---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <
nww_newsletters@newsletters.networkworld.com>
Date: Feb 25, 2014 2:59 PM
Subject: Crowded U.S. airwaves desperately in search of breathing room
To: <
aquarianm@gmail.com>
Cc:
Network World Daily News PM | | Ahead of a major new spectrum auction scheduled for next year, America's four major wireless carriers are jockeying for position in the frequencies available to them, buying, selling and trading licenses to important parts of the nation's airwaves. | | Issue highlights 1. Wireless spectrum explained: What's the deal with all these MHz, anyway? 2. NASA space photo shows incredible light disparity between North and South Korea 3. Gmail hit by message delivery delay 4. White box drives record 2013 in Ethernet switching 5. Ex-Microsoft architect's startup focuses on SaaS integration 6. Netflix mocks Amazon's drone-delivery gimmick 7. Like Amazon, Google starts eating its cloud cost tracking partners 8. 7 hidden dangers of wearable computers 9. Mt. Gox closes transaction to protect site, company says 10. INSIDER How CIOs Unravel IT Systems After a Business Divestiture 11. Check Point unveils security architecture for threat-intelligence sharing | WEBCAST: SAP On March 6, join us in an exclusive live event featuring Nolan Bushnell, a technology pioneer, entrepreneur, and scientist who’s often cited as the father of the video game industry. This event will feature topics on laying the foundations for mobile, Big Data, and cloud applications that business teams require to stay competitive. Learn more | The wireless spectrum, and the way it's regulated by the FCC, can be a little confusing to the novice, but gaining a layperson's understanding of the national airwaves isn't graduate-level stuff. READ MORE | The International Space Station recently took a snapshot of the Korean peninsula that explicitly details the night-time power consumption of North and South Korea - North Korea is almost completely dark. READ MORE | Delays affected the delivery of messages to Gmail users Tuesday morning, days after key Google Web apps, including Docs and Drive, were hit by a bug lasting more than five hours. READ MORE | WEBCAST: Attachmate This informative webcast provides an informed, thorough look into CICS service-enablement options and how they can affect your environment. You’ll learn how to get the most from your CICS applications without compromising the best possible outcome. View Now. | Call it the March of the White Brigade. Sales of white box switches outpaced the Ethernet switch market as a whole in 2013, which was a record year for switch sales, according to Dell'Oro Group. READ MORE | A former Microsoft architect has founded a startup called Azuqua aimed at tackling the problem of joining together and automating business processes from multiple SaaS (software-as-a-service) applications. READ MORE | Some ideas deserve mocking more than others, so into the batter’s box steps Netflix with this delightful sendup of Amazon’s silly drone-delivery plan/publicity stunt. READ MORE | WHITE PAPER: IBM Help strengthen customer relationships, drive operational effectiveness and optimize your workforce with IBM collaboration and messaging solutions for medium-sized businesses. IBM Lotus software is designed to provide simplified solutions and delivery models based on your needs. View Now>> | This week Google released a new tool that makes it easier for customers to plan for how much it will cost to use the company's cloud resources, and optimize them to the users' needs. READ MORE | Wearable computers like smart clothes and smart watches offer a myriad of benefits, but also raise security concerns. Here are 7 worries associated with wearable devices. READ MORE | Major Bitcoin exchange Mt. Gox said Tuesday it had closed all transactions to protect its website and its users, following concerns about technical issues. READ MORE | With divestitures on the rise, CIOs at Hess, DuPont and other companies that are selling off pieces of the business must rip apart deeply integrated systems. READ MORE | Check Point Software Technologies today said it is extending its security architecture to be able to incorporate more threat-intelligence data that could be shared with other vendor partners, with the goal of providing more adaptive prevention. READ MORE | WEBCAST: Attachmate This four-minute video podcast shows how you can create services to continuously reuse enterprise applications, however and whenever needed, while leaving legacy logic untouched. View Now. | | | | | | | | |
No comments:
Post a Comment