Wednesday, August 13, 2014

How to fix your Ubuntu Internet connection

The Linux desktop-a-week review: MATE | New security tools from Tenable, HP, Co3 attempt the impossible

Network World Linux and Open Source

Forward this to a Friend >>>

How to fix your Internet connection in Ubuntu Linux
Ubuntu's included NetworkManager software aims to make your network connections just work. Nevertheless, sometimes thing go awry.There are times you have to adjust or change your connection settings, especially when using a laptop. Luckily,you won't have to pull up the terminal and type any arcane commands to make your Internet connection work.To read this article in full or to leave a comment, please click here Read More

WHITE PAPER: Citrix Systems

Magic Quadrant for ADCs
Citrix is positioned in the Leaders Quadrant for Application Delivery Controllers for the seventh consecutive year: the Gartner Magic Quadrant Report focuses on vendor's ability to solve complex application deployment challenges. Don't miss this chance to learn from Gartner's independent research. Learn More


Meeting the Exploding Demand for New IT Services
In this eBook, explore the top trends driving the New IT for IT Service Management, and how leading organizations are evolving to focus on end-user experience. Learn More

The Linux desktop-a-week review: MATE
I started out my `use every Linux Desktop Environment for a week at a time' endeavor with Enlightenment and Awesome, two profoundly different environments that I didn't previously have a huge amount of hands-on experience using.For the third one, I selected a Desktop Environment that I have given a rather hard time recently - MATE.To read this article in full or to leave a comment, please click here Read More

WHITE PAPER: Citrix Systems

Solving the ADC Market Share Riddle: Winning the Data Center
No other ADC is better equipped to master those transformations than Citrix NetScaler. Gartner Inc.'s market share report confirms that NetScaler alone lives up to the full potential of ADCs for supporting today's IT requirements. Learn why other leading ADCs fall short while Citrix NetScaler gained share consistently for six consecutive quarters. Learn more

New security tools from Tenable, HP, Co3 attempt the impossible
Automated incident response is one of the fastest growing fields in computer security. Alternatively called threat monitoring, vulnerability management or threat management, it encompasses the seemingly impossible task of defending a network from active threats as they happen, in addition to detecting every possible vulnerability that could be exploited by an attacker. As such, you don't see tons of companies jumping into this area. But several companies have come out with automated incident response products and three of the leading vendors accepted our invitation for a comparative review -- Tenable Network Security SecurityCenter, Hewlett Packard WebInspect and Co3 Systems Security Module.To read this article in full or to leave a comment, please click here Read More


Prioritize Capacity Planning with BMC Capacity Optimization
Current trends underscore the requirement for truly global and adaptable capability for optimizing capacity across domains with full insight into business service outcomes. Learn why EMA has put BMC in the lead as the vendor with the fullest breadth and depth of its capacity optimization capabilities. Learn More

Smartphone kill-switch bill passes California assembly
A bill requiring that all smartphones sold in California contain a kill-switch; that allows users to disable them if stolen was approved by the California Assembly on Thursday morning.The bill had previously been approved by the state's senate although it will have to return for a vote on amendments made by the assembly. If those are approved, it will pass into law once signed by Governor Jerry Brown.The California bill mandates that all smartphones contain software that will allow the user to remotely wipe the phone of personal data and lock it so it cannot be used unless an unlocking code is entered. Read More


Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.


As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn


1. Netscout sues Gartner over Magic Quadrant rating

2. Why TCP/IP is on the way out

3. Amazon Fire Phone: Nice but nothing to get fired up about

4. Rackspace bows out commodity IaaS market in favor of 'managed cloud'

5. Cisco's new UCS fabric interconnect: no ACI?

6. Smartphone kill-switch bill passes California assembly

7. Emerging networking technology used by Apple, Cisco will frustrate firewalls

8. IBM/DARPA turn out brain-like 5-billion transistor superchip

9. 10 ways to get noticed at Black Hat

10. Top 20 colleges for computer science majors, based on earning potential

Do You Tweet?
Follow everything from on Twitter @NetworkWorld.

You are currently subscribed to networkworld_linux_open_source_alert as

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact:

To contact Network World, please send an e-mail to

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to **

No comments: