Network World Network Architecture Alert |
| |
|
Rami Rahim says silicon photonics innovations can cut cost of optical bandwidth Read More ▶ |
|
| White Paper: Rsam How well do you know your vendors and the risk they pose? The scope of vendors you need to assess is rising constantly. At the same time, there is more scrutiny than ever on data security and privacy. These factors create greater shared risk where organizations can be held liable for their vendors' actions. To get a complete view of risk, you need a way to automatically combine subjective and objective data. Read More ▶ | Level 3 Communications has cited an unspecified "configuration error" as the root cause of its nationwide network outage on Tuesday. Read More ▶ |
| Comcast said it would happen, and now it has. Consider your home bandwidth capped. Read More ▶ |
| | AT&T today jumped headfirst into the fast-growing software-defined Wide Area Network (SD-WAN) market with a new offering it hopes to bring to market next year based on technology from SD-WAN startup VeloCloud. Read More ▶ |
| IT administrators discuss the most valuable features of eight network monitoring products – from vendors such as CA, Microsoft, NetScout, Opsview and Nagios -- and the features that need improvement. Read More ▶ |
| The White House Office of Science and Technology Policy (OSTP) has issued a request for information about how much is too much or too little data portability and what are the implications? Read More ▶ |
| “Federal information systems and networks are inherently at risk. They are highly complex and dynamic, technologically diverse, and often geographically dispersed. This complexity increases the difficulty in identifying, managing, and protecting the myriad of operating systems, applications, and devices comprising the systems and networks. Compounding the risk, systems used by federal agencies are often riddled with security vulnerabilities—both known and unknown. For example, the national vulnerability database maintained by the Mitre Corporation has identified 78,907 publicly known cybersecurity vulnerabilities and exposures as of September 15, 2016, with more being added each day,” the GAO wrote. Read More ▶ |
| White Paper: Sapho 65% of employees ignore data when making a decision and 62% delay completing tasks that require logging into multiple systems. This Forrester paper discusses how business apps are used and how the right apps will empower employees to make data-driven decisions, solve business problems, and be more connected to the business. Read More ▶ | Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ | SLIDESHOWS Most dangerous cyber celebrities of 2016 Read More ▶ | Most-Read Stories |
|
|
|