A recap of the previous month’s notable tech news items, blog posts, white papers, video, events, etc. - For the week ending Friday, June 27th, 2014.

 

News

 

The Enterprise Is Ready for the Internet of Things—But 57% of Networks Are Not

Survey reveals how the IoT will impact IT infrastructure—network capacity and security are biggest concerns.

 

ICYMI: 'Shoddy' PayPal, Google Glass & hacking BYOD

The latest on PayPal's two-factor authentication, the launch of Google Glass and new banking attacks.

 

What is a CPU-based SDN switch? Infoblox's Stu Bailey explains

Article discusses the differences between LINCX and an ASIC-based switch, the types of controllers used for testing, and how users can get involved with the development of LINCX.

 

Cisco: WiFi Traffic Will Exceed Wired By 2018

Within five years, more IP traffic will come from devices other than PCs, the networking vendor says in its latest Visual Networking Index.

 

Network Stories

 

Kiwi firm rakes in “million dollar” savings through BYOD…

Savings of $1 million a year – and happier staff to boot – have convinced Cogent boss Ray Noonan he’s on to a winner with BYOD.

 

Blogger Exploits

 

Who Should Have Access to Your IT Monitoring Tools

Data should be available to those who use it effectively to make decisions. But who are those people – and where in your organization will you find them?

 

Turning network resource management on its head through software-defined WANs

Although much of the Software Defined Networking discussion to date has been about the data center, software-defined WANs (SDW) also shows great promise.

 

Duo Security Researchers Uncover Bypass of PayPal’s Two-Factor Authentication

Researchers at Duo Labs, the advanced research team at Duo Security, discovered that it is possible to bypass PayPal’s two-factor authentication

 

Open source PCI DSS: A strategy for cheaper, easier PCI compliance

Do open source products have a place in enterprise PCI compliance strategies? Take a look at the open source opportunities for meeting three specific compliance needs: logging, file integrity monitoring and vulnerability scanning.

 

Network Device Management, Part 1: SNMP & Logging

Learn best-practices for monitoring your network devices with SNMP and for tracking events the devices generate.

 

Webinars & Podcasts

 

BYOD: How To Protect Your Company And Employees

BYOD trend continues to gain momentum. However there are important steps companies need to take to protect their intellectual property from multiple security breaches.

 

Windows Server 2003 end of life: Plan your WS2012 migration now

Extended support for Windows Server 2003 ends on 14 July 2015. The webcast guides you through steps to help you make the best migration decisions. No registration is required.

 

Food for Thought

 

More Working From Home: Getting Things Done - The Peering Introvert, Ethan Banks