Search This Blog

Tuesday, March 24, 2009

What is Nortel up to?

Nortel plans to introduce Packet Engine's products in the first half of this year
Network World logo

Security: Network Access Control Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Dell
rule

Safe and Secure Hardware Asset Recovery
Dell can help corporations to properly dispose of old PCs in a secure and cost-effective manner that is also environmentally friendly.

rule

Spotlight Story
What is Nortel up to?

Tim Greene By Tim Greene
In all the bankruptcy noise surrounding Nortel, it's easy to miss that the company has bought up the intellectual property of Identity Engines, whose portfolio adds up to a NAC package. Read full story

Tim Greene is senior editor at Network World.

Related News:

Identity Engines goes on the block Start-up Identity Engines is shutting down. The company and its assets are up for sale, though the man responsible for selling it, or carving it up into saleable components, doesn't want to say so.

Identity Engines enables central policy management In this Clear Choice Test, an identity-management appliance called Identity Engines' Ignition Server proved to be adept at aggregating control of multiple user repositories and devices once we got used to the somewhat ...

Sale of key Nortel assets may be inevitable Nortel may have no choice but to sell off key parts of its business, industry analysts said after reports that the company is in talks with competitors to do just that.

Nortel looking to break apart Executives at industry giant Nortel are shopping pieces of the company to rival vendors, according to a report last night from The Wall Street Journal's online edition.

Report: Nortel seeks to sell off more business units Nortel may sell off more of itself than previously announced, leaving very little as a core business if all the speculated sales go through.

Nortel's bankruptcy: A long time coming Nortel's demise -- punctuated by this week's bankruptcy protection filings -- started long before the accounting scandal of 2004 and the multimillion dollar quarterly losses that the company has piled up since.

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Exchange alternatives: Pros & cons
Clear Choice Test: Microsoft Exchange alternativesTesting shows Microsoft's Exchange still tops for features and management hooks.

App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

Sponsored by Dell
rule

Safe and Secure Hardware Asset Recovery
Dell can help corporations to properly dispose of old PCs in a secure and cost-effective manner that is also environmentally friendly.

rule

Case Study: Successful LAN Support
Successfully deploy a wired/wireless Ethernet network and keep it running with exceptional up-time. Ensure your network is ready for new technologies by running assessment tests that provide you with the data you need. Resolve connectivity issues and quickly address network performance complaints. Get all of the details today.
Download this whitepaper now.


What you need to see all 7 layers
Get all the tools you need to see all 7 layers of your network. Fluke's OptiView Analyzer combines protocol analysis, active discovery, and device and traffic analysis in a mobile solution, giving you the information you need to control your network and minimize disruption.
Click here for your free trial.

 

03/24/09

Today's most-read stories:

  1. No business case for IPv6, survey finds
  2. Rootkit to exploit Intel chip flaw to be posted 3/19/09
  3. IBM/Sun deal could benefit Java, says Google's open source chief
  4. Skype for SIP targets business customers
  5. Voluntary separation scheme for Dell's Malaysian staff
  6. Hidden commands
  7. Ukrainian cybercriminals raked in $10K/day, Finjan reports
  8. E-mail evidence in Madoff case includes another scam
  9. Power grid is found susceptible to cyberattack
  10. Tweeted out of a job: "Cisco Fatty" story
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: