Monday, April 02, 2012

Broadband infrastructure: Time for real policy

Mobile Device Security Reality | Will RIM ever recover? Prognosis: Negative.

Network World Voices of Networking

Forward this to a Friend >>>


Broadband infrastructure: Time for real policy
The U.S. broadband infrastructure is a monopolistic mess Read More


WHITE PAPER: Enterasys

Simplifying Network Management with Enterasys
Read this whitepaper to learn about OneFabric from Enterasys. See how it can address the entire network infrastructure as a single system rather than addressing a network as many different parts and pieces. It is a modular, scalable system that can be implemented along with existing projects and budget cycles. Learn More.

WHITE PAPER: IBM

Best Practices to Architect Applications in the IBM Cloud
It's clear that cloud environments are a great way to deliver software—but what are the best ways to use it really well? Read this report to learn how to leverage cloud environments, design applications for successful cloud-based deployments and safeguard your virtual machines. Read Now

Mobile Device Security Reality
You've heard the same things I have: "You can't control mobile device proliferation." "Most large organizations are establishing BYOD problems." "You need to let new employees work with their own devices and use social networking sites if you want to recruit them." Poppycock, Rubbish, Nonsense, I say. Read More


WHITE PAPER: Radware

Protecting Critical DNS Infrastructure: What You Should Know
DNS is a critical Internet infrastructure as each web transaction involves a DNS service. An attack that disrupts these services will halt all other Internet-based services. Current infrastructure is vulnerable despite carrier and ISP protections. So what can you do to protect your business? Learn More

Will RIM ever recover? Prognosis: Negative.
Well, it looks as though Research in Motion has now officially entered the "fire-everyone-and-hope-for-the-best" phase. Former co-CEO Jim Balsillie was the biggest head to roll today but he was hardly alone. Via Crackberry, here's the full scope of the carnage: Read More


WHITE PAPER: Wildpackets

Essentials for Assuring Network and Application Performance
As a network professional, it's not enough to be focused on network failures. You need to be able to assure network and application performance. Read this white paper to evaluate performance monitoring and management initiatives and eliminate blind spots. Learn More

And now, the final nail in WiMAX's consumer handset coffin
Back in the heady days of 2008, Sprint had a dream: It was going to level the playing field with rivals Verizon and AT&T by being the first carrier to deploy mobile WiMAX and thus deliver the fastest mobile Internet experience in the country. Read More

Hotel wireless not up to IETF standards, so ...
It's far and away the most-read story on our site today, so I wanted to make sure that you don't miss it. Writes my Network World colleague John Cox: What happens when a bunch of IETF super nerds show up in Paris for a major conference and discover their hotel's Wi-Fi network has imploded? They give it an Extreme Wi-Fi Makeover. Not only should the hotel managers be thankful for all the technical help,... Read More

Microsoft and Apache: When Pigs Fly
Big news today around Microsoft releasing even more software from its stack as open source. Specifically Microsoft is open sourcing ASP.NET MVC 4, ASP.NET Web API, ASP.NET Web Pages v2 (Razor) all with contributions. Frankly, in and of itself I don't think this is such big news. Read More



SLIDESHOWS

20 iPad business apps every CIO should want
iPad apps for sales forces, IT departments and more.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Uncle Sam wants to hack foreign video consoles and scrape gamers' data
  2. Cisco forces manufacturer's hand; adopts Microsoft Lync
  3. 10 fun (and safe) ways to pretend to be a hacker
  4. How open source powers a Battlestar Galactica-inspired flight simulator
  5. Dissecting Cisco's FabricPath Ethernet technology
  6. IETF attendees reengineer their hotel's Wi-Fi network
  7. AOL unplugs 10,0000 servers, saves $5 million
  8. Google says 'Go' to new programming language
  9. Threat of a bullet in the face keeping cybercrooks cautious
  10. Critical milestones in Cisco history

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: