Search This Blog

Thursday, January 20, 2011

Library dumps MPLS for cheaper DSL, cable services

Yahoo IPv6 upgrade could shut out 1 million Internet users | Gamers hijacked your server? Might be an inside job

Network World Network Optimization

Forward this to a Friend >>>


Library dumps MPLS for cheaper DSL, cable services
The Sno-Isle, Wash., public library system expects to save $400,000 this year by yanking its MPLS network and replacing it with multiple, less expensive broadband connections that include consumer DSL, cable service and even dark fiber. Read More


WEBCAST: Cisco

Mobile Powerplay: Secure, High Performance, Unified
The mobile revolution is here—and here to stay. iPhone, iPad, Droid--employees bring their mobile devices into the workplace, and they want access to personal and professional information. This brings a new set of concerns for IT and the business: IT needs to ensure that the corporate network and the access remains secure. Register Now

WHITE PAPER: PC Mall

A Powerful Platform for Virtualization
Download this HP white paper to learn how the next-generation ProLiant servers can help companies achieve rapid ROI and dramatically lower their operational expenses. Read More

Yahoo IPv6 upgrade could shut out 1 million Internet users
Yahoo is forging ahead with a move to IPv6 on its main Web site by year-end despite worries that up to 1 million Internet users may be unable to access it initially. Read More

Gamers hijacked your server? Might be an inside job
A medical-center data breach being blamed on bandwidth-hungry gamers got me wondering about how often such parasitic intrusions happen and how they're viewed in the gaming community. Not knowing much about gaming or the gaming community, I asked Stephen Heaslip of the gaming site Blue's News to answer a few questions. Read More

Public cloud services can provide useful tools for criminals
Buying public cloud services passwords as demonstrated this week at the Black Hat D.C. conference is not the only malicious use these computational and storage resources might offer, according to one security expert. Read More


WHITE PAPER: Symantec

Windows Done Right: From Migration to Implementation
The recent IDC executive brief, "Doing Windows 7 Right: Efficiency from Migration to Implementation" offers a better understanding on how the migration to Windows 7 provides the opportunity to improve core elements of your IT infrastructure. Learn more.

New Cisco Linksys wireless router boosts multimedia performance
With more home users adding multimedia devices (any non-PC device that can connect to the Internet, such as TVs, set-top boxes, even iPads) to their home networks, the bandwidth requirements and performance needs are increasing as well. With that in mind, Cisco today announced an update to its Linksys brand of home wireless router, the E4200 Maximum Performance Dual-Band Wireless-N Router. Read More

HP-Microsoft collaboration bears fruit
Just over a year ago, HP and Microsoft announced a $250 million partnership to jointly develop HP appliances running Microsoft software platforms including Exchange, SharePoint and SQL Server. Today, some of the fruits of that collaboration are coming to market. Read More

Two Wi-Fi vendors add cloud-based networking
Two Wi-Fi vendors are adding routers, coupled with cloud-based network management to create subscription networking services, both wired and wireless. Read More


WHITE PAPER: HP TippingPoint

Securing Virtual Data Center Testing
Learn how this technology is put to test as a comprehensive solution for securing virtual environments. Read More

Hacktivism a security worry for businesses in 2011
It's cute when social media is used to create a flash mob where hundreds of people, in one instance, gathered in New York City dressed as elves in 2009. It's potentially menacing, though, when the same organizing principle of social media is used to bring down Web sites. IT security expert Hugh Thompson says enterprises need to protect themselves from what is now called "hacktivism." Read More

Study: Cloud breaches show need for stronger authentication
The number of security breaches is rising as organizations increase their reliance on cloud-based services, collaboration tools and enabling users to access networks, Forrester says in a new report. Weak usernames and passwords are making matters worse. Read More

EMC rolls out new mid-range and entry-level arrays
EMC on Tuesday unveiled one of its biggest software launches and the introduction of a new storage infrastructure that consolidates its Clariion and Celerra storage. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

12 geekiest snow and ice sculptures
Not all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.

2011's 25 Geekiest 25th Anniversaries
Our fifth annual collection of the year's "geekiest anniversaries" kicks off with The Mentor's "Hacker's Manifesto" and includes such memorable characters as Captain Midnight and Ferris Bueller, institutions the likes of the IETF and Spy magazine, and inventions like the Super Soaker and disposable camera.

MOST-READ STORIES

  1. Stupid user tricks 5: IT's weakest link
  2. Cisco IOS vulnerabilities uncovered
  3. Security fail: When trusted IT people go bad
  4. Facebook photos: Opt-out or tag you're it
  5. The Mac App Store's hottest productivity apps
  6. Library system dumps MPLS with cheaper DSL, cable services
  7. Terry Childs juror explains why he voted to convict
  8. With rate increase, Sprint bows to 4G consumption reality
  9. Will electronic toll system become terrorist targets?
  10. Two Wi-Fi vendors adding cloud-based networking

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: