Wednesday, March 04, 2015

What happens inside Amazon when there’s a Xen vulnerability

  Backyard ice bar gets cooler with 3D printing | Momentum grows around Microsoft's Windows 10 for phones

 
  Network World Network/Systems Management  

What happens inside Amazon when there's a Xen vulnerability
Amazon Web Services last year was estimated by Gartner to be five times bigger than its next 14 competitors combined. That's a lot of virtual machines. And they all run on a customized version of the open source Xen hypervisor, so when the Xen code has a security vulnerability, that's a big deal for AWS. Read More
 


WHITE PAPER: Corvil

Network Data Analytics for Digital Business
All businesses are becoming digital businesses, leveraging the cloud, mobile, social media, the Internet of Things and big data for competitive advantage. Realizing the full benefits of these new platforms and technologies will depend on the efficiency of their IT operations. Learn More

WHITE PAPER: Corvil

Electronic Trading System Performance
This technical white paper reveals that total system latencies can vary by orders of magnitude because of the effects of dynamic congestion. Learn More

Backyard ice bar gets cooler with 3D printing
  We upped the tech quotient of our backyard ice bar with coasters made from 3D-printed forms. Read More
 

Momentum grows around Microsoft's Windows 10 for phones
Microsoft's Windows Phone 8 OS hasn't taken the world by storm, but its successor, Windows 10, is off to an encouraging start even before its release. Read More
 


WEBCAST: Corvil

Troubleshooting Network and Application Together
Watch this quick product demo to find out how the Corvil streaming analytics platform can be used to investigate slow response times. With just a couple of clicks, you will see how Corvil can find the root cause and whether the source of the slowdown was the network or within the application itself. Learn More

FREAK is another serious flaw in the web's encryption
Experts are warning of a serious security flaw that has apparently gone undetected for years and can weaken encrypted connections between computers and websites, potentially undermining security across the Internet. Read More
 

Judge says $415 million settlement in Silicon Valley hiring case is 'substantial'
A judge has approved a US$415 million settlement in a Silicon Valley employee hiring case, calling the amount "substantial" to settle claims that Apple, Google, Adobe Systems and Intel conspired not to hire each other's workers. Read More
 


WHITE PAPER: Corvil

Mitigating Technology Risk for Electronic Trading Systems
This is a must read if you are responsible for the health and performance of your company's electronic trading infrastructure and the billions of dollars on the line every day. Learn More

Twitter CFO floats idea of newspaper-like 'daily edition'
Here's an idea for the next version of Twitter that might crystallize the service's value: The Twitter Daily Favorite. Read More
 

DARPA to target cyber privacy protection tech
  The researchers at DARPA next month will go over a program the agency says will help develop the 'technical means to protect the private and proprietary information of individuals and enterprises.' Read More
 

IBM plugs OpenPower servers into SoftLayer cloud
  IBM will roll out a cloud computing service next quarter using OpenPower-based servers, continuing an effort to expand the market for Power processors and challenge Intel in hyperscale data centers. Read More
 

Alibaba enters US cloud market, signaling global ambitions
Chinese e-commerce giant Alibaba Group is making a push into the U.S. cloud computing market, where it's expected to run into competition from Amazon.com, Google and Microsoft. Read More
 

 

SLIDESHOWS

15 of the best Google Chrome experiments ever

A look at some of the coolest bits of Chrome experimentation out there, in honor of Google's 1000th Chrome experiment being published this week.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. The myth about how Amazon's Web service started

2. Aruba Networks is different than HP's failed wireless acquisitions

3. Best new Android & Windows smartphones at MWC 2015

4. HP will buy Aruba to bolster its wireless networking

5. Ultimate guide to Linux desktop environments

6. 11 technologies that tick off Linus Torvalds

7. 8 free Wi-Fi stumbling and surveying tools

8. IT certifications that deliver higher pay

9. Brocade acquires mobile SDN company

10. How Google avoids downtime


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment