| Will NSX snub hurt Cisco's integrated infrastructures? Did Cisco and NetApp shoot themselves in the foot by rejecting VMware's NSX on FlexPod? Read More WHITE PAPER: Red Hat
Modernize Your IT Infrastructure & Streamline Operations Increasing line of business demands? Shrinking IT budget? See how Red Hat can help you meet growing. Read Now WHITE PAPER: IBM
Magic Quadrant for Data Masking Technology IBM is a leader in Gartner Inc's Magic Quadrant for Data Masking Technology. Gartner reports that data masking should be mandatory for enterprises using copies of sensitive production data for application development, analytics or training. Read the full report to learn about IBM. Learn more! 13 Things to Do on a Conference Call "Image by ShutterstockJumping on a conference call has become so common in today's blended work-life-mobile lifestyle that it has become a cliche. We've become experts at dialing in remotely and being sneaky about our whereabouts and activities. In a recent InterCall survey, four out of five respondents admitted to working on unrelated items while on a conference call. Of course, we're all claiming to be the one out of five doing it right.To read this article in full or to leave a comment, please click here Read More Funny videos about the iPhone 6 and Apple Watch... Going through withdrawal over the sudden drop-off in Apple iPhone 6 and iWatch (now formally Apple Watch) scuttlebutt that has sustained us over the past year? Laugh it off with these mostly safe for work parody and comedy videos. Apple Apple And don't worry, iPhone 7 rumors won't be long.The Conan treatmentTo read this article in full or to leave a comment, please click here Read More Former White House spokesman 'live tweeting' his recollections of 9/11 He's chosen an odd format for the task, but former White House spokesman Ari Fleischer's ongoing string of tweets today about his recollections of being at the side of President Bush on 9/11 makes for compelling reading nonetheless.Most of the anecdotes he is sharing -- from memory and six pages of extemporaneous notes he took that day – will be familiar to anyone steeped in the details of that horrible day. The tweets are timed to coincide with events as they unfolded, so if you'd like to read them in chronological order you'll have to scroll down to the first one.To read this article in full or to leave a comment, please click here Read More SAP spices up its predictive analytics and visualization apps SAP has made a series of updates to its InfiniteInsight predictive modeling software and Lumira data-visualization tool in a bid to shore up its foothold in the analytics market.InfiniteInsight 7.0 adds the ability to use geospatial dimensions such as latitude and longitude within predictive models, according to Thursday's announcement. "This allows you to make the most of geographic data and provides you with much more information than simply using ZIP codes," SAP said in a recent blog post on the release.Many companies use predictive modeling to take informed stabs at how customers will behave in the future, based on data sets that describe actions they took in the past. Support for geospatial data means an analyst could examine sequences of places customers visited, as well as segment customers based on their location, SAP said.To read this article in full or to leave a comment, please click here Read More Senators ask Apple, Home Depot for information on breaches Two lawmakers ask the companies to explain the cause of recent data breaches Read More New survey raises questions about net neutrality regulation, advocacy group says More than two-thirds of U.S. respondents in a new survey say that decades-old telephone regulations should not apply to the Internet, which suggests that the U.S. Federal Communications Commission should stay away from reclassifying broadband as a regulated public utility, an advocacy group said.Many groups calling for the FCC to pass strong net neutrality rules have called on the agency to reclassify broadband as a regulated common carrier, similar to long-standing regulations governing the telephone system, but California-based tech advocacy CALinnovates pointed to a survey the group commissioned that it said suggests many U.S. residents are wary of heavy-handed regulations for the Internet.To read this article in full or to leave a comment, please click here Read More The many looks of the Apple Watch "Image by REUTERS/Stephen LamOne of the many things Apple got right with its new Watch is that it plans to give consumers the option to choose between varying styles and multiple bands. A watch is in many ways a personal fashion statement, and releasing a one-style-fits-all device a la the Moto 360 is arguably a bad strategy. The Apple Watch thankfully comes in assortment of styles, from sporty to chic. There are about 21 different looks users can choose from once the device goes on sale in early 2015. Here's what they all look like.To read this article in full or to leave a comment, please click here Read More Enterprise Annexation of Endpoint Security When it comes to strong cybersecurity endpoints and servers have often been second-class citizens when compared to the network. I described this situation in a March 2013 blog. According to ESG research, 58% of security professionals working at enterprise organizations (i.e. more than 1,000 employees) said that network security processes, skills, and technical controls were "much more thorough" or "somewhat more thorough" than server security processes, skills, and technical controls. Why the discrepancy? Network security includes mature technologies like firewalls, IDS/IPS, and Web Application Firewalls (WAFs). Furthermore, network security often involves a lot of network design and engineering for segmentation, access control, and traffic management. Alternatively, endpoint and server security is typically based on nothing more than AV software and its associated signature downloads and occasional scans.To read this article in full or to leave a comment, please click here Read More The Hybrid WAN requires a new approach to network optimization It's been well documented that the current wide area network (WAN) and data center interconnect (DCI) architecture has been in place now for well over 20 years. That architecture – the legacy one we've all become familiar with – was designed for the days when no one expected much from the network. Slow, fast, whatever. It was the Internet and it was expected to be flaky. Not so anymore, though. We rely on the cloud and mobility to drive our lives. Businesses are network-centric, and that's driving the evolution towards a new WAN model.Now that the WAN is finally evolving, I think it's time to take a look at the infrastructure that's used to optimize it. The majority of equipment used to optimize the WAN is designed to solve a specific problem on a private, controlled network. The mismatch between legacy infrastructure and the demands of today's WANs have led to the following problems:To read this article in full or to leave a comment, please click here Read More 9 nightmare sci-fi virtual realities that are closer than you think Emerging technologies in virtual and artificial reality blur the line between science and fiction Read More | |
| SLIDESHOWS 7 sexy smartphone technologies coming your way A slew of new technological features are (or could be) coming to future smartphones. Here are seven that have been in the news over the last few years. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn MOST-READ STORIES of 2014 1. Windows 9 to users: I'm listening 2. Five million Gmail addresses and passwords dumped online 3. Internet of Overwhelming Things 4. What online news looked like on 9/11 5. Man arrested on drug charges after butt-dialing 911 6. The Linux desktop-a-week review: ratpoison 7. iPhone 6, Apple Watch features: Android's been there, done that 8. 5 questions to ask before you take a tech job 9. Last-minute iPhone 6 rumors: Release date, water proof, shatter proof and more 10. First Look: iPhone 6 and iPhone 6 Plus |
| Do You Tweet? Follow everything from NetworkWorld.com on Twitter @NetworkWorld. You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy
When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** | |
No comments:
Post a Comment