Wasabi serves up some spicy AWS-killer claims

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Voices of Networking Alert

May 08, 2017
Featured Image

Quick guide to where AR stands today

Over the past few months, there have been several augmented reality developments. Here’s a quick guide to what the big AR players are up to. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Wasabi serves up some spicy AWS-killer claims
Who should be on the Tech Mount Rushmore?
BlackBerry returns with a surprisingly decent business phone: The KEYone (with video)
25 geek-inspired gifts for Mother's Day
Review: Two higher-end peripherals for your notebook lifestyle
Extreme offers glimpse of integrated Avaya, Brocade technology future
China will attempt to keep IT products spy-free with security checks

White Paper: GlobalSCAPE

5 Rings of Data Integration Hell

Dante's "9 Circles of Hell" depicts a journey characterized by increasing levels of an individual's depravity, and presumably, increased levels of punishment. There are corollaries when it comes to addressing data integration issues in your environment that, when not properly addressed, create severe levels of "anguish" on a daily basis. Compounded, these issues can affect company efficiency, profitability, and tenure in your current position. Read More

Thumbnail Image

Wasabi serves up some spicy AWS-killer claims

Wasabi says it is disrupting the cloud storage market, claiming its cloud storage is six times faster than Amazon S3 and cheaper than AWS Glacier. Read More

Thumbnail Image

Who should be on the Tech Mount Rushmore?

Friends of Creative Strategies’ Tim Bajarin nominated 82 people for the Tech Mount Rushmore. Read More

Thumbnail Image

BlackBerry returns with a surprisingly decent business phone: The KEYone (with video)

BlackBerry's new Android, the KEYone, comes complete with a real keyboard and is strictly for business. According to our reviewer, it's also not bad at all. Read More

Thumbnail Image

25 geek-inspired gifts for Mother's Day

Mother's Day gift ideas with a hint of tech, science and math Read More

Thumbnail Image

Review: Two higher-end peripherals for your notebook lifestyle

Go ahead and splurge on this fancy webcam and speakerphone. Read More

Thumbnail Image

Extreme offers glimpse of integrated Avaya, Brocade technology future

Extreme said it expects the Avaya and Brocade deals to push its revenues to over $1 billion for its Fiscal 2018 Read More

Thumbnail Image

China will attempt to keep IT products spy-free with security checks

China will start carrying out security checks for IT vendors in the country that intend to keep out internet and networking services vulnerable to spying and hacking risks. Read More

White Paper: GlobalSCAPE

Be Afraid of Your Shadow: What is 'Shadow IT' and How to Reduce It

Are you making it too easy for hackers to infiltrate your system? If your employees are using unsanctioned devices and applications, then the answer is yes! Unsanctioned devices and applications can leave your IT infrastructure and data far more vulnerable to being exploited by cybercriminals. Unfortunately, it's become easier than ever for employees to access rogue applications, much to the chagrin of busy IT staff. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

9 tips to turn your data center green

Top techies giving 2017 college commencement speeches Read More

Most-Read Stories

1. Cisco fires back at VMware decision to whack third-party virtual switches
2. Verizon.net email addresses are going away
3. I'm excited for a new Ubuntu release—for the first time in a long time
4. Why Cisco needs SD-WAN v vendor Viptela
5. Cisco drops critical security warning on VPN router 3 high priority caveats
6. 18 free cloud storage options
7. Sneaky Gmail phishing attack fools with fake Google Docs app
8. Extreme offers glimpse of integrated Avaya, Brocade technology future
9. Peeping into 73,000 unsecured security cameras thanks to default passwords
10. 7 free tools every network needs
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Voices of Networking Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.