Monday, January 20, 2014

Watch out Amazon: What IBM’s $1.2B cloud investment really means

Network World Voices of Networking - Newsletter - networkworld.com
Prediction: Windows 9 will hit the market in 2014 | Why even ISPs will regret the end of net neutrality

Network World Voices of Networking

Forward this to a Friend >>>


Watch out Amazon: What IBM's $1.2B cloud investment really means
In classic IBM marketing flavor, Big Blue announced today a big investment into the cloud: $1.2 billion over the next two years to significantly beef up its international data center footprint for its cloud. Read More


RESOURCE COMPLIMENTS OF: DEMO Enterprise

What's trending in wearable computing and digital money?
Come to DEMO Enterprise, April 3 in SF to see the best new products in wearable computing, digital money, mobile, health, internet, enterprise, big data and more. All products are handpicked by top VC experts for their innovative design and market potential. Special offer to newsletter subscribers, register and save 40%.

WHITE PAPER: Sophos, Inc.

Mobile Device Management Buyers Guide
Mobile device management (MDM) solutions allow IT organizations to centrally manage, monitor and support mobile devices from smartphones to tablets. In this guide, you'll learn what you need to consider to find a MDM solution that best fits your needs. Learn More

Prediction: Windows 9 will hit the market in 2014
So the conventional wisdom now is that Threshold, the codenamed next major update to Windows, will be branded Windows 9 to lose the taint of unlucky 8 (ironic, since 8 is considered a lucky number by the Chinese) and ship in early 2015. What amuses me is how many people are buying it. I guess so much news whizzes by us in the tech press on a daily basis that we forget rather easily. Read More

Why even ISPs will regret the end of net neutrality
On Tuesday, the The U.S. Court of Appeals for the District Columbia Circuit said the FCC doen't doesn't have the authority to enforce its net neutrality rules. The ISPs and carriers typically maintain that net neutrality is a government plot to stifle networking investment. Read More

Innovation lives and dies with Net Neutrality
Routers have the built in capability to segregate traffic. With this court decision, there is nothing stopping network operators from doing the same with internet service, charging more for certain types of internet traffic. Read More

Security nightmare worsens for Windows XP's end of days
You all know (or better know) by now that Microsoft will end all support for Windows XP on April 8. Now the company is doubling down, saying it will end support for the XP version of Microsoft Security Essentials, the company's free security and antivirus application. That means no more updates, no more additions to the antivirus signatures, nothing. If a virus appears on April 9, you better have someone... Read More


WHITE PAPER: Silver Peak Systems, Inc.

The Differences Between Network Memory & Application Caching
Enterprises require an application acceleration solution that spans all types of traffic, one that is easy to manage, and 100% data coherency when supporting business-critical applications. This white paper will address these issues and offer a solution that addresses these enterprise requirements. Learn more >>

Cisco offers advice on Target breach
In the wake of the Target and Neiman Marcus data breaches, Cisco suggests encryption at the point-of-sale terminal. Read More

Try Amazon's cloud for free, using Red Hat tools
Red Hat, which is the largest single contributor to the OpenStack project, is now offering an opportunity to take a "test drive" on the biggest competitor to the OpenStack project: Amazon Web Services's cloud. Read More

Wearables – I'm Not So Sure…
I have heard from many people over the past two or three years how they no longer wear a wristwatch. The reason? Why bother - their smartphone does it all, and their smartphone goes with them everywhere. It's a little hard to argue with this logic - the user interfaces, richness of the information and the experience, and fundamental connectivity of the smartphone easily encompass the primary function... Read More

Blogger beat: Google's cozy $3.2B Nest buy – and hopes it won't be too cozy
Google's $3.2 billion buyout of smart thermostat and fire alarm system company Nest caught many by surprise, but those who have been following Nest recognize that this is a deal that was meant to be. Read More


WHITE PAPER: HP Tipping Point

Defending Against Increasingly Sophisticated Cyber Attacks
The modern cyber threat landscape requires enterprise organizations to be more vigilant than ever in their mission to protect sensitive data and network resources. This paper will outline the top factors that enterprise organizations should consider when evaluating an IPS deployment. Learn More

Father of Apple iPod now works for Google
Google today said it would buy Nest, the ever-so-cool home automation firm co-founded by former Apple engineer Tony Fadell in 2010 for $3.2 billion. Read More

Target's numbers on breach continue to miss the mark
The first word from Target was that 40 million customers had been victimized in its devastating data breach. That was corrected up to 70 million. Read More

Stuff from CES you might actually use
Last week's International CES brought about another slew of hyped products, ranging from curved television sets (I'm still not clear on why that's supposed to be so cool) to virtual-reality goggles meant to compete with the still-in-beta Google Glass product. While my main job was to shoot video segments for IDG Enterprise (you can see some of the results in this post, as well as in our video section),... Read More

3 Things enterprise IT can learn from the 2014 International CES
The International CES trade show that inundated Las Vegas and dominated tech headlines last week is no longer called the Consumer Electronics Show, but it's still all about consumer technology. That said, I found plenty of lessons for enterprise networking and technology professionals sprinkled among the more than 150,000 attendees, 3,000 exhibitors, and 2 million square feet of show floor. Here are... Read More


SLIDESHOWS

The worst data breach incidents of 2013

These businesses and government agencies lost the most personal and financial records due to hackers or security mishaps last year.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. This Raspberry Pi Tablet is absolutely gorgeous

2. Encrypted messaging startup Wickr offers $100K bug bounty

3. 14 steps to a better, faster Windows laptop

4. 8 ways that Chrome may be challenging Windows

5. Cisco: Thousands of web hosting centers now launchpads for attacks

6. How to make 96,000lbs of WWII machinery into high-tech research platform

7. 12 toughest U.S. cities for tech recruiting

8. Microsoft Hyper-V bangs away at VMware's popularity

9. SDN will never happen, says VMware exec

10. Juniper announces Firefly Suite for virtual-machine security


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: