How new ad hoc networks will organize

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Net Optimization Alert

Jul 26, 2016
Featured Image

Verizon unveils ‘virtual network services’

Hard on the heels of a similar pitch from AT&T, Verizon this morning is taking the wraps off a lineup of Virtual Network Services (VNS) that it bills as a natural extension of data-center virtualization that promises enterprise WAN customers fast, flexible provisioning as well as cost savings. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How new ad hoc networks will organize
Wireless on wheels? Cable can play at that game, too
Latest leap second plan poses a dilemma for conscientious sysadmins
Is container virtual networking a blessing or a curse?
Verizon will cut off unlimited data users who use too much unlimited data
Devices with Qualcomm modems safe from critical ASN.1 telecom flaw
At Black Hat: A free tool for spear phishing Twitter
Cisco patches critical exposure in management software

Video/Webcast: Veritas

A Revolutionary Approach to Oracle Backup

If your organization uses native database tools, like RMAN, to backup your Oracle databases, you're not alone (82% of Oracle DBs are primarily managed by DBAs). While these tools are simple and convenient, they can create management, scheduling, and governance challenges that put your database team at odds with the backup team and with corporate compliance. Read More

Thumbnail Image

How new ad hoc networks will organize

Decentralized ad hoc networks, the kind we’re likely to see more of as IoT use increases, could self-discover their network size by copying ant colony behavior. Read More

Thumbnail Image

Wireless on wheels? Cable can play at that game, too

When lots of people gather for concerts or sports events, cellular carriers often bring their networks to the scene with cell towers mounted on trucks, or COWs (cells on wheels). Not to be outdone, Comcast is joining the fray using Wi-Fi. Read More

Thumbnail Image

Latest leap second plan poses a dilemma for conscientious sysadmins

Conscientious sysadmins face a dilemma on December 31, when a new leap second will threaten the stability of computer systems and networks. Read More

Thumbnail Image

Is container virtual networking a blessing or a curse?

Containers are a blessing to both developers and operations. But if container virtual networking isn't thoughtfully designed, it could be a curse that plagues us for years. Read More

Thumbnail Image

Verizon will cut off unlimited data users who use too much unlimited data

Verizon is forcing heavy data users to get off its unlimited plan or get off the carrier's network entirely. Read More

Thumbnail Image

Devices with Qualcomm modems safe from critical ASN.1 telecom flaw

Smartphones equipped with Qualcomm modems are not vulnerable to a recently announced vulnerability that could potentially allow attackers to take over cellular network gear and consumer mobile devices. Read More

Thumbnail Image

At Black Hat: A free tool for spear phishing Twitter

A spear phishing tool to automate the creation of phony tweets - complete with malicious URLs – with messages victims are likely to click on will be released at Black Hat by researchers from ZeroFOX. Called SNAP_R (for social network automated phisher with reconnaissance), the tool runs through a target Twitter account to gather data on what topics seem to interest the subscriber. Then it writes a tweet loaded up with a link to a site containing malware and sends it. Read More

Thumbnail Image

Cisco patches critical exposure in management software

Cisco UCS Performance Manager versions 2.0.0 and prior are affected and the problem is resolved in Cisco UCS Performance Manager versions 2.0.1 and later. UCS Performance Manager collects information about UCS servers, network, storage, and virtual machines. Read More

White Paper: Endgame

Automate the Hunt for Hidden Threats Within Your Enterprise

Learn the process for automating the hunt for threats, including how to deploy a continuous threat-hunting process. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Happy anniversary, Windows 10: Here’s what coming in the latest update

2016 technology industry graveyard Read More

Most-Read Stories

1. Two men fall off San Diego cliff playing Pokemon Go, just as I predicted
2. Plea to Cisco: 'CCIE routing and switching written exam needs to be fixed'
3. The CIA, NSA and Pokémon Go
4. 19 free cloud storage options
5. Microsoft releases ‘service pack 2’ for Windows 7
6. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
7. Verizon unveils ‘virtual network services’
8. What’s hot at Cisco Live
9. Pokémon Go just redeemed Google Glass failure to launch augmented reality
10. Peeping into 73,000 unsecured security cameras thanks to default passwords
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Net Optimization Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.