Tuesday, August 11, 2015

FCC sets new rules to govern PSTN transition

U.S. Internet connection speeds still lag behind other developed nations | Attackers could use Internet route hijacking to get fraudulent HTTPS certificates

Network World Wide Area Networking

FCC sets new rules to govern PSTN transition
The Federal Communications Commission (FCC) took steps last week to regulate the transition of legacy PSTN networks as telcos replace their copper with fiber and move their circuit switched networks to fully IP-based platforms. To read this article in full or to leave a comment, please click here Read More


: Citrix Systems

eGuide: WAN Virtualization
In this eGuide, Network World examines the benefits of WAN virtualization and some recent trends in this area. Read on to learn how WAN virtualization can help your organization. Learn More

: Citrix Systems

eGuide: WAN Virtualization
In this eGuide, Network World examines the benefits of WAN virtualization and some recent trends in this area. Read on to learn how WAN virtualization can help your organization. Learn More

U.S. Internet connection speeds still lag behind other developed nations
The average U.S. Internet connection speed continues to lag behind that of many other developed nations, according to the latest State of the Internet report from CDN and cloud service provider Akamai. In the first quarter of 2015, Akamai said, the average U.S. Internet connection speed was 11.9Mbps - considerably below the 23.6Mbps mark posted by South Korea, which had the fastest average connection speed worldwide. The top 10 was dominated by countries from Europe and east Asia, including Ireland, Hong Kong, Sweden and the Netherlands. The U.S. placed 19th in the rankings.To read this article in full or to leave a comment, please click here Read More


: Citrix Systems

eGuide: WAN Virtualization
In this eGuide, Network World examines the benefits of WAN virtualization and some recent trends in this area. Read on to learn how WAN virtualization can help your organization. Learn More

Attackers could use Internet route hijacking to get fraudulent HTTPS certificates
Inherent insecurity in the routing protocol that links networks on the Internet poses a direct threat to the infrastructure that secures communications between users and websites.The Border Gateway Protocol (BGP), which is used by computer network operators to exchange information about which Internet Protocol (IP) addresses they own and how they should be routed, was designed at a time when the Internet was small and operators trusted each other implicitly, without any form of validation.If one operator, or autonomous system (AS), advertises routes for a block of IP addresses that it doesn’t own and its upstream provider passes on the information to others, the traffic intended for those addresses might get sent to the rogue operator.To read this article in full or to leave a comment, please click here Read More


: Citrix Systems

eGuide: WAN Virtualization
In this eGuide, Network World examines the benefits of WAN virtualization and some recent trends in this area. Read on to learn how WAN virtualization can help your organization. Learn More

Cleaning up botnets takes years, if ever, to complete
In late 2008, a worm called Conficker began infecting millions of computers, startling the computer security community into action.Conficker’s quick spread was so alarming that an organization was formed called the Conficker Working Group that was tasked with stopping the botnet and finding its creators.Many countries also formed their own groups that worked with Internet service providers to remove infections from users’ computers. But seven years later, there are still about 1 million computers around the world infected with the malware despite the years-long cleanup effort.To read this article in full or to leave a comment, please click here Read More

OneDrive's new sharing funtionality is live, notifies users when files are changed
Microsoft's online storage service ups its collaboration chops in run-up to Office 2016 launch Read More

Some Yahoo Mail users menaced by zombified deleted emails
For Yahoo Mail users, some messages just won’t stay dead.Some users of the company’s popular Mail service report that messages they’ve deleted are reappearing in their inboxes, an issue that some say is a recurring problem.Since the beginning of July, more than 100 complaints have been posted in a forum devoted to Yahoo’s email service. Some users say hundreds if not thousands of emails that they had previously deleted have reappeared. Others say the emails continue to reappear after being deleted again.“I have deleted thousands of emails just to find them still in my inbox,” one user wrote on Monday. “I have better things to do than sit at this computer and do something over and over and over again,” the person wrote.To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

User guide to Windows 10

Windows 10 officially launches this week, so if you're going for an immediate upgrade from your Windows 7 or Windows 8/8.1 computer, this guide will get you up to speed as quickly as possible.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Windows 10 is possibly the worst spyware ever made

2. Proposed solutions for fixing Reserve Windows 10 problems

3. New malware turns your computer into a cellular antenna

4. Has Epson killed the printer ink cartridge?

5. Windows 10 installation: Customize settings vs. express settings

6. Peeping into 73,000 unsecured security cameras thanks to default passwords

7. 'Free' Windows 10 isn't entirely free

8. 19 free cloud storage options

9. Reserve your free Windows 10 upgrade, download available on July 29

10. Tweaks to Windows 10 settings for privacy


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wide_area_networking_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: