Search This Blog

Monday, November 14, 2011

Cisco girds for Huawei's US entry

David vs. Goliath: 15 Potential Tech Shake-Ups | Federated Cloud Strategies: What CIOs Need to Know

Network World Cisco

Forward this to a Friend >>>


Cisco girds for Huawei's US entry
Analysts are upbeat on Cisco's fiscal Q1 results, which beat Wall Street estimates and served as proof positive that the company's restructuring is paying off. There were several highlights in the quarter, but there are also areas still in need of improvement. Read More


WHITE PAPER: BMC

One Size Does Not Fit All: The Case for the Custom Cloud
When it comes to cloud services, "semi-custom" goes a long way. "The Case for the Custom Cloud," shows you how users can configure their own customized cloud services from choices you dictate – and how you can deliver the resulting cloud services quickly and affordably. Read More!

WHITE PAPER: MegaPath

Today's Network: Make It a Strategic, Future-Proof Asset
Today's small and mid-sized organizations support dozens of applications and hundreds of devices and mobile workers. Network congestion has become a risk, as users change offices, work from home and add devices at will. SMBs need simplification in the form of network convergence. And a managed service provider can help. View Now

David vs. Goliath: 15 Potential Tech Shake-Ups
Here are 15 'Davids' out to take down larger competitors. Read More

Federated Cloud Strategies: What CIOs Need to Know
As cloud computing adoption skyrockets and business functions increasingly look to external cloud providers to provision IT services, CIOs need to consider federated cloud strategies to integrate and manage this mixed bag of cloud computing environments. Read More


WHITE PAPER: Cisco Systems

CVD program facilitates fast & reliable customer deployments
The Cisco Validated Design program facilitates faster & more reliable customer deployments. Cisco Application Velocity is the Borderless Network Service that maximizes the user experience for any application, any time, on any device and provides application adaptability/survivability. Learn More

US intelligence group seeking cutting-edge, secure chip development
The cutting-edge intelligence research development arm of the government wants to take advantage of the world's semiconductor manufacturing capacity but make sure that US security and intellectual property protection is baked in. Read More

Wall Street Beat: IT rebounds as Nvidia, Cisco shares rise
With Nvidia and Cisco reporting results, there was some good news on the chip and networking front this week that, with the help of a successful debt offering by Italy that eased economic concerns, helped fuel a rise in IT vendors' shares Friday morning. Read More


WEBCAST: IBM

Customer Lifetime Value for IT
With technology underpinning much of the customer experience, IT and marketing must adopt new technologies to innovate and grow revenues. Watch the video to learn how IBM SPSS Predictive Analytics enables marketers while reducing the burden on IT. View Now

FBI takes out $14M DNS malware operation
US law enforcement today said it had smashed what it called a massive, sophisticated Internet fraud scheme that injected malware in more than four million computers in over 100 countries while generating $14 million in illegitimate income. Of the computers infected with malware, at least 500,000 were in the United States, including computers belonging to U.S. government agencies, such as NASA. ... Read More

Forrester to security pros: Think before rushing to fix security holes
Forrester Research this week published a report that advises security professionals not to jump the gun on fixing security deficiencies immediately after a data breach is identified since that could destroy valuable evidence needed to prosecute cyber-criminals. Read More

Chambers: Cisco's Q1 solid, but access routers, Nexus 7000 lagging
Despite a solid quarter as evidence its turnaround plan is working, Cisco still has more work to do to get where it wants to be. Read More



SLIDESHOWS

Wi-Fi security do's and don'ts
Wi-Fi is inherently susceptible to hacking and eavesdropping, but it can be secure if you use the right security measures. Unfortunately, the Web is full of outdated advice and myths. But here are some do's and don'ts of Wi-Fi security, addressing some of these myths.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. DARPA program to alter security authentication techniques
  2. Fabric wars: Cisco vs. Brocade vs. Juniper
  3. Cisco's Q1 solid, but access routers, Nexus 7000 lagging
  4. Snoop conference for gov't spying: Go stealth, hit a 100,000 targets
  5. Gartner: The top 10 strategic technology trends of 2012
  6. FBI takes out $14 million DNS malware operation
  7. Kindle Fire may outsell iPad this holiday season: survey
  8. Steve Jobs' advice to Facebook's Mark Zuckerberg
  9. Apple ships iOS 5.0.1 with battery fixes, patches
  10. Forrester to security pros: Think before rushing to fix security holes

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: