Search This Blog

Thursday, October 06, 2011

Huawei gunning for Cisco in the enterprise

Startup promotes simultaneous upgrades to IPv6, cloud | 26 helpful open source network management tools

Network World Network Optimization

Forward this to a Friend >>>


Huawei gunning for Cisco in the enterprise
Things are about to get a little hotter for Cisco in the enterprise market. Read More


WHITE PAPER: VeriSign

Approaches to DDoS Protection - A Cost Analysis
All organizations with an online presence or dependence on Internet-based systems need to fortify their defenses against DDoS attacks. Read this paper to learn what an attack can cost an organization, how to develop a DDoS mitigation strategy, and how to get maximum protection from your investment. Read Now!

WHITE PAPER: Palo Alto Networks

Understanding and Selecting an Enterprise Firewall
This Securosis white paper analyzes the disruption happening at the enterprise perimeter, the various technical architectures capable of addressing the new requirements, and deployment considerations for optimal security, availability, and performance. Read now!

Startup promotes simultaneous upgrades to IPv6, cloud
A start-up consulting firm founded by former Cisco engineers is targeting a new niche for enterprise IT departments: helping them deploy IPv6 and cloud computing simultaneously to reduce overhead costs. Read More

26 helpful open source network management tools
Here are 26 network management tools based on open source and available at little or no cost. Read More

Google+ rides momentum up social net ranks
Just weeks after opening up membership to Google+, visits to the new social network are booming. Read More


WHITE PAPER: Dell and Intel

A Virtualization Roadmap
Virtualization is more than a technology. It is a way of thinking about problems that allow us to go beyond the physical limitations normally associated with entire classes of hardware, from servers to storage. Attaining the maximum benefits of virtualization, however, requires a plan and constant monitoring to ensure peak performance. Read now.

Networking stars shut out of 2010 National Medal of Technology and Innovation
When President Obama this past week named 7 researchers as recipients of the National Medal of Science and 5 more as winners of the National Medal of Technology and Innovation, innovators in networking technology didn't make the cut. Read More

WiFi users blissfully ignorant about real security, research finds
New research conducted on behalf of the Wi-Fi Alliance shows that while wireless users are making strides on the security front, they're still leaving their Wi-Fi networks too open to intruders. Read More

The new Novell
Novell, which was acquired by The Attachmate Group in April, wants to regain its status as an IT icon and will try to do so by focusing its efforts on its core assets and rebuilding relationships with its huge installed base. Network World Editor in Chief John Dix recently caught up with Novell President Bob Flynn and VP of Product Management and Marketing Eric Varness for a briefing on their rebuilding plans. Read More


WHITE PAPER: Oracle

Making Database Security an IT Security Priority
Tanya Baccum, SANS Institute analyst, discusses the importance of having an appropriate IT security strategy that mitigates risk to databases by introducing key steps and controls to effective database security. Read More!

NYC goes wireless to cut costs, expand services
New York City is expanding the use of its citywide wireless network to more than a million devices as it tries to cut costs and expand the range of services available to residents, the city's CIO said on Wednesday. Read More

Ten security essentials for the networked enterprise
The ideal information security environment is different depending on who you talk to. Your typical security engineer may say it must have firewalls, intrusion detection or any number of security focused technologies. Meanwhile a security tester may suggest that it is conducting penetration testing to provide assurances that security widgets are working well. Read More

Use profiling to improve Snort performance
Snort, the open source intrusion detection and prevention system (IDS/IPS), can be a fabulous tool to protect your network from attack – if it's set up correctly. If it's not, it can cause network traffic and performance problems. Here's a rundown of how to use Snort's built-in profiling tools to tune your setup and improve Snort's performance. Read More

'Well organized, sophisticated, fast' cybercriminals scare US banks
BITS, the U.S. financial industry's IT policy arm, has a new leader: Paul Smocer, an expert in email security and authentication. Read More

HP aims high with top-of-rack 10G Ethernet switch
HP this week is rolling out an array of networking products for the enterprise campus, branch and data center, including a switch that fills a major gap in the company's offerings. Read More



SLIDESHOWS

26 helpful open source network management tools
Over the last decade or so, open source development has skyrocketed, and network management software has ridden that wave. Many frustrated IT administrators have turned to free tools to monitor, configure and map their networked devices. Here are 26 examples of open source network management software tools to help you do your job.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Steve Jobs gave Barack Obama an iPad 2 "a little bit early"
  2. Microsoft zapping Zune music player
  3. Apple unveils iPhone 4S
  4. Can Hotmail revamp win back GMail defectors?
  5. Red Hat raids cloud storage market by acquiring Gluster
  6. 2010 IT budgets, salaries on the rise, survey says
  7. 26 helpful open source network management tools
  8. CEO Steve Ballmer 'underpaid,' Microsoft says
  9. The new Novell
  10. Will the Mer Project keep MeeGo alive?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: