Network World Daily News PM | | The engineering reorganization currently underway at Cisco is intended to streamline product development and delivery to customers, Cisco says. That it is prompting some high profile departures is an expected byproduct of any realignment of this size, which affects 25,000 employees, says Cisco Executive Vice President and Chief Development Officer Pankaj Patel, who is conducting the transformation.To read this article in full or to leave a comment, please click here | | Issue highlights 1. Best Tech-o-Lanterns 2014 2. Namifying has gotten out of controlify 3. HP unveils cloud config manager 4. Envious of fiber broadband? Help is on the way for copper users 5. Apple's new iMac Retina is worth the cost for your employees 6. Six browser plug-ins that protect your privacy 7. ITworld cartoons 2014: The year in geek humor (so far) 8. First Look: The iPad Mini 3, iPad Air 2 and more 9. New technique allows attackers to hide stealthy Android malware in images | WHITE PAPER: Curvature The challenge that IT decision-makers face is the pressure to reduce costs paired with the pressure to progress digital maturity. Curvature analyzes why businesses miss significant CapEx and OpEx cost savings and how to refocus IT strategy. View now | Techie pumpkinsLeave it to techies to show off their passions on their pumpkins, whether it's paying homage to tech innovators, products or companies. Enjoy!Trust your neighbors?Image by YouTube.comTo read this article in full or to leave a comment, please click here READ MORE | Chris Johnson, a Seattle-based branding consultant operating as The Name Inspector, has been watching a company name trend for several years now that is likely attributable to the success of Spotify: slapping "ify" on the end of otherwise perfectly good words. Dating back to 2007, Johnson has counted some 337 such company names; 101 last year and 73 so far this year. The chart he fashioned is a bit big to be legible here, so let's just list this year's batch of namified names (prepare for some scrolling):To read this article in full or to leave a comment, please click here READ MORE | HP this week unveiled a network virtualization system for large enterprise and cloud providers designed to simplify network configuration.Called Distributed Cloud Networking (DCN), HP says the product allows service providers and large organizations to deploy secure cloud networks across a distributed infrastructure in minutes instead of months. DCN is also intended to optimize network resources and speed time-to-market, HP says, through centralized control and automated management of private, public or hybrid data centers.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: Dell Software Toad for IBM DB2 is a powerful tool for the database administrator. But it's some of its newer and lesser known features that provide the great productivity benefits in the DBA's day-to-day work. Do you know the top 10 features of Toad for IBM DB2? Download this white paper and find out. View now | A technology that delivers broadband speeds over copper lines at a speed comparable to fiber is gaining momentum.Telekom Austria said this week it had connected the first subscriber in the world to its domestic network with G.fast, which offers data rates of up to several 100 Mbit/s via existing copper lines. That will meet the needs of even the most demanding households over the next 10 to 20 years, according to the operator.G.fast increases the bandwidth by using more spectrum. That places extra demands on equipment to be very good at handling interference, a far from trivial requirement.G.fast only works over short distances, up to 250 meters, so it is only used to connect subscribers to the nearest distribution point; the rest of the network must be fiber. That means it can't replace all slow DSL lines, but it will be used where it's difficult or too expensive for operators to install fiber all the way to the subscriber's modem.To read this article in full or to leave a comment, please click here READ MORE | The reasoning is simple: Technology that makes people more productive is almost always a good investment. READ MORE | It's no stretch to say that ads are what make the Web go 'round. The content you're reading right now? Paid for by ads. Google, Facebook, Pandora, YouTube? Driven by ads. This is not a new concept: TV and radio have relied on commercials since their earliest days. Because, let's face it, something has to pay for all the free programming and services. Of course, there are ways that users can quell the seemingly endless stream of buttons, banners, video interstitials and more. All you need is an ad blocker: a browser plug-in designed to filter out those unwanted distractions and interruptions. For many users, though, there's another concern that is more important than simple annoyance: privacy. Some sites do more than just plaster their content with digital billboards. They log your visits (usually via IP addresses) and even track your movements to other destinations. Although the driving motivator is usually just broad-based data-gathering, it can be unsettling to realize you're being followed online.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: AT&T A network-enabled cloud combines the control, protection, and performance advantages of a private cloud with the economies and elasticity of a public cloud, and seamlessly integrates corporate VPNs with cloud-based resources. Learn more about key Considerations and Partner Selection Criteria in this IDC whitepaper. Learn More | October 17th - It was love at first authentication Image by ITworld/Phil JohnsonThere was a time, not that long ago, when almost all of the texts I received were from family or friends. Nowadays, though, it seems like I get far more texts from authentication services, sending me codes so I can verify to some web site or app that I am whom I claim to be. In the wake of yet more online data breaches (or alleged ones), I just keep enabling two-factor authentication in more and more places. Where will this sort of thing end? I don't know, but I'm just glad I'm already married.To read this article in full or to leave a comment, please click here READ MORE | Apple's glossy new tablets were accompanied by new iMacs and OS X Yosemite. READ MORE | A new technique that allows attackers to hide encrypted malicious Android applications inside images could be used to evade detection by antivirus products and possibly Google Play's own malware scanner.The attack was developed by Axelle Apvrille, a researcher at Fortinet, and reverse engineer Ange Albertini, who presented their proof-of-concept at the Black Hat Europe security conference in Amsterdam Thursday.It's based on a technique devised by Albertini dubbed AngeCryption that allows controlling both the input and the output of a file encryption operation using the Advanced Encryption Standard (AES) by taking advantage of the properties of some file formats that allow files to remain valid despite having junk data appended to them.To read this article in full or to leave a comment, please click here READ MORE | WHITE PAPER: HP Get on the path to consumer-inspired IT service delivery with an HP IT service catalog, portal, and service exchange. Learn More | SLIDESHOWS The Onion's 9 best bits about Microsoft Poking fun at the software giant and founder Bill Gates since 1996. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn MOST-READ STORIES of 2014 1. Moto X 2nd Gen review: Same same but different 2. Apple's iPad 2 vs. Google's Nexus 9: Comparing the two new tablets 3. Conspiracy Theory With Teeth: Government Allegedly Forced TruTV To Yank FEMA Camps Episode 4. First Look: The iPad Mini 3, iPad Air 2 and more 5. 12 things I hate about Hadoop 6. The Snappening: Snapsaved admits to hack that leaked SnapChat photos 7. A tale of Ransomware that will make your blood run cold ... 8. Apple's most important iPad, iMac, OS X Yosemite, and other announcements this week 9. Hordes of cable modems, Web cams, printers can become DDoS launch platforms 10. First Look: The magnificent new Nexus 6 and Nexus 9 | | | | | | | |
No comments:
Post a Comment