High-tech

High-tech
Light

Friday, December 6, 2013

Cisco sees SDN, Internet of Things in its 2014 crystal ball

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Dec 5, 2013 8:26 AM
Subject: Cisco sees SDN, Internet of Things in its 2014 crystal ball
To: <aquarianm@gmail.com>
Cc:

20 best iPhone/iPad games of 2013

Microsoft helps develop bra technology to battle overeating

Network World Daily News AM
December 05, 2013
Share this email

Cisco sees SDN, Internet of Things in its 2014 crystal ball

Next year will see demonstrable evidence of the Internet of Things, real-time communications on the Web, and SDN-enabled platforms with killer applications for them.

READ MORE
 

Issue highlights

1. 20 best iPhone/iPad games of 2013

2. Microsoft helps develop bra technology to battle overeating

3. Startup Trifacta embracing the data scientist in all of us

4. NSA is said to collect cellphone location data across the world

5. Microsoft: 'We don't provide governments with direct, unfettered access to your data'

6. Obama is not allowed to use an iPhone due to security risks

7. Passwords reset after 'Pony' botnet stole 2 million credentials

8. Google may go from Google Glass to Google Robot

9. Intel aims at enterprise, carrier networks with faster silicon

10. Why Are So Many IT Projects Failing?

11. INSIDER Do's and don'ts for tech startups

12. First look: Google Compute Engine vs. Amazon Web Services

RESOURCE COMPLIMENTS OF: EMC

Improve Business Agility and Trust through Data Protection

EMC Data Protection enables businesses to accelerate IT Transformation through a Protection Storage Architecture that brings together backup, DR and archiving to increase scalability while driving down complexity and cost. Avoid accidental architectures that will slow your business down. Learn more.

20 best iPhone/iPad games of 2013

Puzzles, adventure games, dungeon crawlers, and more fun for your favorite iOS device (during off-work hours, of course). READ MORE

Microsoft helps develop bra technology to battle overeating

Sensors tucked inside a bra can detect emotional states that lead to overeating in time to head off binges, according to studies assisted by a team from Microsoft Research. READ MORE

Startup Trifacta embracing the data scientist in all of us

Organizations drowning in big and small data will soon have a new way to wrangle, munge or transform it – however you want to describe the process – thanks to software from startup Trifacta that's now in beta tests. READ MORE

NSA is said to collect cellphone location data across the world

The U.S. is collecting nearly 5 billion records a day on the location of cellphones around the world to feed a large database of the location of "at least hundreds of millions of devices," according to a newspaper report. READ MORE

RESOURCE COMPLIMENTS OF: Check Point Software Technologies

Check Point 2013 Internet Security Report

Based on research of nearly 900 companies, the Check Point 2013 Internet Security Report uncovers major security risks organizations are exposed to on a daily basis. Discover how often Bots endanger your enterprise. See how commonly-used Web applications can be high risk. Learn how easy it is to experience unintentional data loss. Read Full Report.

Microsoft: 'We don't provide governments with direct, unfettered access to your data'

Microsoft today pushed back once again against the idea that it's giving the National Security Agency (NSA) carte blanche access to its cloud-based services, an allegation that's cropped up in media reports since the revelations from former NSA contractor Edward Snowden began last June. READ MORE

Obama is not allowed to use an iPhone due to security risks

President Barack Obama acknowledged yesterday that he is not allowed to use an iPhone due to security concerns. Instead, the leader of the free world is relegated to using a "super-encrypted" BlackBerry device. READ MORE

Passwords reset after 'Pony' botnet stole 2 million credentials

Facebook, LinkedIn and other online services have been resetting accounts after 2 million login credentials, apparently stolen from users' computers, were discovered on a server in the Netherlands. READ MORE

Google may go from Google Glass to Google Robot

Google, the worldwide leader in online search, is also known as the company behind the dominant Android mobile platform, Google Glass and Google Maps. Are Google Robots next? READ MORE

WEBCAST: Egnyte

Consider Hybrid Approach to File-Sharing

Security. Scalability. Control. These are just some of the many benefits of enterprise cloud file-sharing that you'll discover in this KnowledgeVault, packed with short videos, white papers and demos. View Now!

Intel aims at enterprise, carrier networks with faster silicon

Intel has beefed up its networking silicon in a bid to capture a bigger share of enterprise, carrier and cloud-provider networks for its chip architecture. READ MORE

Why Are So Many IT Projects Failing?

A recent study reports that 50 percent of companies had an IT project fail in the last 12 months. Business leaders who blame IT are missing the real project management issues. READ MORE

INSIDER

Do's and don'ts for tech startups

Last week, DEMO Fall 2013 provided more than 40 startups the opportunity to launch. For some, it may have been the first step toward massive success. Some major names in the tech industry, such as VMware, E-Trade, and Salesforce.com, began their rise to prominence with a brief pitch at a DEMO conference in the past. READ MORE

First look: Google Compute Engine vs. Amazon Web Services

The cloud battle is on READ MORE

WHITE PAPER: Stratacache

Accelerating In-Store Mobile Apps at Retail

In this whitepaper, we examine how on-premise caching technology can take the guesswork out of mobile retailing with staggering results. Learn More.

SLIDESHOWS

Don't click on these links

Whether you receive a phishing email inviting you to click on a specific link or whether you stumble upon it while Web surfing, here are 10 types of links you should never click on.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 18 Hot IT Certifications for 2014

2. IT pros share blame for 'shadow IT' problem, survey shows

3. First look: Google Compute Engine vs. Amazon Web Services

4. Targeted attacks spotted in the wild exploiting Windows XP zero-day

5. Gaming company caught building Bitcoin mining botnet from users' computers gets off light

6. Windows 8 Update: China prefers to stick with dying Windows XP rather than upgrade

7. Cisco has this SDN thing covered

8. Don't click on these links

9. How to shove 50 meters of optical fiber into a microchip

10. Google Cloud Compute goes live

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment