Tuesday, July 29, 2014

Testbed will help clouds and networks shake hands

Network World Cloud Computing - Newsletter - networkworld.com
Georgia Tech launches early warning system for cyberthreats | Attackers install DDoS bots on Amazon cloud, exploiting Elasticsearch weakness

Network World Cloud Computing

Forward this to a Friend >>>


Testbed will help clouds and networks shake hands
A network testbed being constructed just south of San Francisco will help carriers and vendors develop standards for better cloud services, the Cloudethernet Forum says. Read More


: Smartling

Travel App Expands via Robust Translation Management System
Using Smartling's translation management platform, Hotel Tonight, a popular mobile travel app used to book same-day hotel stays, was able to grow its business internationally. In this case study, you'll learn about how Hotel Tonight was able to quickly expand into key tourism markets. Learn More

WEBCAST: IBM

The Next Generation of Big Data
Learn about IBM's new and expanded Information Management capabilities now delivered in the cloud. Learn More

Georgia Tech launches early warning system for cyberthreats
Georgia Institute of Technology's applied research arm has launched an early warning system to help organizations prepare for possible cyberattacks. Read More

Attackers install DDoS bots on Amazon cloud, exploiting Elasticsearch weakness
Attackers are exploiting a vulnerability in distributed search engine software Elasticsearch to install DDoS malware on Amazon and possibly other cloud servers. Read More

Is 'Bring Your Own Identity' a security risk or advantage?
Questions abound over websites authenticating users via identities established through Facebook, LinkedIn, Google, Amazon, Microsoft Live, Yahoo Ponemon Institute survey shows. Read More


WHITE PAPER: MovinCool

Using Ceiling-Mount Air Conditioners to Cool Server Rooms
A new class of self-contained ceiling-mount air conditioners offers a cost-effective solution for cooling server rooms. The compact, space-saving units fit easily above a drop ceiling, have low installation costs, do not require penetration of walls and have no outside condensing unit to maintain. Learn more!

INSIDER
How Aryaka's global private network speeds access to Internet apps
If you are trying to improve global access to your applications, you have probably considered one of several solutions: stringing together your own private network, purchasing WAN optimization appliances, or using a managed cloud-based service provider. Figuring out the benefits of each solution isn't easy and it is hard to test for variations in Internet connectivity, specific applications and other conditions. (Insider Story) Read More

Doing an Office 365 migration the right way
Migrating email from Exchange (on-premises) to Office 365 (in the cloud) would seem to be a pretty simple and straight forward process, and when you know what you are doing, it is a methodical process. However in the past 2-3 years that we've been doing Office 365 migrations, it's amazing the number of times we get called in to "fix something" that some other migration specialist did that has us shaking our heads wondering what they were thinking... Read More

Non-IBM Power8 servers, chips to appear early next year
The first third-party chips and servers licensed to use IBM's Power architecture will be on the market early next year. Read More


WHITE PAPER: Mobiquity Inc.

The Five Big Lies Leaders Hear About "Going Mobile"
Mobile hasn't been around long, but it has already made a tremendous impact. With such a new technology, it's not surprising that a lot of misinformation is floating around. Don't be taken in. Get the truth by reading this paper. It lays out how to develop an effective mobile initiative, one you need to succeed. Learn More

Qualcomm: Interoperability, community keys to wearable technology success
Speaking at the Wearable Tech Expo in New York on Thursday, Chandhok said that designs have focused on a simplified gadget-to-cloud model that, while impressive, creates headaches for users. He compared it to a connected home system that requires separate apps for each light switch, because each API is different. Read More

How to get into drones for cheap
By now, you've probably seen wasp-like model aircrafts buzzing around parks, or in the media, as unmanned aerial vehicles, swooping silently over dust-blown, rocky, insurgent-infested war zones. Read More

Amazon shares plummet following huge quarterly losses
It's starting to look like investors are losing their patience with the world's largest online retailer. Read More

Portnox NAC offers complete control, including over BYOD and cloud
Cloud computing, mobile computing and especially BYOD are bringing a new urgency to Network Access Control (NAC). Portnox offers a solution that reduces cost and complexity so organizations can deploy NAC in every branch location for complete enterprise coverage. Read More


SLIDESHOWS

Worst data breaches of 2014…So far

We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. 16 weirdest places you'll find Linux

2. 16 terrible computer pranks that could get you fired

3. Superclass: 14 of the world's best living programmers

4. 17 obscure Windows tools and tricks too powerful to overlook

5. 20 cool things you can do with a Raspberry Pi

6. 10 disturbing attacks at Black Hat USA 2014

7. 10 Linux distros to watch in 2014

8. Whatever happened to the IPv4 address crisis?

9. 20 top Android and iOS productivity apps for 2014

10. Top 10 security tools in Kali Linux 1.0.6


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cloud_computing_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: