Tuesday, January 27, 2015

Why Apple should go into the mobile network business

Can drones hunt with wolf pack-like success? DARPA thinks so | Sad state of broadband in the US as cable industry balks at FCC's 25Mbps definition

Network World Wide Area Networking

Why Apple should go into the mobile network business
If Apple really wants to control the whole experience of using an iPhone, it's time to consider becoming an MVNO. Read More


WHITE PAPER: Box

A Mobile Security Checklist
Today's most productive employees are not tied to a desk. These top producers are experts at finding new ways to integrate mobile devices into their daily workflow. Your challenge is to build an IT strategy and architecture that can support this new way of working with easy, reliable, 24/7 access to information, from anywhere in the world. Learn more!

WHITE PAPER: IBM

2014 Gartner Magic Quadrant for Client Management Tools
IBM is positioned in the leaders quadrant. The Gartner Magic Quadrant for Client Management Tools evaluates tools that manage configurations and support system administration tasks for client devices.These tools automate system administration and support functions that would otherwise be done manually. Learn More

Can drones hunt with wolf pack-like success? DARPA thinks so
The Defense Advanced Research Projects Agency is set to detail a program the agency wants to come up with software and algorithms that would let unmanned military aircraft hunt in packs like wolves. The Collaborative Operations in Denied Environment or CODE program looks to extend unmanned aircraft mission capabilities well beyond the current state-of-the-art, by creating a modular software architecture that is resilient to bandwidth limitations and communications disruptions, yet compatible with existing standards and capable of affordable retrofit into existing platforms and in the end letting groups of unmanned systems work together under a single human commander’s supervision, DARPA stated.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Agari

How Big Data Can Stop Brand Abuse and Phishing for Commerce
Tools that use big data to analyze from the world's inboxes are providing a new way to prevent cyberattacks and stop brand abuse. Learn how Agari's cloud-based solution can guarantee rejection of phishing messages across the Internet to protect your brand, reduce your liability and enhance your consumer trust. Learn more>>

Sad state of broadband in the US as cable industry balks at FCC's 25Mbps definition
The FCC wants broadband to be defined as 25Mbps down and 3 Mbps up, but cable and telco companies think current slow US speeds are plenty fast enough for Americans. Read More


WEBCAST: IBM Corporation

5 Ways Elastic Storage Provides Performance and Scalability
Please Join IBM and Nuance Communications Inc. to learn how Nuance uses IBM Elastic Storage to improve the power of their voice recognition applications by managing storage growth, cost and complexity while increasing performance. Learn More

New products of the week 01.26.2015
Our roundup of intriguing new products from companies such as Dell and Hitachi. Read More

2015's 25 geekiest 25th anniversaries
A look back at the most memorable tech-related happenings of 1990. Read More


SLIDESHOWS

2015's 25 geekiest 25th anniversaries

A look back at the most memorable tech-related happenings of 1990.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

MOST-READ STORIES

1. Conference calls a waste of time? In 1915, this one made history

2. 8 Wi-Fi mistakes to avoid

3. US intelligence group wants to reverse-engineer human brain algorithms

4. Sad state of U.S. broadband as cable industry balks at FCC's 25Mbps definition

5. Oracle is quietly becoming a cloud giant

6. 13 geeky SkyMall catalog treasures you can't live without!

7. Is the ASUS X205 Microsoft's Chromebook killer?

8. Why did Microsoft skip Windows 9 and jump to Windows 10?

9. Thousands of U.S. gas stations exposed to Internet attacks

10. Scared of 802.11AC Wave 2 Wi-Fi? Here comes Cisco Multigigabit to the rescue


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wide_area_networking_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: