Search This Blog

Tuesday, January 25, 2011

Cisco, Verizon enlist in 24-hour IPv6 trial

Two-thirds of U.S. Internet users lack fast broadband | HP to launch enterprise cloud service

Network World Daily News AM

Forward this to a Friend >>>


Cisco, Verizon enlist in 24-hour IPv6 trial
Two leading network vendors -- Cisco and Verizon Business -- have enlisted in an upcoming trial-by-fire of IPv6, the long-anticipated upgrade to the Internet's main communications protocol called IPv4. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

RESOURCE COMPLIMENTS OF: Netezza

Get Proof. Not Promises.
Take the TwinFin Test Drive. Your site. Your data. Our technology. Experience the high-performance and operational simplicity of the IBM Netezza TwinFin data warehouse appliance first-hand. Our open Proof of Concept allows you to test the TwinFin with your most demanding, real-world analytics challenges. Learn More.

Two-thirds of U.S. Internet users lack fast broadband
Two-thirds of U.S. Internet connections are at speeds less than 5 Mbps, putting the United States well behind speed leaders South Korea and Japan. Read More

HP to launch enterprise cloud service
Rounding out its portfolio of cloud-related offerings, Hewlett-Packard will launch a cloud compute service next month aimed at enterprises. Read More

Saying no to smartphones: most mobile users will buy new 'dumb' phones
With all the media attention smartphones and their apps have gotten, you'd think they were universally loved. Turns out the next mobile device most wireless service subscribers will buy will be yet another "dumb" phone. Read More


WHITE PAPER: Riverbed

The CIO's New Guide to Design of Global IT Infrastructure
Is it possible to eliminate the impact of distance? This paper explores the 5 key principles successful CIOs are using to redesign IT infrastructure of any size. Learn how to be prepared to adapt your environment in a way that supports distributed employees, anytime anywhere collaboration and the need for business continuity during a disaster. Read now!

In HTML5 video standards war, Vid.ly is Switzerland
A startup called Encoding.com thinks it has the answer to the emerging HTML5 video standards battle. Read More

Cisco would welcome this survey's findings
In the News That Will Please Cisco Dept., most large enterprises are gearing up for technology refreshes in their data centers this year, while a large percentage are prioritizing around data center consolidation. Read More

Unboxing Videos: Even Microsoft Does Them
It used to be that unboxing videos would be handled by bloggers or product reviewers who have the latest hot gadget, and they want to accumulate video views by showing everyone else in the world what is inside the box (or brag that they've got one before everyone else, IMHO). But the popularity of these videos has even the vendors themselves in the game. Read More


WHITE PAPER: Diskeeper

Defragmentation in Virtualized Environments
Performance corrupting file fragmentation is severely compounded on virtual platforms and threatens to undo most of its efficiency benefits. Coordinating defrag resources between VMs was an insurmountable barrier until recent innovations eliminated conflicts. Learn More

Forrester: Oracle confining Java future to enterprise use
Oracle's plans for Java seem to constrain the language to the enterprise, analysts assert. Read More

Huawei sues Motorola for IP infringement
Huawei files a lawsuit against Motorola over its planned sale of a division to Nokia Siemens. Read More

Apple hires Geekonomics expert as global security chief
Apple has reportedly made another high-profile cybersecurity hire, and his advanced degree says it all: Master of Science in Information Warfare and Systems Engineering from the Naval Postgraduate School. Read More

Forrester report declares passwords insecure and notes sky is blue
In what should come as no surprise to most of you, a Forrester study from December concluded that "... most companies continue to rely on the traditional username and password sign-on to verify a user's identity." And that "... those organizations are unnecessarily leaving themselves open to unauthorized access by hackers and e-criminals." Read More

Google Android tablets gain traction with developers
Apple iPad remains the top tablet targeted by app builders in survey. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

12 geekiest snow and ice sculptures
Not all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.

2011's 25 Geekiest 25th Anniversaries
Our fifth annual collection of the year's "geekiest anniversaries" kicks off with The Mentor's "Hacker's Manifesto" and includes such memorable characters as Captain Midnight and Ferris Bueller, institutions the likes of the IETF and Spy magazine, and inventions like the Super Soaker and disposable camera.

MOST-READ STORIES

  1. Gartner slams Cisco's single-vendor network vision
  2. Is retaliation the answer to cyber attacks?
  3. Three more Microsoft executives jump ship
  4. 90% of Microsoft customers in China using pirated software
  5. Cisco: Puppy cams threaten Internet
  6. The case of Apple's mystery screw
  7. Got $500? You can buy a hacked U.S. military Web site
  8. Apple App Store hits magical 10 billion app download milestone
  9. Is Apple expanding use of tamper-resistant screw for iPhone?
  10. Yahoo IPv6 upgrade could shut out 1 million Internet users

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: