High-tech

High-tech
Light

Tuesday, June 18, 2013

Quick look: The NSA security quagmire

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Jun 17, 2013 8:59 PM
Subject: Quick look: The NSA security quagmire
To: <aquarianm@gmail.com>
Cc:

  Hidden yodelers on Yahoo homepage fall silent | What's next for Wi-Fi?
 
  Network World After Dark

Forward this to a Friend >>>


Quick look: The NSA security quagmire
Big mess: FBI now looking at Edward Snowden's disclosures about the National Security Agency's broad monitoring of phone call and Internet data from big companies such as Google and Facebook. Read More


WEBCAST: Fluke Networks

Best Practices Performance Monitoring Recorded Webinar
Webinar will examine the driving factors, objectives, requirements, and best practices surrounding converged network and application performance management. Learn More

WHITE PAPER: Netscout Systems Inc.

Service-Oriented Performance Management Strategy
This white paper is to help IT organizations adopt a management methodology that enables them to improve the user experience by focusing on service delivery management. Learn More.

Hidden yodelers on Yahoo homepage fall silent
Read More

What's next for Wi-Fi?
Wi-Fi is blossoming in the enterprise as organizations find new ways to leverage the wireless infrastructure and workers, having benefited from mobility, demand increased range and better performance (and support for all those devices they are bringing in from home). The industry is responding in kind, introducing new products and technologies, including gigabit Wi-Fi, and it is up to IT to bring it orchestrate this new mobile symphony. Read More

Data that's here today could be gone tomorrow, says Cerf
As one of the computer scientists who created the Internet's TCP/IP protocol, Vinton Cerf is concerned that much of the data created since then, and for years to come, will be lost. Read More

Apple's iOS 7 icons are ugly and a step backwards
I'll be blunt - the icons in iOS 7 are ugly. If Apple wanted to ensure that Samsung would never copy it again, it succeeded. Let's break them down, app-by-app. Read More

The China Syndrome
Pointing the finger at China won't solve our cybersecurity problems. Read More

Pros and cons of Microsoft's move into Best Buy storefronts
There are pluses and minuses to this trend. The pluses are all in Microsoft's favor. Read More

What to expect at Cisco Live in Orlando
What a new release from ActionPacked! Networks tells us about the trends to expect at Cisco Live in Orlando, Florida. Read More

FBI "Most Wanted" list names its 500th fugitive
It's a list one would never aspire to be on. The FBI today said it named the 500th criminal to its iconic "Ten Most Wanted Fugitives," program - a list that has been kept since 1950. Read More

Can Red Hat do for OpenStack what it did for Linux?
Red Hat made its first $1 billion commercializing Linux. Now, it hopes to make even more doing the same for OpenStack. Read More

Best security tools for under $3,000
Check Point wins test of eight unified threat management (UTM) devices for small business Read More

IT morphs as tech and users change
As the consumerization of IT and self-service trends gain momentum, IT's role is changing from technology implementer to technology enabler. Read More

 

SLIDESHOWS

8 struggling technologies: Which ones will survive?

The following technology platforms appear to be struggling – some may ultimately flop and some may end up surviving and thriving.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Apple's iOS 7 icons are ugly and a step backwards

7. Quick look: The NSA security quagmire

2. Might Yahoo's email move deliver unintended consequences?

3. CEO paychecks: Winners and losers

4. iPad 5 rumor rollup for the week ending June 12

8. Getting the most out of flash storage

5. iPhone 6 rumor rollup for the week ending June 14

9. Gartner reveals top 10 IT security myths

6. Cisco hotshot eternally grateful for magic of video editing

10. Cisco impresses with first crack at next-gen firewall

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment