Search This Blog

Tuesday, February 03, 2009

Juniper switch enables mega-router; Guy builds his own supercomputers; Is e-mail for old fogeys?

Network World logo

Daily News AM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by EnterpriseDB
rule

EnterpriseDB Selecting the Right DBMS
Look beyond the "it works" factor of your database and focus on TCO. Learn how and why in this whitepaper, "The Explosion in DBMS Choice." Specialty data warehouse database management system (DBMS), running on cost-effective massively parallel processing systems outperform the SMP bound market leaders. Learn more today.

rule

Spotlight Story
Juniper switch enables mega-router creation

Jim Duffy By Jim Duffy
Juniper this week is unveiling a matrix switch for interconnecting core routers into a higher density, more scalable system. Read full story

Related News:

Need a supercomputer? This guy builds 'em himself
Bruce Allen is perhaps the world's best do-it-yourselfer. When he needed a supercomputer to crunch the results of gravitational-wave research, he built one with his colleagues at the University of Wisconsin-Milwaukee.

Is e-mail for old fogeys?
E-mail was the Internet's first killer application, but now it appears to be dying out -- at least among teenagers.

Femtocells: Pros and Cons
Are you one of those unlucky souls who enjoys decent cell phone reception when you're out and about but can't get a signal inside? You're not alone. Indoor signals have long been a weak point of cellular coverage.

Obama still won't say whether he's using a BlackBerry
The mystery continues. President Barack Obama said in a television interview broadcast Monday he has a very secure handheld device, but he would not divulge whether or not he's still using his coveted BlackBerry.

The IT job market is tanking -- but not for everyone
Shortly after Donnie Reynolds, the chief operating officer at Automated HealthCare Solutions Inc. in Miramar, Fla., learned that Microsoft planned to cut 5,000 workers over the next 18 months, he and another ...

Ex-employee calls Microsoft spying lawsuit 'desperate'
The former Microsoft employee accused of stealing company information is disputing Microsoft's version of events, saying the lawsuit against him is "a desperate attempt" to force him to abandon a patent infringement ...

Windows 7 to be tested thoroughly
Microsoft's new Windows 7 will be "more thoroughly" monitored for compliance with a 2002 antitrust settlement than earlier versions of the operating system, according to a status report filed last week with the ...

Novell may make more acquisitions to fill product line
Novell continues to look at acquisitions to fill its product line, Ron Hovsepian, the company's president and CEO, told reporters in Bangalore Monday.

Real network engineers put Cisco data center gear through its paces
If you want to know how the Cisco Nexus line really works in practice, here's your chance to live vicariously through a group of network engineers who right now are testing out an end-to-end Nexus data center design. In their words "Yup, scary."

Video: Google Earth 5.0 goes deep under the sea
The new Google Earth 5.0 tool features underwater exploration, historical views and the ability to create narrated tours.

'Magnetic tornado' spins data storage techniques
Researchers said this week that they have discovered a way to control the rotation - or chirality - of "magnetic tornadoes" in way that could enable the writing and reading of digital information with greater sensitivity, reliability and efficiency, they said.

911 fraudsters provoke, endanger public, law officers
It's been a year since the FBI brought the problem to the public’s attention but it continues to plague: there has and continues to be a significant increase in the illegal activity know as “swatting” where criminals and pranksters call in a spoofed 911 call in hopes of drawing a response from law enforcement - usually a Special Weapons and Tactics (SWAT) team.

Today on Cisco Subnet
How does Cisco IronPort prevent directory harvest attacks?; OSPF puzzle, Part 2: Analyzing OSPF metrics, human style; Getting Started with the CCNA Wireless; VoIP security: Share your concerns?; Why is Cisco spending lots of marketing dollars on WAAS?; QoS application classes; IPv6 capabilities in Cisco’s IPS software version 6.2; Is my network healthy? Important IOS CLI info (Show version).

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


Betting on SuperNAP
In Las Vegas, data center takes power and cooling to the limitIn Las Vegas, data center takes power and cooling to the limit.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by EnterpriseDB
rule

EnterpriseDB Selecting the Right DBMS
Look beyond the "it works" factor of your database and focus on TCO. Learn how and why in this whitepaper, "The Explosion in DBMS Choice." Specialty data warehouse database management system (DBMS), running on cost-effective massively parallel processing systems outperform the SMP bound market leaders. Learn more today.

rule

Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.

 

02/03/09

Today's most-read stories:

  1. Wi-Fi hot spot horrors
  2. NFL's IT chief gears up for his 25th Super Bowl
  3. Windows 7 will not sway XP users
  4. Top 10 worst uses for Windows
  5. Human error caused Google search bug
  6. Ex-Fannie Mae employee accused of planting computer time bomb
  7. Satyam claims 15 contracts signed in January
  8. Wi-Fi vs. prepaid 3G data dongles
  9. Verizon clips VoiceWing, releases wireline VoIP service
  10. Don't fear the penguin: A newbie's guide to Linux


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: