Search This Blog

Monday, February 28, 2011

100G Ethernet stays pricey as speed needs soar

Cisco upgrades its video portfolio | Is VoIP too secure?

Network World Cisco

Forward this to a Friend >>>


100G Ethernet stays pricey as speed needs soar
Virtualization, video and massive amounts of data are all driving enterprises and service providers toward 100-Gigabit Ethernet, but the cost of the fledgling technology remains prohibitively high and few products have been installed, industry observers said at the Ethernet Technology Summit. Read More


RESOURCE COMPLIMENTS OF: Citrix XenServer

Download Free XenServer
XenServer is the only enterprise-ready, cloud-proven virtualization platform you don't have to pay for. With live migration, centralized multi-server management, and shared storage support, you can't afford not to try it! Click to continue

RESOURCE COMPLIMENTS OF: Hitachi Data Systems

Hitachi IT Operations Analyzer
Pinpoint root cause of network issues up to 90% faster. Automated Root Cause Analysis speeds remediation. FREE video and 30-day trial. Download free 30-day trial

Cisco upgrades its video portfolio
Cisco Thursday unveiled new equipment top help large companies create and distribute videos. Read More

Is VoIP too secure?
It's hard to imagine, but roughly 10 years ago as VoIP was being rolled out corporate networkers were quite concerned about the security of VoIP. As we faced a move from voice going over a traditional (and, by the way, unencrypted) network, there was concern that VoIP would be much too easy to eavesdrop on - especially if it traversed the Internet. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

20 awesome tech products at DEMO
Build-your-own iPhone and Android apps, cloud services, photo tools and more on display at DEMO Spring 2011. Read More

FBI: Internet crime high; types of misdeeds changing
The FBI's 10th annual Internet crime report finds that complaints an money losses are at an almost all-time high with non-delivery of payment or merchandise, scams impersonating the FBI and identity theft leading to top 10 online complaint parade. The report, which is issued through the FBI's partner, the Internet Crime Complaint Center (IC3) and the National White Collar Crime Center (NW3C) found that in 2010, IC3 received 303,809 complaints of Internet crime, the second-highest total in IC3's 10-year history. Read More


WHITE PAPER: Internap

Colocation versus Managed Hosting
The practice of outsourcing certain business functions or responsibilities has become more prevalent because it addresses two simple business needs, lower expenses and better allocation of resources. Learn More

The 6 biggest misconceptions about IPv6
For 15 years, Internet engineers and policymakers have been publicizing the need to upgrade the 'Net's current addressing scheme -- known as IPv4 -- to handle the network-of-network's explosive growth. Yet many U.S. CIOs and CTOs continue to harbor misinformation that they use to justify why they are not adopting the next-generation IPv6 standard. Read More

Waiting for Terabit Ethernet? Don't hold your breath.
Despite the fact that Facebook famously said that it needs Terabit Ethernet, the wait for the technology could last years, experts say. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of AAA Identity Management Security. Enter here.

SLIDESHOWS

When IT professionals cheat
We asked 200 IT professionals to tell us how often IT workers cheat on certification exams, buy fake gear or illegally share software. Here are the results.

Tech 'firsts' that made a President's day
From the first presidential steamboat ride to the introduction of electricity in the White House to Obama's famous BlackBerry, our nation's commanders in chief have always enjoyed the privilege of being exposed to technology's cutting edge -- even if they haven't always embraced the opportunities.

MOST-READ STORIES

  1. Retro browser war: IE6 vs. Netscape in 2011
  2. The 6 biggest misconceptions about IPv6
  3. Happy Birthday Steve Jobs. Apple CEO turns 56 today
  4. Apple's iPad 2 one more thing: iTunes in the cloud?
  5. Snooping on social networks to vet jurors and hire employees
  6. Anonymous: It's a trap!
  7. Juniper leapfrogs Cisco with QFabric data center product blitz
  8. Pay no attention to that widget recording your every move
  9. Hollywood has had its fill of Apple brand placement
  10. Is IT skills gap keeping companies from hiring?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: