Tuesday, December 09, 2014

Full speed ahead for 802.11ac Gigabit Wi-Fi

  Juniper unbundles switch hardware, software | The 5 worst Big Data privacy risks (and how to guard against them)

 
  Network World Wide Area Networking  

Full speed ahead for 802.11ac Gigabit Wi-Fi
Last December customers were peppering wireless LAN vendors with questions about whether to upgrade to the pre-standard-but-certified 802.11ac products flooding the market or hold off until 2015, when more powerful "Wave 2" Gigabit Wifi gear was expected to become prevalent. A year later, even though Wave 2 products have begun trickling into the market, many IT shops seem less preoccupied with Wave 2 and more focused on installing the Wave 1 11ac routers, access points and other products at hand. Read More
 


WHITE PAPER: Riverbed Technology

Riverbed Optimization System: Technical Overview
The Riverbed Optimization System (RiOS™) powers Riverbed's unique line of SteelHead™ application acceleration appliances and Steelhead Mobile client software. RiOS is based on technologies that solve a range of problems affecting wide area networks (WANs) and application performance. View Now>>

WHITE PAPER: Curvature

Smart Companies are Migrating their Maintenance Contracts
By refocusing their strategy to maintenance contracts that are independent of OEM policies, companies can maximize their IT budget while managing their infrastructure more efficiently. Read about alternative strategies and debunk IT market myths. View now

Juniper unbundles switch hardware, software
Juniper Networks this week rolled out a switch based on hardware from the Open Compute Project designed to run its Junos network operating system software, and others. Read More
 

The 5 worst Big Data privacy risks (and how to guard against them)
The collection and manipulation of Big Data, as its proponents have been saying for several years now, can result in real-world benefits: Advertisements focused on what you actually want to buy; smart cars that can call for an ambulance if you're in an accident; wearable or implantable devices that can monitor your health and notify your doctor if something is going wrong.But, it can also lead to big privacy problems. By now it is glaringly obvious that when people generate thousands of data points every day – where they go, who they communicate with, what they read and write, what they buy, what they eat, what they watch, how much they exercise, how much they sleep and more – they are vulnerable to exposure in ways unimaginable a generation ago.To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: Agari

Understanding DMARC for Securing Email Channels
Learn more about how DMARC is combined with existing authentication technologies to create secure email channels, and provide receivers with clear directives on how to safely dispose of unauthorized email - all at Internet scale. Learn more!

Red Hat product president Paul Cormier disses the Docker myth
So just what is the relationship between red-hot container company Docker and open source stalwart Red Hat? Are the two companies on the same side, or not? Do Docker containers complement or compete with Red Hat's Linux offerings?To get some answers, I talked with Paul Cormier, Red Hat's president of products and technologies, and he had some pretty strong opinions on the subject. But it all boils down to Red Hat's position that container technology (and Docker) simply isn't the be-all and end-all that many people seem to want it to be—at least not in the enterprise.Technology, not business"Containers can solve a lot of problems for enterprise," Cormier told me. "But it matters what's inside the container – what pieces of the user space OS and which Linux host the containers run on."To read this article in full or to leave a comment, please click here Read More
 

 

INSIDER
Wanted for hire: Engineers with ideas of their own
It's a playground for engineers inside the new offices of Cambridge Consultants.To read this article in full or to leave a comment, please click here(Insider Story) Read More

 


: Venafi

Securing Keys and Certificates to Critical Assets
Today's most devastating cyber attacks—including ShellShock, Heartbleed and Zombie Zero—prey on trust. And that puts your digital certificates at risk. This informative resource center explores how next-generation trust protection can help you combat today's attacks, ensuring trusted access to critical assets. Learn More

How to speed up your network without replacing your AirPort Extreme Base Station
With the addition of a faster (and less expensive) wireless router, you can speed up your existing network. Read More
 

Imagine traveling in an airliner without access to any of your personal electronic devices
The reason you're being asked to imagine the horror of air travel with no electronics is that counterterrorism officials here and abroad are reportedly considering just such a restriction in response to heightened concerns about bombs in carry-on luggage.That's on top of considering a ban on carry-on luggage.From an NPR story: Another possible remedy: banning electronic devices from the passenger cabin. Officials are discussing whether to require that electronics such as cellphones, iPads and computers be placed in the cargo hold with checked baggage, which goes through a much more rigorous screening process. Detecting a bomb, if there is one, would be more likely.To read this article in full or to leave a comment, please click here Read More
 

 

SLIDESHOWS

Cisco's top 10 innovations over the years

A look back at Cisco's most innovative moves in its 30 years in the industry.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Cisco slaps Arista Networks with patent, copyright infringement suits

2. Remember when Cisco sued Apple over the iPhone name?

3. Sony hack dubbed 'unparalleled' crime, 'unprecedented' due to undetectable malware

4. 30 years of Cisco: The networking giant's boldest predictions over the years

5. Cisco's top 10 innovations over the years

6. Full speed ahead for 802.11ac Gigabit Wi-Fi

7. Peeping into 73,000 unsecured security cameras thanks to default passwords

8. 5 ways to prepare for Internet of Things security threats

9. 8 free online courses to grow your tech skills

10. Top 10 states for tech workers willing to relocate


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wide_area_networking_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment