Tuesday, March 31, 2015

IBM to pump billions into new IoT business unit

Akamai: Most Internet attacks in Q4 originated in China | Will open source save the Internet of Things?

Network World Wide Area Networking

IBM to pump billions into new IoT business unit
Hungry for a bigger piece of the Internet of things market, IBM will invest $3 billion over four years to establish a new business unit dedicated to providing IoT systems and services to enterprises.To read this article in full or to leave a comment, please click here Read More

WEBCAST: Aerohive

Gigabit Speed Wireless Networks with 802.11ac
With the development of 802.11ac, WLANs surpass the gigabit speed barrier. Watch this webinar recording featuring author of "802.11ac: A Survival Guide" (O'Reily), Matthew Gast, for a discussion on 802.11ac and why it's posed to become the 802.11 standard of choice and how to incorporate it into your network plans. View now>>


Rethinking Enterprise Wireless Networks
This paper from IDC explores the trends, challenges, and solutions that the latest generations of WiFi architecture deliver. View Now>>

Akamai: Most Internet attacks in Q4 originated in China
The number of DDoS attacks in 2014 remained nearly the same compared to 2013 Read More

Will open source save the Internet of Things?
Middleware standards based on open source could be the glue that pulls IOT solutions together. Read More


WLAN Buyer's Guide
It is crucial to thoroughly understand the systems management capabilities of any WLAN being considered, since this will be the largest ongoing expense of the overall deployment. Learn how to evaluate properly by reading Aerohive's WLAN Definitive Guide. View Now>>

5 freshly-funded cloud computing companies worth watching
Investors made a crowd around the cloud this week, investing $175 million in companies focused on everything from storage to the WAN to the supply chain. Read More

Flaw in common hotel router threatens guests' devices
Corporate travelers should be warned that a vulnerable Wi-Fi router commonly used in hotels is easily compromised, putting guests passwords at risk and opening up their computers to malware infections and direct attacks. Read More


The Network Impact of 802.11ac
This paper discuss two approaches for efficient WLAN design. Both let you integrate 802.11ac into your WLAN and help lay the foundation for future, high-speed technologies. View Now>>

Cisco programs the cloud
Virtualization and scale enhancements for service provider routers address traffic growth, network agility Read More

Modernizing enterprise apps for the mobile world
At SaskPower, an electric utility serving the Canadian province of Saskatchewan, the IT philosophy is leverage, buy or build -- in that order. So when SaskPower wanted to make its SAP applications available on mobile platforms, officials first looked inward to see if those systems could be extended out.To read this article in full or to leave a comment, please click here(Insider Story) Read More

Amazon debuts bottomless storage plans for photos, data
If you’ve got tons of digital photos and music that are a headache to back up, Amazon wants to interest you in two new storage services designed to ease home backups and archiving.The company’s new Unlimited Everything plan provides what promises to be unlimited storage for US$59.99 per year. The company has also introduced unlimited storage for just photos, at $11.99 a year. Free three-month trials are available for both services, which will replace its heretofore standard free 5GB plan for anyone who bought digital content from Amazon.Customers can store any sort of digital material on the Unlimited Everything plan, including photos, videos, files, documents, movies, and music. The Unlimited Photos allows unlimited storage of photos, and also includes 5GB of additional storage for other files. Amazon Prime members will get the unlimited photo storage service at no cost.To read this article in full or to leave a comment, please click here Read More

Anonymous proxies now used in a fifth of DDOS attacks
The number of distributed denial of service attacks using anonymous proxies has increased dramatically over the past year, according to a new research report, as attackers use these proxies to create an instant pseudo-botnet. Ofer Gayer, security researcher at Redwood Shores, CA-based Incapsula Inc., said he first spotted the trend about a year ago. Incapsula was working on creating a database of IP addresses spotted attempting malicious activity, and discovered that attackers were abusing anonymous proxies to turn a regular single-origin denial of service attack into a distributed denial of service attack with traffic flowing through thousands -- or tens of thousands -- different IP addresses.To read this article in full or to leave a comment, please click here Read More


Meet the White House's new open source-happy IT director

"First Geek" David Recordon comes from Facebook, open standards world.


As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn


1. 'Largest DDoS attack' in GitHub's history targets anticensorship projects

2. Acer Chromebook 15 review: Massive display, with mixed results overall

3. Linus Torvalds suspends key Linux developer

4. NAC is back. And better than ever

5. 9 security gadgets for mobile devices

6. SDN management battle: TAPs vs. network packet

7. Review: Portnox, Extreme lead NAC pack

8. Microsoft adds MDM capabilities to Office 365

9. 9 Common Spanning Tree Mistakes

10. 8 free Wi-Fi stumbling and surveying tools

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wide_area_networking_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

No comments: