Tuesday, November 18, 2014

Encrypt everything, urges Internet Architecture Board

Network World Wide Area Networking - Newsletter - networkworld.com
  Bandwidth-hungry researchers gain 100G trans-Atlantic network connection | Cisco rounds out collaboration portfolio with Squared

 
  Network World Wide Area Networking  

Encrypt everything, urges Internet Architecture Board
The Internet Architecture Board (IAB) has issued a sweeping directive "for protocol designers, developers, and operators to make encryption the norm for Internet traffic ," even while acknowledging that such an approach will create major obstacles for some network operations.The statement also leaves unaddressed what will be inevitable howls of protest from the law enforcement and national security sectors, whose surveillance activities have long motivated those pushing for ubiquitous encryption.To read this article in full or to leave a comment, please click here Read More
 


: Brother International Corp.
 
Virtual Training Programs for Remote Sales Agents
Vehicle Protection Plus can train their sales agents, and get them productive, regardless of location using OmniJoin web conferencing. Find out how. Learn More>>

WEBCAST: Ciena Corporation
 
Security+ Guide to Network Security Fundamentals
Serious IT breaches happen too often. Is there a way to reduce or eliminate the impact on consumers? Attend this Live Webinar Dec. 2nd,1:00 PM ET / 10:00 AM PT to learn methods for protecting your information resources. Learn More

Bandwidth-hungry researchers gain 100G trans-Atlantic network connection
The pressure is on research networks to jack up bandwidth to support ridiculously fast supercomputers, and this week four of those networks will demo their new 100Gbps trans-Atlantic connection at the SuperComputing conference (SC14) in New Orleans. Read More
 

Cisco rounds out collaboration portfolio with Squared
Cisco's annual Collaboration Summit kicked off on Monday in LA. I believe this is the second collaboration event under GM Rowan Trollope, who has reshaped Cisco's business unit. During last year's event, Trollope was pretty matter-of-fact in acknowledging that collaboration at Cisco needed a face-lift. The various products didn't work well together and, in his words, Cisco technology was too complicated to deploy and hard to use. While he wasn't ready to discuss his long-term vision for the industry, he did say that his initial focus was on improving interoperability and making the products easier to use.Since his arrival in late 2012, Cisco has upgraded many of its hardware platforms, improved product interoperability, and rebuilt the interface for WebEx. Despite all of the work and upgrades, Cisco hasn't really come out with anything new under Trollope's tenure. Don't get me wrong – the new WebEx CMR is great, as are the new hardware endpoints, but I've considered those improvements on products that already existed.To read this article in full or to leave a comment, please click here Read More
 


WEBCAST: Ciena Corporation
 
Security+ Guide to Network Security Fundamentals
Serious IT breaches happen too often. Is there a way to reduce or eliminate the impact on consumers? Attend this Live Webinar Dec. 2nd,1:00 PM ET / 10:00 AM PT to learn methods for protecting your information resources. Learn More

2014 Holiday Gift Guide: The other NSA also knows what you want
Troy Galluzzi Our motto: "He Sees You When You're Sleeping, He Knows When You're Awake…" After months of investigations, cups of coffee and several arm-twisting interrogation tactics, the Cool Yule Tools staff of writers and editors has discovered a shocking truth. The government group that has allegedly been spying on us, known as the "NSA", is actually a cover group for a little-known organization with headquarters near the North Pole. Yes, we are speaking of the National Santa Agency.To read this article in full or to leave a comment, please click here Read More
 

Cool Yule Tools: Best techie gifts for 2014
The National Santa Agency has a handle on what everyone wants. Read More
 


WEBCAST: Ciena Corporation
 
Security+ Guide to Network Security Fundamentals
Serious IT breaches happen too often. Is there a way to reduce or eliminate the impact on consumers? Attend this Live Webinar Dec. 2nd,1:00 PM ET / 10:00 AM PT to learn methods for protecting your information resources. Learn More

 

INSIDER
5 steps to more mobile-security-savvy employees
  When it comes to mobile device security, we are our own worst enemies. Despite the fact that many people have come to rely on their mobile devices 24/7, most users don't appear to be getting any smarter about security, researchers say. The training module presents statistics about devices lost in airports and follows up with steps people can take to avoid misplacing their gadgets. Then the fun begins. Users assume the role of a Mario-type character in an online game, and they have 90 seconds to find 12 lost or stolen mobile devices in an airport based on the information they just learned. The user-controlled character runs through the airport — complete with check-in counters, a food court, a security conveyor belt and trams between terminals — and there's a rewarding "ding" for every device the user finds. "Nobody ever gets them all the first time, and they want to play it again," Lohrmann says.To read this article in full or to leave a comment, please click here(Insider Story) Read More

 

Senator demands answers about DOJ mobile phone surveillance planes
A reported mobile phone surveillance program at the U.S. Department of Justice raises serious privacy questions, a U.S. senator said Monday.The DOJ program, which reportedly uses cell-tower mimicking equipment on airplanes to target the mobile phone locations of criminals, raises questions about how many "innocent" people's mobile phone data is also swept up in the operation, said Senator Ed Markey, a Massachusetts Democrat. The DOJ has not confirmed the existence of the surveillance program, reported in a Wall Street Journal article on Thursday.To read this article in full or to leave a comment, please click here Read More
 

10 enterprise Internet of Things deployments with actual results
A look at some real-world IoT deployments that have actually delivered on the technology's massive promise. Read More
 

 

SLIDESHOWS

Pi, translated: The evolution of Raspberry Pi

It's only been two years, but the Raspberry Pi has already come a long way.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

MOST-READ STORIES of 2014

1. 20-plus eye-popping Black Friday 2014 tech deals

2. Mobile Pwn2Own: Windows Phone does well, iPhone 5S, Galaxy S5, Nexus 5, Fire Phone fall

3. Peeping into 73,000 unsecured security cameras thanks to default passwords

4. Black Friday iPhone 6, iPad Air deals spill forth from Walmart

5. 8 free online courses to grow your tech skills

6. 20 cool things you can do with a Raspberry Pi

7. Ten operating systems for the Raspberry Pi

8. Intel turns to light beams to speed up supercomputers

9. Cisco winning SDN battle: Chambers

10. 8 tech buzzwords that you need to know


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wide_area_networking_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: