Search This Blog

Tuesday, August 23, 2011

Cisco aims for a go-anywhere router

The real 'investment protection' story of the Cisco 6500 | How to join the gold rush for mobile apps

Network World Daily News AM

Forward this to a Friend >>>


Cisco aims for a go-anywhere router
Cisco Systems made its fortune selling routers for the cores of enterprise and service-provider networks, but now the company is sending its technology farther from those cozy confines than ever before. Read More


RESOURCE COMPLIMENTS OF: BI & Analytics Perspectives

The premier conference for Business Intelligence & Analytics
This year's speakers include: Don Campbell, Chief Technology Officer, IBM, John Lucas, Director of Operations, Cincinnati Zoo & Botanical Garden, Ned Kumar, Senior Strategic Marketing Fellow and SEO Strategist, FedEx Services, James Taylor, CEO Decision Management Solutions and Faculty Member, International Institute for Analytics (IIA), & more. Click to continue

RESOURCE COMPLIMENTS OF: Diskeeper Corporation

Instant Defrag Makes Systems Faster!
Fragmentation wastes the I/O bandwidth critical to peak system performance. Diskeeper 2011 automatically prevents most fragmentation from ever happening and instantly defrags the rest with zero system resource conflicts. Editions for workstations, laptops, servers and enterprise servers. Try free now for 30 days.

The real 'investment protection' story of the Cisco 6500
Art Fewell: "As I am sure you all saw, Cisco recently announced the Supervisor 2T, extending the lifespan of the much loved platform. This continues Cisco's marketing message of investment protection around the 6500... the problem is, that the 'investment protection' story told here is simply false." Read More

How to join the gold rush for mobile apps
As demand surges for apps to run on iOS, Android and whatever operating system will power the next wave of smart mobile devices, companies are facing a dearth of mobile development talent. For IT professionals with programming skills, that gap represents a fresh opportunity to embark on a career makeover. Read More

21 Chrome Web Apps for Serious Work
If you use Google's Chrome browser (or a Chromebook), check out these great document creation, collaboration and management tools. Read More

Cisco Announces the Cisco Certified Technician
Practical. That's the one overriding word that keeps coming to mind when I think of Cisco's new Cisco Certified Technician (CCT) cert announced today. But then again, I've always been a fan of the Cisco TAC, and it's not surprising that a cert developed by the TAC, for a very specific purpose, would indeed be practical. Read More


WHITE PAPER: Fujitsu

New TPC-E Benchmark Results Revealed
A "glue-less" design, where no additional hardware is necessary to run all eight CPUs and all memory slots enable the shortest route between processors, memory modules and I/O hubs inside a single chassis. It's just one of the many reasons Fujitsu servers are leading the way in TCP-E benchmarks and overall price/performance. Read now!

First look: VMware vSphere 5 looms large
Automated host deployment, revamped HA, large-scale VM support, and storage automation features rev up vSphere for big shops. Read More

Google patches critical bug in Windows Chrome
Google on Monday patched 11 vulnerabilities in Chrome, including one of the rare bugs the company has deemed critical in its browser. Read More

Apple reportedly has completely new Mac product in the pipeline
Now comes word that Apple might be adding a new product altogether to its product lineup. Read More

A case against third-party management tools
Why don't I use third-party tools? Well, one of the biggest reasons is because they're typically not nearly as advanced as they would have you believe. Read More


WHITE PAPER: GFI Software

Email Security in Small and Medium-sized Businesses
No organization can afford to operate without an email security strategy. The risk landscape is constantly changing with new threats surfacing every day. This white paper looks at email security in small and medium businesses, the solutions available and what features SMBs cannot do without. Read now

Stronger IPsec VPN Configurations Needed
The use of IPsec is pervasive throughout the networking industry. However, many organizations are using IPsec in sub-optimal configurations that result in weaker connection security. Read More

Rumors of HP's Death are Ridiculously Exaggerated
There seems to be a bit of a disconnect between what HP has said and what some people are reporting. While Leo Apotheker made his plans rather clear, you may be hearing to the contrary. Read More

HP allays fears around PC business uncertainty
Business continues as usual for Hewlett-Packard's PC unit, which will continue to support and sell products as the company explores options to spin off or sell the Personal Systems Group, HP said on Monday. Read More

The race to cloud standards gets crowded
The rise of cloud computing has led to a strong push from IT leaders at many major companies to develop standards that address issues such as security and data portability in the cloud. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

Tips and tricks for protecting Android devices
Android doesn't rival BlackBerry when it comes to security and enterprise support. But Android devices can still be reasonably secure. Here are some tips to help you protect your investment, privacy, and data.

MOST-READ STORIES

  1. HP's webOS crashes under Apple, Android pressure
  2. Torvalds says, "Virtualization is evil"
  3. Linus Torvalds: ARM has a lot to learn from the PC
  4. With SSL, who can you really trust?
  5. The collar bomber's explosive tech gaffe
  6. HP PC spin-off puts pressure on Microsoft to nail Windows 8
  7. HP plans PC spinoff, $10 billion Autonomy buy
  8. HP kills tablets, confirms PC spin-off plans
  9. Dropbox cloud was a haven for data thieves, researchers say
  10. NSTIC director: 'We're trying to get rid of passwords'

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: