Tuesday, June 16, 2015

Two years on, Google's Project Loon drifts into focus

Group asks FCC to make websites honor do-not-track requests | Silver Peak launches MPLS killer

Network World Wide Area Networking

Two years on, Google's Project Loon drifts into focus
Google X project is clearing technical and price hurdles, but commercial plans are still unknown. Read More


WHITE PAPER: F5 Networks

Fight Malware, Malfeasance and Malingering
Every year brings an even more extreme set of threats to the enterprise than the last. The good news is that enterprises have a range of mitigation options. The question is which solution offers the organization the greatest protection and control without adding complexity or unnecessary costs. Learn more >>

WHITE PAPER: PC Connection

Acer: Proven Solutions for Professional Demands
Whether your workforce requires high-tech mobility, powerful desktops to streamline efficiency, reliable technology available 24 x 7, or competent tools for viewing and projecting, you'll find your solution in Acer notebooks, desktops, servers, monitors, and projectors. Acer provides solutions for you. Learn more.

Group asks FCC to make websites honor do-not-track requests
The agency has an obligation to protect privacy and promote broadband deployment, Consumer Watchdog says Read More

Silver Peak launches MPLS killer
Unity EdgeConnect offers painless way to switch to broadband-based or Software-Defined WAN Read More


WHITE PAPER: Citrix Systems

A Powerful Defense Against Denial of Service Attacks
This white paper examines the current DoS landscape and discusses common approaches for dealing with the modern DoS threat. It explains how the Citrix NetScaler application delivery controller (ADC) provides a robust yet highly affordable foundation for an organization's DoS defenses. Learn more >>

IDG Contributor Network: IoT to cause major security headaches, says report
Consumers not understanding that they will need to patch IoT devices, is among the nightmare security issues discussed in a new report. Read More

US House votes to ban Internet access taxes permanently
The House vote would extend a moratorium that's been in place since 1998 Read More


WHITE PAPER: AppNeta

10 Steps for Success When Moving MS Office to the Cloud
Are you considering or in the process of migrating to Office 365? Concerned about performance impacts on user experience? Our eBook is your guide to ensuring user experience success as you prepare to migrate to the cloud. View now

Parents more worried about online safety but doing less about it, survey finds
What are we to make of this survey data from FindLaw.com?Seventy-six percent of 643 parents surveyed say they are extremely, very or somewhat worried about their children’s online safety, up from 64 percent in 2011. And the “not worried at all” contingent has been cut in half from 14 to 7 percent.Meanwhile, 66 percent of those polled say they are taking steps to reduce online risks – monitoring, site-blocking, etc. -- which represents a decline from the 74 percent who said they were taking such precautions four years ago.More are worried. Fewer are doing anything about it. What gives?My best guess: fatigue combined with a sense of futility.To read this article in full or to leave a comment, please click here Read More

MIT researchers find unemployed workers stay off their phones
The amount of time people in a given area spend using their cell phones shrinks when the job market begins to dry up, according to a study co-authored by researchers at MIT.The study, which tracked people living in a European town in which a plant had just closed, found that the total number of calls made by laid-off workers fell by 51%, when compared to the phone activity of the employed. Individually, each unemployed worker made 5% fewer calls.+ ALSO ON NETWORK WORLD: First Look: How will Windows 10 play on tablets + What do today's graduates expect in the workplace? +To read this article in full or to leave a comment, please click here Read More

INSIDER
Mobile management on the rise, but many companies still at risk
There's a lot of confusion, disruption and even turbulence in the market for enterprise mobility management (EMM) software, which is used to manage smartphones and tablets and the data and apps running on them."BlackBerry deserves to be considered a leader in EMM today," Beard concluded.To read this article in full or to leave a comment, please click here(Insider Story) Read More

INSIDER
Cloud fears fizzle, mission-critical deployments sizzle
Not long ago, the prospect of outsourcing mission-critical applications to a cloud service provider made IT managers cringe. Despite promises of agility, scalability, and the elimination of infrastructure management headaches, there were serious concerns about security and regulatory compliance.To read this article in full or to leave a comment, please click here(Insider Story) Read More


SLIDESHOWS

5 low-cost Wi-Fi stumblers and analyzers

Wi-Fi stumblers and analyzers are a must-have when troubleshooting Wi-Fi interference and performance issues, or when checking channel usage.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPhone 7 rumor rollup: Apple gets funny, iOS 9 drops hints

2. First Look: How will Windows 10 play on tablets

3. Grading Cisco Cybersecurity after CiscoLive

4. 19 free cloud storage options

5. Don't call it Linux! And other things that tick off Richard Stallman

6. Review: Single sign-on tools offer impressive new capabilities

7. Disney ABC TV cancels plans to outsource IT jobs

8. 11 pointless but awesome Linux terminal tricks

9. 9 hot enterprise storage companies to watch

10. Peeping into 73,000 unsecured security cameras thanks to default passwords

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wide_area_networking_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment