Issue highlights 1. Your Wi-Fi speed stinks. Here are 10 things you can do about it. 2. WLAN revenues dip as buyers wait for 11ac products 3. Nothing says narcissist like wearing Google Glass on a date 4. FBI: Cyber criminals hitting photo-sharing apps to spread malware, access information 5. Cisco leading 100G Ethernet 6. PayPal's $100,000 Battle Hack competition wants cool social apps 7. Largest ever DDoS attack directed at financial firm, Prolexic reports 8. Security analytics will be the next big thing in IT security 9. INSIDER So you want to be a data scientist? |
RESOURCE COMPLIMENTS OF: SolarWinds SolarWinds® Alert Central consolidates alerts from all your IT monitoring tools and ensures they get to the right person, on the right team, at the right time. And the best part it's FREE! So stop managing your alerts manually. Get the free product today or learn more here >> |
Is your 802.11n router not keeping up with your 100Mbps downpipe, dropping HD video streams and copying files at mindboggingly slow speeds? Help is here! READ MORE |
Revenues for wireless LAN products dropped 7% in Q1 2013 compared to the previous quarter. The drop in part is due to buyers delaying purchases as they wait for new WLAN products based on the so-called "Gigabit Wi-Fi" standard, IEEE 802.11ac, according to Infonetics Research. READ MORE |
Rosa Golijan, writing on the Your Gadgets blog at Today.com, poses this question in a headline: "Will Google Glass destroy your love life?" She means can you wear Google Glass on a first date. The obvious answer, of course, is yes, yes you can ... as long as you're not interested in there being a second date. READ MORE |
WEBCAST: Fluke Networks See Jim Frey, Managing Research Director, Enterprise Management Assoc., Doug Roberts, Managing Director of Product Strategy, and Bruce Kosbab, CTO, Fluke Networks discussing how TruView redefines enterprise performance monitoring and troubleshooting. Learn More |
The FBI today issued a warning that online criminals are using online photo-sharing programs like Instagram to initiate scams and dump malware on victims' computers. The FBI said offenders typically advertise vehicles online but will not provide pictures in the advertisement, rather they will send photos on request. Sometimes the photo is a single file sent as an e-mail attachment, and sometimes the... READ MORE |
The worldwide Ethernet switch market was $4.7 billion in the first quarter of 2013, down 8% from the fourth quarter of 2012 but up 1% annually, according to Infonetics Research. The first quarter is seasonally soft but the market has grown over the past three quarters despite continuing weakness in Europe and the U.S. federal government vertical, the firm notes. READ MORE |
PayPal this week kicked off a global software-coding competition called Battle Hack, challenging software developers to devise on their own a socially useful application that makes use of PayPal payment processing. The grand prize: $100,000. READ MORE |
WEBCAST: CDW As mobile devices of every description proliferate across the enterprise, the IT pro must ensure that mobile applications have the bandwidth and security they need to run effectively. View Now |
DDoS attackers attempted to bring down an unnamed financial services firm earlier this week using one of the largest traffic bombardments ever recorded, mitigation firm Prolexic has reported. READ MORE |
Most enterprises have enough security technology in place to protect their businesses. They also have plenty of data from SIEMS and logs and other devices that tell them what's going on in their environments. What they need now is an automated method to use the vast amounts of event data. READ MORE |
After months of high unemployment and a still-wobbly economy, any good news from the jobs market is going to get some traction. But even that doesn't seem to fully explain the attention surrounding a suddenly very "in" job title: data scientist. READ MORE |
WHITE PAPER: IBM This Aberdeen Analyst Insight provides an overview of the top factors driving 2013 customer experience management (CEM / CXM) programs. Learn More. |
|
No comments:
Post a Comment