practice guide provides a step-by-step process to reduce mainframe MLC costs up to 20% without compromising business critical services. Learn More

WHITE PAPER: Equinix

How Network Connections Drive Web Application Performance
Users around the globe, on all sorts of devices, expect Web applications to function as seamlessly as desktop applications. This paper discusses the challenges and solutions for effectively delivering applications in today's global marketplace. View now

Hacking traffic lights with a laptop is easy
You've seen traffic lights hacked in movies like Live Free or Die Hard or The Italian Job. If you are gamer, then you might have "hacked" traffic lights in the video game Watch Dogs to cause epic wrecks and allow you to escape the cops. But now security researchers have hacked traffic lights in real life and say it's easy to do. Read More

Linux Foundation to offer new certification for IT workers
With an eye toward deepening the global Linux talent pool, the Linux Foundation today announced that it will offer two new certifications for engineers and administrators. Read More

FCC allowed to question AT&T, Verizon on business broadband pricing
The U.S. Federal Communications Commission has the green light to collect new data on the pricing of so-called special access services, the middle-mile network services used to deliver business broadband and mobile service backhaul. Read More


WEBCAST: IBM

Harness the Big Four – Cloud, Mobile, Social, and Analytics
Register today to attend this webcast, and see examples of how The U.S. Tennis Association, Wimbledon and U.S. Golf Association are using the right IT infrastructure to deploy Cloud and Big Data & Analytics. Learn More

Installing Ubuntu on an old netbook with hair tearing and profanity
After a few extremely frustrating hours trying to install Ubuntu 14.04.1 LTS, the latest version of the Ubuntu operating system for desktop PCs and laptops, on an older netbook style laptop (one with only USB ports) I finally succeeded. Read More

Ahead of VMWorld, VMware promotes Casado to lead NSX
Casado is now VMware's top SDN guru. Read More

Researchers build security framework for Android
University researchers have modified the Android operating system to let developers plug in enterprise-class security enhancements that would normally require overhauling a mobile device's firmware. Read More


WEBCAST: IBM

Leveraging Software-Defined Flash to Drive Your Business
With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency of SDS and the speed of flash storage all at once. Learn More

Start-up offers up endpoint detection and response for behavior-based malware detection
Start-up SentinelOne is offering security software for behavior-based malware detection intended to augment, not replace, the type of full anti-virus endpoint protection suites that typically also have signature-based defense, a firewall and other features. Read More

Review: Can Tablo help you cut the cable TV cord?
For TV viewers looking to cut ties with their cable or satellite provider, the Tablo box can get them started with its ability to provide DVR functionality and grab free, over-the-air HDTV signals for live viewing or recording for later. Read More

Start-up fights ambush attacks on SDN, virtual machine networks
Start-up GuardiCore is working on a security product that works through a 'honeypot' approach to detect and block stealthy attacks on software-defined networks (SDN) and multi-vendor virtual-machine infrastructures for enterprise customers as well as cloud-service providers. Read More


SLIDESHOWS

Top techs the CIA thinks are hot

Through its investment firm called In-Q-Tel, the CIA funds companies, mostly start-ups, to push forward technologies deemed useful to government intelligence agencies.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Munich reverses course, may ditch Linux for Microsoft

2. 5 cool new security research breakthroughs

3. Top 5 things to watch for at VMWorld 2014

4. The Samsung Z is dead: Is Tizen next?

5. 2014's Hottest IT Certification

6. New Microsoft same as the old Microsoft

7. The 5 most anticipated smartphone launches coming in September

8. Why TCP/IP is on the way out

9. Best and funniest Apple iWatch design concepts

10. Google wraps its trans-Pacific fiber cables in Kevlar to prevent against shark attacks

JOIN THE IDG CONTRIBUTOR NETWORK

The IDG Contributor Network is a collection of blogs written by YOU -- leading IT practitioners -- about the technology, business opportunities and challenges you face everyday. We invite you to become a contributor or participate by joining the conversations your peers spark.

Apply now to become a member


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment