Tuesday, December 1, 2015

With internet connection reaching new heights, ITU looks to the IoT

Handicapping Enterprise Security Vendors | DARPA wants early warning system for power-grid cyberattacks

Network World Wide Area Networking

With internet connection reaching new heights, ITU looks to the IoT
The number of connected people on the planet has reached 3.2 billion, according to a report from the International Telephone Union (ITU.) Managers, marketers, engineers, and designers who are building mobile and internet products for international consumption should read the full report. To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: ExtraHop Networks

Designing and Building an Open ITOA Architecture
With the aim of providing practical and prescriptive guidance, this paper introduces a taxonomy that covers the primary data sets that serve as the foundation of Open ITOA. Learn more >>

WHITE PAPER: VMTurbo, Inc.

Demand-Driven Application Control: Assuring App Performance
In this paper, we examine the evolution of enterprise applications, the data centers in which these applications reside and the increasing expectations of businesses and end-users on the Quality of Service (QoS) their applications deliver. Learn More

Handicapping Enterprise Security Vendors
In the course of my average work day, I try to read all the cybersecurity news I can.  I came across a very good article in Forbes that looks at the cybersecurity opportunities for companies like IBM, Cisco, Dell, and others.  The article points out that the market for cybersecurity products and services is estimated at $77b today, growing to $120b by 2020.  That’s a lot of firewalls, AV software, and identity tokens!Since I agree with some of the author’s points and disagree with others, I decided to post my own thoughts on my list of leading enterprise security vendors.To read this article in full or to leave a comment, please click here Read More

DARPA wants early warning system for power-grid cyberattacks
Developing systems to protect the nation’s electric grid has been a key goal for many public, private and government developers for years – yet exerts say the grid is still largely vulnerable of serious cyberattackers.The Defense Advanced Research Projects Agency (DARPA) is looking to bolster the nation’s grid defenses with a system called Rapid Attack Detection, Isolation and Characterization (RADICS) that will detect and automatically respond to cyber-attacks on US critical infrastructure.+More on Network World: 21 more crazy and scary things the TSA has found on travelers+To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: VMTurbo, Inc.

Assuring Application Performance at Scale
This paper explores the benefits of incorporating network traffic to topology information in VM placement decisions, as well as the integration between VMTrubo and Arista Networks. Learn More

Considering a hardware RAID? Here's what you need to know
It’s quiz time: what’s the single most important thing in your Mac computing environment? Is it the actual Mac model you use? Is it the size of the display attached to the Mac? The speed of the CPU? The amount of memory? The size of the hard drive? The speed of and memory on the graphics card? The network connectivity?While all of those may seem important, I would argue that the most important thing in your Mac computing environment isn’t any of those things. In fact, it’s nothing you can directly touch or see. It’s your data. Whether that data is photographs or text documents or code or 3D CAD drawings or digital artwork, it’s your data that’s truly important. All the other stuff is hardware, and is easily replaced. Your data is irreplaceable. That’s why you have a backup plan, right?To read this article in full or to leave a comment, please click here Read More

VPN bug poses privacy threat to BitTorrent downloaders
A bug affecting some VPN services can be used to figure out a computer's real IP addresses, including those of BitTorrent users, which could pose a huge privacy and possibly a legal risk.The vulnerability affects those services that allow port forwarding, according to VPN provider Perfect Privacy, which wrote about the issue on Thursday.A successful attack requires a couple of conditions to be met: the attacker must be on the same VPN network as the victim, who also has to be lured into connecting to a resource controlled by the attacker.To read this article in full or to leave a comment, please click here Read More


WEBCAST: IBM

Enabling Multi-Speed IT Transformation
Cloud, Mobile and Social are today's communication and engagement models for customers, employees and partners. And to support these models, your infrastructure needs to be simple, flexible, stable, scalable and highly secure. Learn More

It's cloud soon gone, HP aligns with Microsoft Azure
Hewlett-Packard Enterprise has partnered with Microsoft to offer its Azure cloud services to customers, filling a gap when HPE closes its own public cloud early next year.Microsoft will be a "preferred" public cloud partner to HPE, and HPE will become a "preferred provider" of Microsoft Azure services, CEO Meg Whitman said on HP's quarterly earnings call Tuesday. She didn't provide details but said they'll be forthcoming at HPE's Discover conference in London next month.It's no surprise to see HPE cut its first cloud deal with Microsoft rather than Amazon or Google. The companies work closely in servers and PCs, and they're both trying to sell customers a mix of on-premises and cloud products.To read this article in full or to leave a comment, please click here Read More

IDG Contributor Network: Equinix extends AWS Direct Connect to London, Dallas
Equinix has, over the past several years, played the role of connector between a number of public cloud vendors and organizations' existing IT assets. It's a natural move for Equinix, which, as a global vendor of data center space, is an important utility provider, but obviously doesn't really play much up the value chain. Direct Connect helps them to change that, allowing companies to connect their privately owned and managed infrastructure to AWS. It also performs a similar role for other public cloud platforms, Microsoft Azure for example.The reasons for providing these connections are obvious - privacy, security, throughput, and application performance all benefit from these high-spec pipes. A recent study released by Equinix, titled Enterprise of the Future, found that by 2017, 84% of IT leaders will deploy IT infrastructure where interconnection – defined as direct, secure physical or virtual connections  – is at the core, compared to only 38% today. Don't let it be said that interconnection is not an important part of the modern enterprise IT organization.To read this article in full or to leave a comment, please click here Read More

How to get the most out of an IT outsourcing vendor visit
IT organizations are conducting fewer site visits before signing new offshore outsourcing deals. IT leaders “due to a sense of urgency in the sourcing and selection process, lack of time and the cost of the travel investment” are less inclined to take the long-distance trek, says Steven Kirz, partner with outsourcing consultancy Pace Harmon. “Also there is a perceived lack of benefit from these trips.”But the main reason this important due diligence step may have failed to deliver in the past was that the wrong person was making the journey at the wrong time, says Kirz. “This type of trip is not for the CIO – it is for the key IT staff members who are tasked with making the outsourcing relationship work and will be engaged with the service provider on a day-to-day basis,” he explains. “Also, the best time to go is before final section, when there is a short list of providers, as the visit allows direct interaction with the provider team leads to judge quality and identify and resolve potential issues before final selection.”To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

10 products that big tech companies have open-sourced recently

Releasing internal products to the open-source community is the hip new thing for technology giants to do.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 3 hot Apple Watch deals on Black Friday & Cyber Monday

2. 20 cool things you can do with a Raspberry Pi

3. 19 free cloud storage options

4. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac

5. 10 products that big tech companies have open-sourced recently

6. 9 ways Windows 10 just got better

7. What would the perfect Linux distro look like

8. 7 hot Microsoft Xbox Black Friday 2015 deals

9. After breach, Cisco takes cert tracker offline

10. Apple Watch 2 rumors start heating up


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wide_area_networking_alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


ads

Ditulis Oleh : Angelisa Vivian Hari: 5:51 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive