Wednesday, September 04, 2013

FIRST LOOK: Samsung’s new Galaxy gadgets

  Will software-defined networking kill network engineers' beloved CLI? | FireEye offering APT-detection service to notify customers of stealthy attacks

 
  Network World After Dark

Forward this to a Friend >>>


FIRST LOOK: Samsung's new Galaxy gadgets
Our look at lineup of new Samsung hardware – including the industry's first smartwatch. Read More
 


RESOURCE COMPLIMENTS OF: SolarWinds

Right Size Your Network Performance Management Solution
Paying too much for network monitoring? This white paper follows four organizations in their search for the most cost-effective network performance management tool. See the challenges they encountered along the way and how they used product fit and Total Cost of Ownership (TCO) to make the switch from bloated, overpriced solutions to SolarWinds. Click here to get this FREE whitepaper from Enterprise Management Associates (EMA) and learn how four organizations benefitted from choosing SolarWinds award winning Network Performance Monitor.

WHITE PAPER: Condusiv Technologies

Boosting SQL Server Performance in a Virtual Environment
How can I/O optimization technology boost SQL Server response time by 130% and throughput by 50% in a virtual environment? openBench Labs tested V-locity VM in its independent lab—examining how the software dramatically increases SQL Server performance on VMs—with no additional hardware. Read now!

Will software-defined networking kill network engineers' beloved CLI?
SDN (software-defined networking) promises some real benefits for people who use networks, but to the engineers who manage them, it may represent the end of an era. Read More
 

FireEye offering APT-detection service to notify customers of stealthy attacks
FireEye today announced it has started providing a threat-detection and notification service called Oculus intended to warn the enterprise security manager whenever targeted attacks seek to undermine the network for cyber-espionage purposes. Such attacks are often called "advanced persistent threats," and may be attempts by nation states or their agents to penetrate a company to steal sensitive information, such as intellectual property. Read More
 

Researcher claims $12,500 reward for finding Facebook photo bug
A security researcher said Facebook will award him US$12,500 for finding a flaw that lets anyone remove photos from another person's profile. Read More
 

APT malware NetTraveler learning new tricks
Advanced Persistent Threat exploits Java vulnerabilities, embraces watering hole technique, says researcher Read More
 

iPad 5 rumor rollup for the week ending September 3
The iOSphere equivalent of food-binging on potato chips is picture-binging on iPad front and rear housings. This week the binge binges on. Read More
 

Getting kids used to surveillance
Read More
 

 

INSIDER
Cloud Helps Financial Company Spin Up a New IT Operation
Another company acquired about 75 percent of Lincoln Trust, along with its technology, which left the CTO with a pressing need for a new technology platforma(c). Read More

 

Topsy wants to become the Google of Twitter search
Searching through Twitter's archive of tweets can be frustrating -- they are sorted on the site by Twitter's own algorithms, and older tweets tend to get buried. Google? Forget it. Topsy, an analytics company, wants to do it better. Read More
 

Quick look: NASA's ambitious asteroid grabbing mission
NASA is developing plans for space mission to visit an asteroid Read More
 

 

SLIDESHOWS

Top tech hoarders: 15 companies with huge cash piles

Apple, Microsoft, Google and Cisco are flush with cash, and so are many other tech companies.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. IBM discovers its inner Kickstarter via enterprise crowdfunding

2. Top tech hoarders: 15 companies with huge cash piles

3. Amazon hiring 'top secret' IT staff as it fights for CIA work

4. IT hiring: Your text resume is sooo last century

5. A response to Padma Warrior's "Limitations of a software-only approach to data center networking"

6. Best tools for protecting passwords

7. Linux and desktop environments: Change is uncomfortable

8. Could this be Cisco's Internet of Everything core switch/router?

9. What does Microsoft's Nokia move mean to Apple?

10. 10 sorriest technology companies of 2013


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: