Tuesday, September 23, 2014

IEEE standards group wants to bring order to IoT

FCC questions how to enforce net neutrality rules | 7 killer open source monitoring tools

Network World Wide Area Networking

IEEE standards group wants to bring order to IoT
The IEEE P2413 would span Internet of Things technologies for all industries Read More


WHITE PAPER: Riverbed Technology

3 Key Ways WAN Optimization Saves
If you wanted to break down innovation into a tidy equation, it might go something like this: Technology + Connectivity = Productivity. Productivity comes in two forms: user experience and infrastructure efficiency. Read Now

WHITE PAPER: Instart Logic

A New, Better Approach for Web Experiences across Devices
For media and entertainment companies intent on delivering high definition web experiences across all devices, web performance can make or break their engagement levels. Learn more>>

FCC questions how to enforce net neutrality rules
Groups disagree on how the agency should apply any regulations it might pass Read More


: McAfee

Needle in a Datastack Report
The volume of security-related data today can make identifying a threat like looking for a needle in a haystack. Yet collecting more data also plays a transformational role in information security. Organizations need to learn how to harness and sift through this wealth of information to protect themselves from the threats they face every day. Learn more >>

7 killer open source monitoring tools
Looking for greater visibility into your network? Look no further than these excellent free tools Read More


WHITE PAPER: HP

Top 5 Truths About Big Data Hype and Security Intelligence
Big Data Security Analytics (BDSA) is the subject of exuberant predictions. However, a Gartner analyst points out that no available BDSA solutions come close to these forecasts. Nevertheless, the principles of Big Data are the key to advanced security intelligence. This white paper discusses the key tenets of Big Data. Learn more >>

Ericsson dumps LTE modem business
The modem unit has suffered as the devices have increasingly become an integrated feature Read More

Rogue cell towers discovered in Washington, D.C.
After initially discovering more than a dozen rogue cell towers in the U.S., ESD America and IntegriCell discovered more questionable towers in the nation's capitol, 15 of them to be exact. Ownership remains unknown, but Tuesday's test was just scratching the surface. Read More

Ex-Cisco employee pleads guilty to second-degree murder in 'Google Maps case'
Ex-Cisco engineer Brad Cooper, whose first-degree murder conviction for the 2008 strangulation slaying of his wife Nancy was overturned last year based on disputed Google Maps-related evidence, today pleaded guilty to second-degree murder.According to North Carolina media reports, Cooper will be sentenced to 12 to 15 years in prison and has agreed to allow the adoption of his two young daughters by Nancy Cooper’s sister. Whether the sentence includes time served was not clear.To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

The wild world of workplace wearables

Here are some examples of wearables coming to a variety of vertical industries.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Key Cisco defections in data center, OpenStack

2. Ancient Microsoft scam lives on

3. Internet of Overwhelming Things

4. Cisco, FireEye Announcements: A Microcosm of the Enterprise Cybersecurity Market

5. How Google is helping me live a cellphone-free life

6. HP leapfrogs Red Hat to become top contributor to OpenStack

7. Predicting crime with Big Data ... welcome to "Minority Report" for real

8. 7 killer open source monitoring tools

9. The 2014 Ig Nobel Prize winners

10. FTC shuts down $11M online diploma mill


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wide_area_networking_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: