Search This Blog

Friday, November 11, 2011

Chambers: Cisco's Q1 solid, but access routers, Nexus 7000 lagging

Cisco counterfeiter sentenced | Fave raves: 22 IT pros name their favorite products

Network World Cisco

Forward this to a Friend >>>


Chambers: Cisco's Q1 solid, but access routers, Nexus 7000 lagging
Despite a solid quarter as evidence its turnaround plan is working, Cisco still has more work to do to get where it wants to be. Read More


WHITE PAPER: MegaPath

Today's Network: Make It a Strategic, Future-Proof Asset
Today's small and mid-sized organizations support dozens of applications and hundreds of devices and mobile workers. Network congestion has become a risk, as users change offices, work from home and add devices at will. SMBs need simplification in the form of network convergence. And a managed service provider can help. View Now

WHITE PAPER: AMD

Virtualized for Agility
Server virtualization is a transformative technology offering a myriad of benefits to companies of all sizes. By consolidating hardware and placing multiple virtual machines on a single server, organizations can decrease both capital and operational expenses while boosting server utilization rates and easing management. Learn More!

Cisco counterfeiter sentenced
A Kansas man was sentenced this week after pleading guilty to selling counterfeit Cisco networking products. Timothy Weatherly, 29, of Overland Park, KS, received 27 months in federal prison for an elaborate, eight year scheme that acquired products from China and attached Cisco logos to them. Read More

Fave raves: 22 IT pros name their favorite products
When we asked IT pros about their favorite enterprise tech products, their picks included all kinds of hardware and software. The common thread? Gear that saves time or money, increases productivity or tightens security. Read More


WHITE PAPER: Wildpackets

Eliminate Packet Loss during 10G Monitoring
There are a number of choices for deploying packed-based monitoring and analysis against 10G segments, but as traffic volumes grow, the limitations of many options become problematic. This EMA paper examines the issues surrounding 10G network management and monitoring with emphasis on effective packed-based instrumentation. Read More

DARPA to detail program that radically alters security authentication techniques
Researchers from the Defense Advanced Research Projects Agency will next week detail a new program it hopes will develop technology to dramatically change computer system security authorization. Read More

US snapshot of broadband world finds disparity and dial-up
Almost seven of 10 households in the United States subscribe to broadband service while 68% of American households used broadband Internet in 2010, up from 64% in 2009 and only 3% of households still rely on dial-up access to the Internet in 2010, down from 5 percent in 2009. Those were but a few of the interesting facts found in a snapshot of broadband use in the US released this week by the Department... Read More


WHITE PAPER: Cisco Systems

CVD program facilitates fast & reliable customer deployments
The Cisco Validated Design program facilitates faster & more reliable customer deployments. Cisco Application Velocity is the Borderless Network Service that maximizes the user experience for any application, any time, on any device and provides application adaptability/survivability. Learn More

Gartner: Security services spending to hit $49B in 2015
Gartner is predicting that corporate spending across the world for a broad swath of security services will climb from about $35 billion today to $49 billion in three years, with the managed security services expected to jump most of all. Read More

The Network Is The Security
How do you detect sophisticated attacks in progress? It isn't easy. Large organizations collect data from a number of sources like log files and NetFlow and then organize and analyze this data using tools like log management and SIEM. Based upon the recently-published ESG Research Report, "U.S. Advanced Persistent Threat Analysis," these tried-and-true security methods are no longer enough. Read... Read More

Techniques for Prolonging the Lifespan of IPv4
IPv6 proponents have long been predicting the death of IPv4 to get the industry to recognize the importance of IPv6. Although IPv4 address exhaustion has occurred many organizations are still uncertain about the next steps. It is clear that IPv4 is going to be with us for decades to come and there are strategies to prolong the lifespan of IPv4. Are these strategies worthwhile or are they distracting... Read More

Cisco posts small revenue gain
Cisco Systems has completed most of a major restructuring that began early this year, and on Wednesday posted revenue and profit for its fiscal first quarter that exceeded analysts' expectations. Read More



SLIDESHOWS

Wi-Fi security do's and don'ts
Wi-Fi is inherently susceptible to hacking and eavesdropping, but it can be secure if you use the right security measures. Unfortunately, the Web is full of outdated advice and myths. But here are some do's and don'ts of Wi-Fi security, addressing some of these myths.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. FBI takes out $14 million DNS malware operation
  2. Fabric wars: Cisco vs. Brocade vs. Juniper
  3. Adobe's decision to ditch mobile Flash: What you need to know
  4. Gartner: The top 10 strategic technology trends of 2012
  5. Juniper at the root of Internet outage?
  6. Meme-mania: The Musical, plus this week's other geekiest videos
  7. Microsoft isn't Apple: Redmond OKs Windows Phone 7 jailbreak tool
  8. Comcast begins rollout of IPv6 production network
  9. Microsoft patch snuffs out major worm potential
  10. iPhone apps: DIY skill that's in big demand

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: