High-tech

High-tech
Light

Wednesday, November 19, 2014

SDN in action: Hands-on with Cumulus Linux

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Nov 19, 2014 2:04 PM
Subject: SDN in action: Hands-on with Cumulus Linux
To: <aquarianm@gmail.com>
Cc:

Top tech turkeys of 2014

What it's like living on a Chromebook, Part 2

Network World Daily News PM
November 19, 2014
INSIDER

SDN in action: Hands-on with Cumulus Linux

The stage is set for SDN (software-defined networking) to change the way we push data through our infrastructures, with the promises of more agile network provisioning and management, as well as more affordable network hardware. But for many, the SDN concept is still amorphous. What does SDN look like in practice? To read this article in full or to leave a comment, please click here(Insider Story)

READ MORE
 

Issue highlights

1. Top tech turkeys of 2014

2. What it's like living on a Chromebook, Part 2

3. Debian general resolution against systemd coupling fails, sponsor steps down

4. Cisco Launches Project Squared Collaborate App, IX5000 TelePresence Series

5. Why the Moto 360 is winning the smartwatch race

6. Tesla Model X will feature dual-motor system and ability to tow

7. Uber and Google are abusing user data for fun

8. Long-running Android botnet evolves, could pose threat to corporate networks

9. FTC gets federal court to shut down $120M tech support scam

10. Everything you need to know to supercharge your PC's storage

11. 6 ways to nail the job interview

WHITE PAPER: Brother International Corp.

How Secure are your Web Meetings?

OmniJoin offers a full suite of security features to give you the peace of mind that your web meetings are as secure as you need them to be. Learn More>>

Top tech turkeys of 2014

This Thanksgiving, just be thankful you aren't associated with any of these people. READ MORE

What it's like living on a Chromebook, Part 2

Trying to tackle media editing on a Chromebook. READ MORE

Debian general resolution against systemd coupling fails, sponsor steps down

Debian developers voted down a proposal that would have weakened the Linux distribution's integration with a controversial system software package on Tuesday, in a victory for systemd supporters.The proposal, promulgated by former Debian project leader Ian Jackson, called for all Debian software to be effectively init-system-agnostic – the aim being to limit just how tightly bound to and dependent upon systemd Debian could become.+ MORE ON NETWORK WORLD:Prominent developers pulling out of Debian as voting deadline nears | How does a Windows bug go undetected for 19 years? +To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Curvature

The State of IT Infrastructure & Operations

The challenge that IT decision-makers face is the pressure to reduce costs paired with the pressure to progress digital maturity. Curvature analyzes why businesses miss significant CapEx and OpEx cost savings and how to refocus IT strategy. View now

Cisco Launches Project Squared Collaborate App, IX5000 TelePresence Series

Cisco made three announcements earlier this week at Collaboration Summit 2014 including the launch of Project Squared as a cloud-based collaboration app, an alliance with Box that contributed to the Project Squared app, and the latest upgrades to the Cisco TelePresence portfolio with the Cisco TelePresence IX5000 series.Project Squared is a business collaboration app built on the Cisco Collaboration Cloud that combines chat, audio, video, multi-party meetings and content sharing. Users can download the app to mobile devices with the option to also connect using a web browser to log in from any computer. Project Squared securely links physical conference rooms through the cloud to external devices. With the app, users can start a room and invite others to the collaboration session to share messages, post files, and start voice and video calls. Files are rendered in the cloud, eliminating the need to download files to view content.To read this article in full or to leave a comment, please click here READ MORE

Why the Moto 360 is winning the smartwatch race

Market researcher Canalys reports another spike in wearables, Gartner predicts health and fitness wearables will disappoint in 2015. READ MORE

Tesla Model X will feature dual-motor system and ability to tow

During its most recent earnings conference call, Tesla disclosed that the highly anticipated Model X would be delayed until the third quarter of 2015. Yesterday, Tesla emailed Model X reservation holders and informed them that the wait will be worth it. READ MORE

WHITE PAPER: BMC Software

Five Levers to Lower Mainframe MLC Costs

This paper discusses five levers you can use to lower your mainframe MLC costs by up to 20 percent or more. Explore best practices and real-world examples of dramatic savings through a mainframe MLC optimization strategy based on higher visibility, predictability, and automation. Learn More

Uber and Google are abusing user data for fun

Like many journalists, I'm concerned and outraged about the recent controversy regarding Uber executive Emil Michael. In my view, his comments about hiring opposition researchers and journalists to "help Uber fight back against the press" by investigating their families and personal lives—particularly Pando Daily's Sarah Lacy—have terrifying implications.Michael quickly backed off his comments, saying his words "do not reflect my actual views," while not denying he said them. (Reminds me of Charles Barkley once claiming to have been misquoted in his own autobiography!) And of course the company said it would never actually do such a thing. Trust us! But it has so far declined to fire or even discipline Michael.To read this article in full or to leave a comment, please click here READ MORE

Long-running Android botnet evolves, could pose threat to corporate networks

An Android Trojan program that's behind one of the longest running multipurpose mobile botnets has been updated to become stealthier and more resilient.The botnet is mainly used for instant message spam and rogue ticket purchases, but it could be used to launch targeted attacks against corporate networks because the malware allows attackers to use the infected devices as proxies, researchers from security firm Lookout said.Dubbed NotCompatible, the mobile Trojan was discovered in 2012 and was the first Android malware to be distributed as a drive-by download from compromised websites.Devices visiting such sites would automatically start downloading a malicious .apk (Android application package) file. Users would then see notifications about the finished downloads and would click on them, prompting the malicious application to install if their devices had the "unknown sources" setting enabled.To read this article in full or to leave a comment, please click here READ MORE

FTC gets federal court to shut down $120M tech support scam

The Federal Trade Commission today said a federal court has temporarily shut down two telemarketing operations that it says conned tens of thousands of consumers out of more than $120 million by deceptively marketing computer software and tech support services. The FTC claims that since at least 2012, the defendants – including companies known as PC Cleaner, Inbound Call Experts and Boost Software -- have used software designed to trick consumers into thinking there are problems with their computers, then subjected those consumers to high-pressure deceptive sales pitches for tech support products and services to fix their non-existent computer problems.To read this article in full or to leave a comment, please click here READ MORE

Everything you need to know to supercharge your PC's storage

Ah, storage. Every PC needs it it, but your standard PC storage solutions suffer from two glaring frustrations.First off, storage performance tends to be one of the main bottlenecks in a typical PC, although the situation has vastly improved with the advent of solid state drives. (Yes, it's probably your hard drive holding back your high-end PC from even greater glory.) Second, drive failure can lead to the loss of valuable data, and no one wants that.Thankfully, there's a way to help mitigate both of these problems using a feature that's supported on virtually every modern computer system: RAID.+ ALSO ON NETWORK WORLD RAID 6 covers more bases +To read this article in full or to leave a comment, please click here READ MORE

6 ways to nail the job interview

When Doug Mitchell took over as CEO of direct-sales company Argenta Field Solutions in 2011, he noticed something surprising. He noticed that most Gen-Y candidates, though tech savvy and digitally plugged-in, didn't seem to have a clue about how to dress for, prepare for or conduct themselves in an interview, making his job and the job of his hiring managers difficult. Be sure not to miss: How to lure tech talent with employee benefits, perks "One of my responsibilities is interviewing, while the final decision is made by our chief administrator or by the head of sales, I perform interviews as well as put a final stamp of approval on our hires. What I noticed was, especially with the latest crop of millennial candidates, they're completely unprepared. They don't understand how to dress, how to speak, how to comport themselves in a face-to-face interview," he says. "Millennials might be 'digital natives,' but they could use some pointers on good, old-fashioned face-to-face interaction at times," says Mitchell.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: IBM

Forrester 2014 Dynamic Case Management Wave

Forrester has released its 2014 Dynamic Case Management Wave, and for the second consecutive time, IBM is a leader. View Now>>

SLIDESHOWS

Pi, translated: The evolution of Raspberry Pi

It's only been two years, but the Raspberry Pi has already come a long way.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

MOST-READ STORIES of 2014

1. How does a Windows bug go undetected for 19 years?

2. 20-plus eye-popping Black Friday 2014 tech deals

3. Microsoft releases emergency patch to stymie Windows Server attacks

4. 10 hottest IT skills for 2015

5. Cisco open sources security

6. The SWAMP: How to avoid the coming software armageddon

7. Peeping into 73,000 unsecured security cameras thanks to default passwords

8. The 10 mightiest supercomputers on the planet

9. Cool Yule Tools: Best techie gifts for 2014

10. 10 enterprise Internet of Things deployments with actual results

Follow Network World

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment