Wednesday, December 11, 2013

Microsoft's latest, greatest scheme to woo Gmail users

  The biggest Internet security challenges of 2013 | Juniper: Quick look at security strategy behind its SDN controller security

 
  Network World After Dark

Forward this to a Friend >>>


Microsoft's latest, greatest scheme to woo Gmail users
Microsoft has opened another front in its webmail war against Google with the release of a new tool designed to automate the migration process for Gmail users who want to switch to Outlook.com. Read More
 


WHITE PAPER: Dell

Understanding Enterprise Cloud Governance
This whitepaper covers how to deliver the agility of cloud computing address while still maintaining operational control, through the use of cloud management software, View Now

In this Issue


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
  Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

The biggest Internet security challenges of 2013
From the attack on privacy and Cryptolocker to Eric Snowden and the NSA, it's been a challenging year Read More
 

Juniper: Quick look at security strategy behind its SDN controller security
  Juniper Networks in September made its software-defined network (SDN) controller known as Contrail generally available. Network World Senior Editor Ellen Messmer delves into the security strategy behind the Contrail controller in a discussion with Juniper's Senior Director of Product Management Jennifer Linn, and Chris Hoff, vice president of strategic planning in the security business unit at Juniper. Read More
 

DARPA targets $4.8M to close backdoor security problems
  The Defense Advanced Research Projects Agency has written a check for $4.8 million to Raytheon BBN Technologies and GrammaTech to build software that blocks backdoor security holes in commodity network devices. Read More
 

300 victims report fake support calls to security org
The Internet Storm Center, an arm of the SANS Technology Institute, has started collecting reports of fake support calls in an attempt to figure out how prevalent the scam is among computer owners. Read More
 

Blue Cross: 840,000 healthcare records at risk after laptop theft
Horizon Blue Cross Blue Shield of New Jersey (BCBSNJ) said on Friday that nearly 840,000 member that their information my be at risk, after two employee laptops were stolen in November. Read More
 

Silver Peak's new WAN feature could be essential
The corporate wide area network (WAN) is a funny thing. Even back in my early days as a network manager in the early 90s, there was talk of finding an alternative to the tried-and-true "hub and spoke" MPLS, frame relay, or other type of network. There's no question that this type of network, although widely deployed, is inefficient, as it routes all traffic through a single choke point (the hub).... Read More
 

How (and Why) to Get Started With SDNs
The rise of software-defined networks (SDNs) is one of the big tech stories of 2013. For many IT organizations looking at deploying the technology, it's no longer a question of 'if,' but 'when,' according to Gartner's Joe Skorupa, research vice president for Data Center Convergence and Andrew Lerner, research director for Networking, at Gartner. Read More
 

Robotic limbs blasting off to NASA's space bot
Robotic limbs blasting off to NASA's space bot Robotnaut 2 the robot aboard the International Space station is going to get new robotic apendages specially designed for zero gravity. From: Network World Videos Views: 0 0 ratings Time: 01:15 More in Science & Technology Read More
 

25 (mostly) tech company logos with hidden meanings
  Some logos are much more than meets the eye. Read More
 

Mozilla ships Firefox 26 with opening click-to-play move
Mozilla released Firefox 26, which kicked off a limited form of click-to-play and patched 15 security vulnerabilities, six marked "critical." Read More
 

Cisco wraps Insieme, works on UCS 2.0
Cisco this week completed its acquisition of spin-in Insieme Networks, the developer of Cisco's Nexus 9000 data center switching line and Application Centric Infrastructure fabric. Cisco said it could pay up to $863 million for Insieme, which launched its products Nov. 6, based on revenue achieved from the sale of Insieme products. Read More
 

Stats don't lie: Windows 8 has failed
You want to give a company the benefit of the doubt, but after several months, a pattern starts to emerge. A negative one that you can't deny. And in this case, a year's worth of stats don't lie: Windows 8 isn't going anywhere. Read More
 

Private Mars mission beams Lockheed Martin onboard to build spacecraft
Private Mars mission planners said today that Lockheed Martin is onboard to build the spacecraft that would land a technology demonstration robot on the Red Planet by 2018. The Mars One group ultimately wants to establish a human outpost on Mars. Read More
 

eBay changes IT with a metric
IT managers facing the task of explaining the business value of IT to the C-suite don't necessarily have an easy time of it. But eBay believes it has fixed this problem with a metric that translates IT resources into key business metrics Read More
 

US investigates allegations of Dell computer resales into Syria
The U.S. Department of Justice (DOJ) is investigating a report alleging that Dell computers have been sold to the Syrian regime despite the trade embargo in place, according to a July filing by Dell to the U.S.A Securities and Exchange Commission (SEC) that was made public this week. Read More
 

PC World's 50 best tech products of 2013
Read More
 

 

SLIDESHOWS

8 tricks to optimize Windows 8.1

Here are eight things we recommend doing to make Windows 8.1 more efficient.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 Linux distros to watch in 2014

2. Ubuntu 13.10: The good, the bad and the ugly

3. The worst IT project disasters of 2013

4. UPDATE: Microsoft backtracks on when it will stop selling Windows 7

5. 25 (mostly) tech company logos with hidden meanings

6. Symantec walks away from managed firewall and endpoint services

7. First Look: Dell's new campus network gear

8. 8 tricks to optimize Windows 8.1

9. Stats don't lie: Windows 8 has failed

10. Fatal distraction: 7 IT mistakes that will get you fired


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: