Search This Blog

Wednesday, October 14, 2009

Cisco to acquire Starent for $2.9 billion

Computer programmers ready for smash-mouth brain battle; Near term deal for Cisco rival Brocade doubtful
Network World logo

Cisco Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Qualys
rule

Vulnerability Management Checklist
Discover the 12 key decision points you need to consider when choosing a vulnerability management solution. This checklist walks you step-by-step through critical questions to ensure you select the solution that will best protect your network and data.

Learn more now.

rule

Spotlight Story
Cisco to acquire Starent for $2.9 billion

Aiming to expand its mobile Internet offerings, Cisco Systems will acquire Starent Networks for US$2.9 billion, the companies announced Tuesday. Read full story

Related News:

Computer programmers ready for smash-mouth brain battle
A smart people smack-down is set to start next week where thousands of university computer researchers will pit their brains and machines in a grueling battle of logic, strategy, and mental endurance.

Near term deal for Cisco rival Brocade doubtful
Oppenheimer & Co. downgraded Brocade stock early this week, citing skepticism that the company will be snapped up anytime soon despite reportedly putting itself up for sale. And although the stock price soared following those "For Sale" reports, Oppenheimer sees only a "small likelihood" of a near term sale for a handful of reasons, spelled out in a bulletin on this week's downgrade:

Cute adorable Cisco has become the target of data center switch vendor Arista Networks
BusinessWeek reported last week that data center networking switch vendor - Arista Networks, is taking direct aim at the data center market share of Cisco Systems: Gunning for an Elephant in Silicon Valley Why is the data center market share of cute adorable Cisco at risk? Well, according to BusinessWeek: Arista's switches, computers that direct traffic around the Net, are less than...

Finding who is sending 'bad' IPv6 traffic
In the world of IPv4, every network operator and security person know how to identify the host which sends 'bad' IPv4 traffic. In this blog entry, bad means launching an attack or sending malovent traffic, or violating Acceptable Use Policy or being misconfigured.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Cell towers in disguise
Cell towersSome of the cell towers that dwell among us are cleverly hidden; others, not so much.

The ultimate smartphone
SmartphonesWhat if you could combine the best parts of every phone out there?

Web Application Security without Compromise
Web applications are vulnerable in custom application logic, the underlying software platform as well as Web services. Learn how to protect your network against application-level attacks such as SQL injection, cross-site scripting and worm infections.
Click here to learn more.


Virtualizing Microsoft Exchange Server
Organizations encounter numerous challenges related to running Microsoft Exchange Server as a mission-critical backbone of their communications infrastructure. Virtualization technology can be used to solve many of these issues. This whitepaper examines the best ways to simplify and optimize management of Microsoft Exchange Server using virtualization technologies.
Click here to download today.

 

October 14, 2009

MOST-READ STORIES

  1. Developer ups iPhone app to $40 after complaints about price
  2. House decommissions last mainframe, saves $730k
  3. Sidekick fiasco highlights need for mobile backups
  4. Sidekick users livid
  5. Compromised e-mail accounts exploited in fake shopping scam
  6. Barracuda gobbles up SaaS security start-up Purewire
  7. From Sidekick to Gmail: A history of cloud computing outages
  8. Engineers fix shortcoming of firewalls
  9. Microsoft loses Sidekick users' personal data
  10. 7 tools to ease your Windows 7 rollout

Overcoming Single Provider MPLS Limitations
Download this whitepaper and discover how Virtela's Global Service Fabric melds MPLS technology and service delivery together in a manner that reliably delivers the full benefits of performance routing MPLS technology. This solution also offers the geographic reach and route diversity of multiple MPLS providers.
Click here to learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: