Tuesday, November 11, 2014

Obama: Broadband should be regulated as a utility

  Riverbed is now a FORCE in hybrid WANs | Cisco patches serious vulnerabilities in small business RV Series routers

 
  Network World Wide Area Networking  

Obama: Broadband should be regulated as a utility
The president also calls on the FCC to stop broadband providers from charging content companies to prioritize their traffic Read More
 


WEBCAST: Alcatel-Lucent Enterprise

University Surpasses Students' Digital Expectations
The explosion of mobile device use is testing the limits of legacy networks everywhere. In this webcast you will learn how Abilene Christian University meets the mobile access demands of 4500 University students, and 250,000 connections per day. Learn More

WEBCAST: Alcatel-Lucent Enterprise

University Surpasses Students' Digital Expectations
The explosion of mobile device use is testing the limits of legacy networks everywhere. In this webcast you will learn how Abilene Christian University meets the mobile access demands of 4500 University students, and 250,000 connections per day. Learn More

Riverbed is now a FORCE in hybrid WANs
A little over a decade ago WAN optimization became a real market, and it was flooded with names like Peribit, Actona, Packeteer, and SWAN Labs. However, no one did WAN optimization better than Riverbed. In fact, Riverbed and the term WAN optimization became synonymous with one another as the market took off. WAN optimization was hot because it solved a huge problem – it made applications such as Windows file transfer and Exchange work better over wide area connections, alleviating a sore point for network managers for years. Once deployed, it was impossible to take out. I remember interviewing a network manager of a global firm who referred to Riverbed as "network crack." Once workers got used to an optimized WAN connection, it was impossible to go back to a non-optimized connection.To read this article in full or to leave a comment, please click here Read More
 


WEBCAST: Ciena Corporation
 
Security+ Guide to Network Security Fundamentals
Serious IT breaches happen too often. Is there a way to reduce or eliminate the impact on consumers? Attend this Live Webinar Dec. 2nd,1:00 PM ET / 10:00 AM PT to learn methods for protecting your information resources. Learn More

Cisco patches serious vulnerabilities in small business RV Series routers
The flaws allow attackers to execute commands, overwrite files and launch CSRF attacks Read More
 


WEBCAST: Ciena Corporation
 
Security+ Guide to Network Security Fundamentals
Serious IT breaches happen too often. Is there a way to reduce or eliminate the impact on consumers? Attend this Live Webinar Dec. 2nd,1:00 PM ET / 10:00 AM PT to learn methods for protecting your information resources. Learn More

HP's BYOD service protects mobile devices and PCs
Hewlett-Packard wants to make BYOD easier for small businesses through a new cloud-based service to manage and protect mobile devices and PCs.The company's Web-based Touchpoint Manager service, launched Monday, can remotely check the health of smartphones, tablets, laptops and desktops. It can also issue alerts and remotely lock or wipe data from devices in case of theft.The service is for businesses with up to 500 employees that need a basic bring-your-own-device management plan at an affordable price, said Michael Park, vice president and general manager of Commercial Mobility, Printer and Personal Systems at HP.To read this article in full or to leave a comment, please click here Read More
 

Apple was warned about WireLurker months ago, Georgia Tech researcher says
The WireLurker malware that may have infected hundreds of thousands of Mac OS and iOS devices is exactly similar to a proof-of-concept attack Apple was warned about at the beginning of this year, according to the researcher who first publicly described such attacks.The malware can siphon off data from iOS devices when they sync up with computers or are charged by computers via USB cables, but the potential for this type of attack can be much broader, says Tielei Wang, a researcher at Georgia Institute of Technology who presented a paper about such attacks at USENIX Security Symposium in August.To read this article in full or to leave a comment, please click here Read More
 

 

INSIDER
Cloud adoption continues apace
Cloud adoption is increasing as companies identify more IT operations they want to migrate. However, the pace and implementation focus vary according to company size, industry and job titles of parties involved, while security concerns persist as the top challenge to deployment, according to a new survey of 1,672 IT decision-makers.To read this article in full or to leave a comment, please click here(Insider Story) Read More

 

 

SLIDESHOWS

Ten operating systems for the Raspberry Pi

The OSes the Raspberry Pi can run will amaze you!

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Peeping into 73,000 unsecured security cameras thanks to default passwords

2. 20 cool things you can do with a Raspberry Pi

3. Cisco, Arista disaggregating?

4. Unpatched TRENDnet IP cameras still provide a real-time Peeping Tom paradise

5. Patch Tuesday: 16 security advisories, 5 critical for Windows

6. Google: Move over cloud, the next IT disruption is upon us

7. Ghost could scare off WordPress as the top blogging platform

8. Black Friday sales promise iPhone 6 deals

9. New products of the week 11.10.2014

10. Ten operating systems for the Raspberry Pi


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wide_area_networking_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: