|
Video/Webcast: Check Point Software Technologies Ltd. Join us live April 5th @11:00 AM EDT for this webcast to understand the trends that are disrupting the way security is managed today. Read More ▶ |
Enterprise lighting, energy management and other sensors are moving to an architecture where the device hitches a ride on the Wi-Fi network, but only to connect to its service in the cloud: the WLAN is essentially transparent in the architecture. But first, an IoT sensor must be configured to connect to the WLAN. Read More ▶ |
|
Have you ever fantasized about giving a major carrier a taste of its own medicine? A group of professionals gathered on Reddit’s section devoted to networking did so over the weekend. Read More ▶ |
|
The Tor Project is fortifying its software so that it can quickly detect if its network is tampered with for surveillance purposes, a top developer for the volunteer project wrote on Monday. Read More ▶ |
|
|
Cloud Wi-Fi startups Cloud4Wi and Relay2 share news about new or updated offerings aimed at helping organizations get more from their wireless networks. Read More ▶ |
|
Huawei is getting into networked streetlamps with a system that will let third-party developers add other smart-city capabilities. Read More ▶ |
|
More IT elements, applications now network aware, ONS panelists say Read More ▶ |
|
At the Open Compute Project Summit last week, Microsoft announced SONiC, a set of open source software components that can be used to build networking equipment. The move could be a helpful tool for companies building their own networking infrastructure and is Microsoft’s latest effort to position itself as an open source company. Read More ▶ |
|
Institutions of higher learning can often feel like self-contained worlds of their own, and their wireless networks are much the same – subject to unique demands and rules, the campus network is a distinctive challenge for the IT pro. Read More ▶ |
|
The network NASA uses to deliver telemetry ground-based tracking, data and communications services to a wide range of current and future spacecraft needs a serious bump in security technology. That was the conclusion of the space agency’s Office of Inspector General which stated: “We found that NASA, [NASA’s Goddard Space Flight Center in Greenbelt, MD, which manages the network] failed to comply with fundamental elements of security risk management reflected in Federal and Agency policies. We believe that these deficiencies resulted from inadequate Agency oversight of the network and insufficient coordination between stakeholders. These deficiencies unnecessarily increase the network’s susceptibility to compromise.” Read More ▶ |
|
White Paper: SecureAuth SecureAuth is pushing the limits of Adaptive Authentication by introducing behavioral biometrics. Behavioral biometrics is another method for detecting threats with the ability to monitor and analyze keystrokes, mouse movements, and touch dynamics. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS How to respond to ransomware threats Read More ▶ |
Most-Read Stories |