Tuesday, July 31, 2012

The Consequences of WAN Service History

US Oak Ridge lab software gets wireless between a rock and a hard place | The weirdest, wackiest and coolest sci/tech stories of 2012 (so far!)

Network World Network Architecture

Forward this to a Friend >>>


The Consequences of WAN Service History
In our last few columns, we looked at the history of the Enterprise WAN, with the key takeaway being that reliable but very expensive private WAN services Frame Relay and now MPLS have been the dominant technologies for almost 20 years now, and we looked at the key factors affecting application performance over the WAN: bandwidth, Read More


WHITE PAPER: Xirrus

Tablets in the Enterprise
Tablets are replacing laptops at lightning speed. Whether company-issued or part of the BYOD phenomenon, the increased use of smart devices has resulted in a dramatic shift in network traffic with an emphasis on wireless. This paper explains how to predict Wi-Fi demands and architect a best-fit wireless network strategy for your environment. Learn more.

WHITE PAPER: Shoretel

Sophisticated Simplicity
The key is to build simplicity and ease of use into these solutions from Day 1. This white paper will demonstrate a clear path to UC simplicity, and to overall success of UC deployments. Learn more.

US Oak Ridge lab software gets wireless between a rock and a hard place
A wireless start-up has licensed Oak Ridge National Laboratory-developed software that lets companies more effectively design and implement wireless networks in difficult locations. Read More

The weirdest, wackiest and coolest sci/tech stories of 2012 (so far!)
From Apple to NASA and Stuxnet to robots, it's been a busy year Read More


WHITE PAPER: Cisco

Cisco Bring Your Own Device
This paper explores the challenges mobile devices create for IT, offers key considerations before adopting a BYOD strategy and highlights a comprehensive architecture from Cisco that enables freedom of choice for users while affording IT security and control. Learn more.

Persistent router botnets on the horizon, researcher says at Defcon
Security researcher Michael Coppola demonstrated how small and home office (SOHO) routers can be compromised and turned into botnet clients by updating them with backdoored versions of vendor-supplied firmware. Read More

Advance Malware Protection: Network or Host?
Large organizations have legitimate cause for concern. Malware creation and proliferation is increasing rapidly as cybercriminals and state-sponsored organizations create the next round of APTs, botnets, Trojans, and rootkits. What's more, we've entered the era of micro attacks designed to compromise a targeted organization, business unit, or individual. Read More


WHITE PAPER: HP

Bring Your Own Mobile Devices to School
In today's educational environments, more and more students, guests, and faculty are bringing in their own Wi-Fi devices into the school's network. This paper discusses the challenges and solutions IT administrators are facing and how to address the security and management of the multiple devices being introduced into the wireless/wired network. Learn more.

A phased approach to IPv6 that's so easy, you'll almost think you're still ignoring it
Remember when you were a kid and you got so tired of your parents nagging you to clean your room, you finally just stopped listening? It's kind of that way with IPv6. Read More

Oracle buys Xsigo for software-defined networking
Oracle said Monday it has inked a deal to buy software-defined networking vendor Xsigo Systems, in a move that will support Oracle's ongoing foray into cloud computing. Terms of the acquisition, which is expected to close within a few months, were not disclosed. Read More

The 9 most endangered species in IT
The IT job landscape is evolving quickly. Here's how to avoid IT extinction Read More



SLIDESHOWS

18 Notable Apple Alumni
While some with Apple ties are already well-known, others may be surprising to find on the list.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 12 new network features in Windows 8
  2. How to watch the Olympics on the Internet
  3. Europe's supply of IPv4 addresses nearing depletion
  4. Researcher creates proof-of-concept malware that infects BIOS, network cards
  5. iPhone 5 rumor rollup for the week ending July 27
  6. The 5 hottest IT jobs right now
  7. The day VMware ate Cisco
  8. Windows 8 is a 'catastrophe,' says Valve founder and former Microsoft employee Gabe Newell
  9. Quirkiest moments at 2012 Black Hat security conference
  10. Microsoft announces new hardware for Windows 8

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_architecture_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment