Thursday, September 24, 2015

As containers take off, so do security concerns

Encryption project issues first free SSL/TLS certificate | New wireless science promises 100-times faster Wi-Fi

Network World Network Optimization

As containers take off, so do security concerns
Containers offer a quick and easy way to package up applications and all their dependencies, and are popular with testing and development. According to a recent survey sponsored by container data management company Cluster HQ, 73 percent of enterprises are currently using containers for development and testing, but only 39 percent are using them in a production environment. But this is changing. Read More


WHITE PAPER: McAfee

Busted: Seven Myths of Advanced Malware
Several misconceptions have arisen concerning advanced malware. This guide examines seven of the most common ones and helps you distinguish between myth and reality. Learn more >>

WEBCAST: Aerohive

What iBeacons Mean for Your Existing Wireless Network
You may have heard the buzz about iBeacon, a technology that enables proximity-based services for mobile devices. To learn about iBeacon and how it can impact your company, watch the recording of Aerohive's latest webinar, "What iBeacons Mean for Your Existing Wireless Network and Your Business". View Now>>

Encryption project issues first free SSL/TLS certificate
A project that aims to increase the use of encryption by giving away free SSL/TLS certificates has issued its first one, marking the start of its beta program. The project, called Let's Encrypt, is run by the Internet Security Research Group (ISRG) and backed by Mozilla, the Electronic Frontier Foundation (EFF), Cisco and Akamai, among others. Read More

New wireless science promises 100-times faster Wi-Fi
Terahertz radiation (T-Ray), also known as submillimeter radiation, could be the next wireless radio band to be used for data, after we move on from 5G.5G is our next-generation mobile wireless—likely made up of predominantly millimeter spectrum. Read More

Back blaze takes on Google, Amazon with storage at half a penny a gigabyte
Online backup service provider Backblaze today announced a new service offering: as much storage as you want for half a cent per gigabyte per month.Backblaze's new B2 Cloud Storage, is a raw cloud storage service, meaning data is not encrypted or manipulated in any way. Users can encrypt their own files prior to storing them on the service for added security. Backblaze Comparison chart of cloud storage services.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: CYREN

How to Overcome Web Security Challenges
Welcome to the 21st century, where securing your legacy computing environment means trying to protect legacy systems that were never intended to do what they do today. A better approach is to protect users on whatever device they use and create a more secure environment overall. Learn how. Learn More

INSIDER
Review: Parallels 11 delivers seamless Windows/Mac integration
If you're an end user who wants the best-of-both-worlds experience of running Windows on a Mac, or if you're an IT admin who wants to gain more control over the Macs running on your network, Parallels Desktop 11 for Mac is a great option. (Insider Story) Read More

Can your network withstand the Internet of Evil Things?
From cars to home electronics to medical machines and industrial sensors and controls, all types of devices are gaining the ability to communicate. Read More

Datiphy tracks what data is up to for security, auditing purposes
Datiphy, a service provider founded in Taiwan, has bundled its technology for sale as a software package to make inroads in the U.S. as a security/data auditing tool that detects and reports suspicious access to databases. Read More


WHITE PAPER: Absolute

HIPAA Violations Incur Multi-Million in Penalties
As mobile transforms into an overall endpoint-computing strategy, IT leaders need to embrace endpoint-computing innovation and re-evaluate their strategies. Click to learn more. Learn More

Is a lack of enterprise apps killing BYOD?
As BYOD hangs on as an acceptable way to arm your employees with their own technology, companies need to make sure that employees can work seamlessly on those devices. One way to do that – and give employers some control of where their data goes – is through enterprise apps. Getting those apps right can be tricky, but are crucial in putting a good BYOD policy in place, even as employees still bristle at their bosses being able to perhaps peer into the personal side of those devices. Read More

Is Nuage really key to Nokia?
Despite the departures of two founders, Nuage Networks is key to Nokia's SDN ambitions once the Alcatel-Lucent acquisition closes, the company says. Alcatel-Lucent launched Nuage in 2013 as an internal start-up to develop a software overlay for automating and orchestrating hybrid clouds. Read More

6 ways to blow your technical job interview
If you're looking for a job as a software developer, information systems manager, network engineer or any other hands-on role in IT these days, chances are you'll have to pass a technical screening as part of the interview process. Read More

Attackers can take over Cisco routers; other routers at risk, too
Attackers have successfully infected Cisco routers with an attack that persists to provide a means for compromising other machines and data on the networks the routers serve, FireEye says. Read More


SLIDESHOWS

8 reasons the Apple Watch is more trouble than it's worth

This hands-on review tells what it's like using an Apple Watch every day for a month, and explains why Apple's smartwatch is not worth the trouble.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. ARIN Finally Runs Out of IPv4 Addresses

2. CIA details agency's new digital and cyber espionage focus

3. Early iPhone 6S reviews: Apple's got another winner

4. 19 free cloud storage options

5. Settings in iOS 9: Every notable change you need to know

6. 3 Big takeaways from Amazon's latest cloud outage

7. Five signs an employee plans to leave with your company's data

8. How Apple's App Store malware is attacking iOS users

9. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac

10. Malware implants on Cisco routers revealed to be more widespread


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


ads

Ditulis Oleh : Angelisa Vivian Hari: 6:51 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive