Search This Blog

Thursday, September 17, 2009

10G Ethernet shakes net design to the core; First Look: Google Chrome 3.0; Tech's worst year ever?

First Look: Google Chrome 3.0; Tech's worst year ever?
Network World logo

Daily News AM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Oracle
rule

Live Event: Enterprise Database Security
Make the most of your existing resources without draining your IT budget with a successful database security strategy. Join Industry experts, including Noel Yuhanna, Principal Analyst at Forrester Research for this live event scheduled for Thursday, September 24 at 2 p.m. ET / 11 a.m. PT to learn how. Protect your enterprise assets and ensure regulatory compliance.

Register for this Live Event now.

rule

Spotlight Story
10G Ethernet shakes net design to the core

Cisco and other Ethernet switch vendors explain shift from three- to two-tier data center networking architectures. Read full story

Related News:

First Look: Google Chrome 3.0
Google's new Chrome 3.0 browser promises faster page loading, customizable themes, and an updated tab page. Here's a complete look at the changes.

Tech's worst year ever?
The tech industry has suffered some of its greatest losses ever in the past 12 months. Here's our look at the low points.

AIM 7 coming next Tuesday
AIM 7, a version of America Online's instant-messaging client that can also bring users into Facebook and other social-networking services, will come out next Tuesday.

Security disaster averted by financial firm's quick actions
While most of the IT world has been spared a devasting security attack like Blaster and Sasser for the last few years, the damage wrought by all manner lesser-known computer viruses continues to inflict corporate pain.

Rebuilding Rome in less than a day via a computer algorithm
A computer algorithm developed at the University of Washington has been used to create a digital reconstruction of Rome, including landmarks like the Colosseum. Eventually, the technology could find applications in everything from architecture to building video games.

Stop Designing Data Centers from the Bottom Up
Anyone who's ever had the pleasure of swinging a hammer for a living or to pay for a semester of school knows this fundamental truth: build a solid foundation or whatever you place on top of it stands a pretty good chance of toppling over at some point in the future. This truth is perpetuated everywhere, in the Bible, in the story of the Three Little Pigs...it's as old as time.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


The history of steganography
SteganographyThere is a wealth of methods for creating encrypted messages you can't even tell are there.

Top 10 cool satellite projects
SatellitesSatellites are, by their very definition, cool.

aCelera/IBM Rational ClearCase Evaluation:Global Telecommunications Company
Read this evaluation on the implementation of aCelera technology supporting a Telco's IBM ClearCase deployment of approximately 10,000 seats. Learn how it will produce a productivity benefit ranging from $1.18 million USD to $18.0 million USD in year 1 of production.
Learn more.


Integrated Data Mgmt: Strategies for Success
Together, a data integration platform and an ICC can save your company millions of dollars. Download this white paper to find out how T. Rowe Price reused skills, process, best practices to reduce development and support costs by $2.2 million over five years.
Click here.

 

September 17, 2009

TOP STORIES | MOST DUGG STORIES

  1. Microsoft greasing Win 7 skids with early release of desktop tools
  2. Domain-name abuse proliferates
  3. Windows 7 touch: Dead on arrival
  4. Sprint CEO calls the iPhone the "Michael Jordan" of smartphones
  5. IEEE stamps "approved" on 802.11n Wi-Fi standard
  6. Developer denies software to beat Chinese censors is malicious
  7. Avaya wins Nortel enterprise business for $900 million
  8. A tale of two college Wi-Fi networks and 802.11n
  9. 10 cool Web apps developed in two days
  10. Ethernet switch vendors propose data center collapse

Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: