Monday, June 03, 2013

10 surprising things from my 20 years with Network World

  Endpoint Forensics Will Become a Mainstream Cybersecurity Technology | Factors converging to drive 10G
 
  Network World Voices of Networking

Forward this to a Friend >>>


10 surprising things from my 20 years with Network World
Yep, I've been writing for Network World for 20 years and a lot has happened in that time ... here are 10 of the most surprising Read More


RESOURCE COMPLIMENTS OF: AdRem Software

Automate network mapping, monitoring & troubleshooting
Still drawing your network maps manually? No time for configuring your network monitoring? NetCrunch 7 provides automatic discovery, mapping, and predefined monitoring rules. Watch network traffic flow in real-time. Use integrated troubleshooting tools and schedule automatic corrective actions in response to alerts - run scripts, restart services. RUN SIMULATION OR TEST IT ON YOUR NETWORK – FREE FOR 30 DAYS.

WEBCAST: Fluke Networks

Best Practices Performance Monitoring Recorded Webinar
Webinar will examine the driving factors, objectives, requirements, and best practices surrounding converged network and application performance management. Learn More

Endpoint Forensics Will Become a Mainstream Cybersecurity Technology
I've written blogs in the past with titles like, "big data security analytics is inevitable." Yes, I know this reads like a sound bite, but I truly believe that we need to collect, process, and analyze terabytes of real-time and historical data in order to detect stealthy cybersecurity events and adjust our security controls accordingly. Read More

Factors converging to drive 10G
The market for 10G Ethernet is poised for strong growth due to a number of factors, according to Crehan Research. Those factors include: Read More


WHITE PAPER: HP, Microsoft & Intel

Big Data Requires a Remodeling of the Data Warehouse
Take a few moments to learn about a data warehouse appliance that is a massively parallel server optimized to run Microsoft's SQL Server that delivers enterprise scalability, ease of maintenance, and a single version of the truth, all for a low cost. Read Now!

Fight for your privacy or lose it, says Eric Schmidt
When you think about people advocating privacy, it's doubtful that Eric Schmidt, Google Executive Chairman, springs to mind. Just the same, Schmidt told The Telegraph, "Whenever there's a conflict, the logic of security will trump the right to privacy." Read More

FBI: Cyber criminals hitting photo-sharing apps to spread malware, access information
The FBI today issued a warning that online criminals are using online photo-sharing programs like Instagram to initiate scams and dump malware on victims' computers. The FBI said offenders typically advertise vehicles online but will not provide pictures in the advertisement, rather they will send photos on request. Sometimes the photo is a single file sent as an e-mail attachment, and sometimes the... Read More


WHITE PAPER: Tripwire

SANS Secure Configuration Management Demystified
Security experts and analysts agree that a systematic, enterprise-wide program of secure configuration management is one of the most beneficial security solutions you can implement. It provides an objective, concise measure of your overall security posture. Learn More

What makes a Cool Vendor so cool
Gartner is well-known for its Magic Quadrants that detail the leaders and players in a given market. However, in recent years the firm has also started a new series called "Cool Vendors." According to Gartner, "Cool Vendors in 2013 are exploiting the Nexus of Forces of cloud computing, social, mobile, and information to challenge long-held assumptions and significant investments in traditional IT.... Read More

Funding for open source projects is more achievable than it seems
Supporting and funding the creation of open source software is hard. Having access to the source code (and the binaries/packages/installers) of our favorite software is an awesome, empowering thing. And having access to them for free? Even more so. But building great software takes time. And money. Even highly successful projects can have a hard time simply paying for their programmers, artists, testers... Read More

 
 
 

SLIDESHOWS

The 20 best iPhone/iPad games of 2013 so far

Fish turn into money, sorcerers rule and things get creepy in these iPhone and iPad games.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPhone 6 rumor rollup for the week ending May 31

2. Asus intensifies Android tablet price war with $129 Memo Pad HD7

3. FBI: Cyber criminals hitting photo-sharing apps to spread malware, access information

10. Cisco not looking to kill Microsoft/Skype deal, says Chambers

8. Stack wars: OpenStack v. CloudStack v. Eucalyptus

9. Look out, Google Fiber -- scientists build 400G connection

7. Microsoft outs the new features in Windows 8.1

4. How Fortune 500 companies are managing BYOD

6. The Moto X phone is real! It's really real!

5. Cisco leading 100G Ethernet

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment