Monday, December 16, 2013

FIRST LOOK: Gigabit Wi-Fi adapters

Anonymous engineers claim BT gives spies backdoors to customer data | Inside Dropbox's plans for enterprise domination

Network World After Dark

Forward this to a Friend >>>


FIRST LOOK: Gigabit Wi-Fi adapters
New 802.11ac USB-based adapters allow users to speed up Wi-Fi links on existing devices Read More


WHITE PAPER: Limelight Networks

Web Site Performance for the Speed of Business
IT organizations must look beyond raw network speed to increase website performance and deliver the superior online user experiences that drive business. Web performance is a multi-layered problem, encompassing reliability, scalability and mobile reach as well as speed. Learn More

WHITE PAPER: Limelight Networks

7 Principles to Improve Web Site Availability
Users hate to wait so when your web site doesn't respond the way visitors expect, your business suffers. This guide offers strategies for scaling your web infrastructure to meet web availability and performance SLAs, enhancing both speed and performance (there is a difference), and delivering superior user experience on any device, in any location. Learn More

Anonymous engineers claim BT gives spies backdoors to customer data
Carrier BT provides the British intelligence agency GCHQ and its American counterpart the NSA with direct access to customer data through the Internet modems it supplies, claims a 50-page document posted anonymously on the Cryptome site today. Read More

Inside Dropbox's plans for enterprise domination
Last week, Dropbox announced a deal calling for Dell's global sales team to sell its Dropbox for Business cloud-based storage and file-sharing services, with or without Dell Data Protection encryption, and for Dell to pre-install Dropbox on all its PC and tablets. Read More

US NSA debates amnesty for Edward Snowden
The person running a U.S. National Security Agency task force to assess the damage of the leaks by Edward Snowden told a TV network that granting him amnesty is "worth having a conversation about." Read More

Attackers exploited ColdFusion vulnerability to install Microsoft IIS malware
Attackers exploited a vulnerability in Adobe ColdFusion to install data-stealing malware that works as a module for Microsoft's Internet Information Services (IIS) Web server software. Read More

Using SDN to Create a Packet Monitoring System
Because of the limitations of SPAN/monitor ports on switches, organizations have turned to using taps and packet monitoring switches. These solutions can be expensive which has lead companies to look for alternatives. Establishing a packet monitoring system is one of the use cases for Software-Defined Networking (SDN). This solution uses lowe Read More

Avaya builds massive Wi-Fi net for 2014Winter Olympics
BYOD for 30,000 people creates extraordinary demands on the network Read More

2013 computer crime blotter
Prisons around the world this year made way for techie criminals alongside the more garden variety murderers, thieves and schemers. Read More

Lulzy Christmas: Hackers buy presents for the poor with gov't officials' credit cards
While there's nothing quite like the warm and fuzzy feeling of giving gifts to the less fortunate, TeamBerserk hacktivists are donating "thoughtful gifts" that are paid for with credit cards belonging to naughty government officials, politicians and corporations. Read More

Coming in 2014: MacBooks as fast as data center servers
DRAMeXchange expects second-generation PCIe to replace SATA III in servers and higher-end laptops as the interface of choice for manufacturers, including Apple. Read More

Hadoop gets native R programming for big data analysis
Sensing a growing interest in big data-style analysis, software provider Revolution Analytics has updated its flagship package of R statistical functions so it can be run with the Hadoop data processing platform. Read More

Microsoft era ending at Juniper
So it appears the Microsoft-style software emphasis and strategy for growth at Juniper is ending. With this week's sudden resignation of software chief Bob Muglia and the year-end retirement of CEO and fellow Microsoft alum Kevin Johnson, it's back to the hardware future at Juniper. Read More


SLIDESHOWS

Avaya builds massive Wi-Fi net for 2014 Winter Olympics

BYOD for 30,000 people creates extraordinary demands on the network.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Lulzy Christmas: Hackers buy presents for the poor with gov't officials' credit cards

2. iPhone 6 rumor rollup for the week ending Dec. 12

3. Avaya builds massive Wi-Fi net for 2014 Winter Olympics

4. The worst IT project disasters of 2013

5. 2013 computer crime blotter

6. Blazing Samsungs, or how not to handle a product return

7. First Look: Gigabit Wi-Fi adapters

8. Switch to open source successfully completed, city of Munich says

9. A clear-eyed guide to Android's actual security risks

10. 10 Linux distros to watch in 2014


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: