Thursday, November 17, 2011

Ericsson predicts tenfold mobile data traffic growth by 2016

Cisco girds for Huawei's US entry | Techniques for Prolonging the Lifespan of IPv4

Network World Convergence and VoIP

Forward this to a Friend >>>


Ericsson predicts tenfold mobile data traffic growth by 2016
We interrupt our regularly scheduled content to bring you highlights from a new Traffic and Market Data report provided by Ericsson -- forecasting a tenfold increase in mobile data traffic by 2016, with most of the traffic growth driven by video. Read More


WHITE PAPER: Avaya

Avaya: Creating Fit for Purpose Data Center Networking
Simplified and optimized service orchestration maximizes the return from a virtualized computing environment. Click to read the White Paper.

WHITE PAPER: Trend Micro

Protect Virtual Desktops
Protecting virtual servers, virtual desktops and data stored in the cloud requires security optimized for the unique characteristics of these environments. See Tolly Enteprises' Independent performance tests comparing the performance of Trend Micro, McAfee, and Symantec. Read Now

Cisco girds for Huawei's US entry
Analysts are upbeat on Cisco's fiscal Q1 results, which beat Wall Street estimates and served as proof positive that the company's restructuring is paying off. There were several highlights in the quarter, but there are also areas still in need of improvement. Read More


WHITE PAPER: FireEye

CISO Guide to Next Generation Threats
To regain the upper hand against next-generation attacks, enterprises must turn to true next-generation protection: signature-less, proactive and real time. Read more!

Techniques for Prolonging the Lifespan of IPv4
IPv6 proponents have long been predicting the death of IPv4 to get the industry to recognize the importance of IPv6. Although IPv4 address exhaustion has occurred many organizations are still uncertain about the next steps. It is clear that IPv4 is going to be with us for decades to come and there are strategies to prolong the lifespan of IPv4. Are these strategies worthwhile or are they distracting... Read More


WHITE PAPER: Citrix

Best Practices for Implementing 2048-bit SSL
Ready for 2048-bit SSL? Not with F5. Shift to Citrix NetScaler. 2x faster 2048-bit SSL performance. Download the Citrix and Verisign 2048-bit Performance Kit. Learn more

Net neutrality rules and the FCC's huge mistake
The Senate disapproval resolution of the FCC's net neutrality rules failed; could the FCC have made a serious mistake? Read More

Parody page on Google+ looks to have been wakeup call for BoA
Less than 24 hours after a Bank of America parody page began to get greater attention on Google+ -- including here -- the financial giant has apparently stepped up to create a Google+ Page of its own. Which is something every major brand should be scrambling to do if they haven't done it already. Read More

Top 10 Android smartphone browser alternatives
Read More



SLIDESHOWS

Wi-Fi security do's and don'ts
Wi-Fi is inherently susceptible to hacking and eavesdropping, but it can be secure if you use the right security measures. Unfortunately, the Web is full of outdated advice and myths. But here are some do's and don'ts of Wi-Fi security, addressing some of these myths.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. DARPA program to alter security authentication techniques
  2. Fabric wars: Cisco vs. Brocade vs. Juniper
  3. Cisco's Q1 solid, but access routers, Nexus 7000 lagging
  4. Snoop conference for gov't spying: Go stealth, hit a 100,000 targets
  5. Gartner: The top 10 strategic technology trends of 2012
  6. FBI takes out $14 million DNS malware operation
  7. Kindle Fire may outsell iPad this holiday season: survey
  8. Steve Jobs' advice to Facebook's Mark Zuckerberg
  9. Apple ships iOS 5.0.1 with battery fixes, patches
  10. Forrester to security pros: Think before rushing to fix security holes

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_convergence_voip_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment