Monday, October 07, 2013

802.11ac 'gigabit Wi-Fi' starts to show potential, limits

Your best 'Gigabit Wi-Fi' resources

Twitter's IPO risks include ads, users and financial losses

Network World Daily News AM
October 07, 2013
Share this email

802.11ac 'gigabit Wi-Fi' starts to show potential, limits

Vendor tests and very early 802.11ac customers provide a reality check on "gigabit Wi-Fi" but also confirm much of its promise.

READ MORE
 

Issue highlights

1. Your best 'Gigabit Wi-Fi' resources

2. Twitter's IPO risks include ads, users and financial losses

3. SDN pioneers share their secrets

4. Tale of two cloud-based management tools

5. Adobe hack shows subscription software vendors lucrative targets

6. Don't tell your insurance company you're a blogger

7. A breakup may be on the horizon for BlackBerry

8. Have you protected your privacy by opting out of cross-device ad tracking?

9. Understand and Obey the Laws of Networking

10. What would a smartphone mean to Amazon?

11. EFF chides NSA for stamping watchdog's doc Top Secret

12. 10 people who should have been Apple's Siri

WEBCAST: Dell Wyse and VMware

Creating and Driving Organizational Agility

IT is all about driving business agility. But you have to be agile to drive agility. And you calls for dynamic, flexible technology, like virtual desktop infrastructure. Explore how leveraging best practices and trusted partners through pre-configured solutions View Now

Your best 'Gigabit Wi-Fi' resources

"Gigabit" Wi-Fi has reached a point where it's now being deployed by some early adopters. There are more 802.11ac resources – test data, anecdotal observations, hands-on experience – and more products than ever before. READ MORE

Twitter's IPO risks include ads, users and financial losses

As Twitter looks to convince investors its IPO is a good bet, analysts are studying the biggest challenges facing the company, like finding a path to profitability while fending off rivals like Facebook and Google. READ MORE

SDN pioneers share their secrets

With the ability to create virtual networks quickly and efficiently – rather than programming network-connected hardware on an individual basis – software defined networks (SDN) appear to be the time-and-resource saving solution that overwhelmed IT managers have been looking for. READ MORE

Tale of two cloud-based management tools

Anturis and CloudPassage Halo are complementary products that attack infrastructure monitoring from different directions. Anturis is a cloud-based portal that monitors systems connectivity, systems, MySQL databases and websites. CloudPassage Halo monitors operating systems instances and the comparatively sticky compliance of instance state machines. READ MORE

WEBCAST: HP & Intel®

Cloud Knowledge Vault

According to market research, more than 60 percent of enterprises will have adopted some form of cloud computing by 2013. Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources in this HP & Intel® Cloud Knowledge Vault. View Now

Adobe hack shows subscription software vendors lucrative targets

Adobe on Thursday admitted that hackers broke into its network and stole personal information, including an estimated 2.9 million credit cards, illustrating the lucrative target that software-by-subscription providers have become to cyber criminals. READ MORE

Don't tell your insurance company you're a blogger

READ MORE

A breakup may be on the horizon for BlackBerry

BlackBerry's likely buyer, Fairfax Financial Holdings, faces a tough road after the close of the $4.7 billion deal, with many analysts saying its only option is to break up the company. READ MORE

Have you protected your privacy by opting out of cross-device ad tracking?

If you don't use the online anonymity network Tor, then you might not have more than a passing interest in the fact that the NSA sometimes uses ads, and cookies, to track and identify Tor users. To the NSA, you and your life may likely be yawnsville; you may be too "boring" to be a "person of interest" who is important enough to track (or maybe not). To an online advertiser, there is nothing too boring... READ MORE

WHITE PAPER: Citrix Systems

Delivering Enterprise Info Securely on tablets & smartphones

Android and iOS-based consumer devices including smartphones and tablets play an increasing role in enterprise computing, providing new flexibility and mobility for workers and IT—but creating new challenges around security. This paper describes these issues and explains how they can be addressed effectively with Citrix BYOD solutions. View Now

Understand and Obey the Laws of Networking

There are several universal laws in the networking world that we must all abide by. Understanding these laws gives us deeper insight into the connected world we live in. Like civil law, in some cases these laws are not necessarily meant to be broken. Other laws just beg to be broken in an attempt to innovate network technologies. Here are the laws of the physical networking universe that is continually... READ MORE

What would a smartphone mean to Amazon?

Amazon is reported to have two smartphones in development. Is Amazon developing a smartphone or is it developing its own smartphone business model? At this point a better question might be - what is a phone and why would Amazon care? Nielsen reported in 2008 that text messaging from predominantly feature phones topped voice calls. READ MORE

EFF chides NSA for stamping watchdog's doc Top Secret

One would imagine that lunch menus are stamped "Top Secret" at the NSA, but that didn't stop the Electronic Frontier Foundation from tweeting its indignation at seeing one of its documents getting swept up into the agency's web of secrecy. READ MORE

10 people who should have been Apple's Siri

Who could have been a great Siri? Samuel Jackson? Clint Eastwood? Scarlett Johanssen? READ MORE

WHITE PAPER: HP

Six Keys to Delivering User-Driven Mobile Applications

Meeting the needs for the enterprise user poses particular challenges. Apps must work seamlessly across devices and screen sizes, enabling real-time collaboration, without sacrificing data security. This balance requires a mobile app development platform built for the unique demands of the enterprise. Learn More

SLIDESHOWS

iOS 7 tips and tricks you need to learn

Some advice on getting the most out of Apple's new mobile operating system, iOS 7.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Hackers steal information on 2.9 million Adobe customers

2. The NSA quiz

3. The 'Bad Boys' of open source

4. Research buries Microsoft's Bing vs. Google claim

5. CSC: The cloud's quiet whiz kid

6. Cisco/Insieme ushering in hardware-defined networks

7. Did the Tea Party design the Obamacare website?

8. HP says open sourcing SDNs is wrong

9. Ubuntu impresses in Linux enterprise server test

10. Cisco paints its IT portrait

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment