Search This Blog

Friday, February 17, 2012

Cisco on Microsoft/Skype: Sour grapes?

Cisco study finds The Who was right! | IRS unearths Dirty Dozen tax scams of 2012

Network World Cisco

Forward this to a Friend >>>


Cisco on Microsoft/Skype: Sour grapes?
Does Cisco have non-buyer's remorse over the Microsoft/Skype union? Read More


WHITE PAPER: Mitel

Uniting the Worlds of Data and Voice
This White Paper from Mitel and VMware evaluates the benefits and methodology for integrating Unified Communications into the Virtual Data Center. Discover the benefits and learn how your organization can maximize its virtualization investments by integrating your voice applications. Learn More

WHITE PAPER: NetIQ

Streamlining IT Operations with Business Service Management
This IDC Technology Spotlight examines the benefits of a business service management practice and tools in response to IT environments becoming more dynamic and complex due to the increased use of virtualization, cloud, SOA, and n-tier application architectures. Learn More

Cisco study finds The Who was right!
The number of mobile Internet - connected devices will exceed the number of people on earth by 2016, leading to an 18-fold increase in the amount of mobile data traffic and a 3X increase over fixed data traffic in the next five years. Read More

IRS unearths Dirty Dozen tax scams of 2012
The Internal Revenue Service today issued its annual "Dirty Dozen" ranking of tax scams the agency say tend t osurface around tax season each year. "Taxpayers should be careful and avoid falling into a trap with the Dirty Dozen," said IRS Commissioner Doug Shulman in a statement. "Scam artists will tempt people in-person, on-line and by e-mail with misleading promises about lost refunds and free... Read More


WEBCAST: NetIQ

Disaster Recovery Planning and the Cloud
Find out how virtualization is the stepping stone to the cloud and how to leverage virtualization technologies today to reduce the cost and improve the performance of your disaster recovery plan. Learn More!

Meg Whitman brings the swagger back to Hewlett-Packard
After a tumultuous year for Hewlett-Packard Co. (NYSE: HPQ), new CEO Meg Whitman brought the vendor back to its roots and delivered the messages channel partners wanted to hear in her keynote at the global partner conference Wednesday: HP is proudly a hardware company first and foremost, and its primary route to market will be through the channel. Read More

Exactly what is Homeland Security watching for on Facebook, Twitter, YouTube?
The idea that any number of federal institutions are watching your every move on social networks like Facebook, Twitter is unnerving at best. The Department of Homeland Security is one of those agencies and today it testified before a House subcommittee to define and defend its role in social media monitoring. Read More


WHITE PAPER: HP

Optimizing Enterprise WLAN Performance
This white paper reviews business and technology trends impacting enterprise wireless networks and describes how HP Mobility Solutions in general and HP Mobility Traffic Manager in particular enable the industry's most scalable, cost-effective and manageable wireless network deployments. Learn more

DDoS attackers start targeting IPv6 networks
Cybercriminals have started launching distributed denial-of-service (DDoS) attacks against networks that transmit data over IPv6 (Internet Protocol version 6), according to a report published recently by DDoS mitigation vendor Arbor Networks. Read More

Cisco loses its smart grid head
Cisco has lost another high-ranking executive, as Microsoft last week named Laura Ipsen as corporate vice president of its Worldwide Public Sector organization. Read More

Note to Congress: Pass Cybersecurity Legislation Now
Earlier this week, the Senate Homeland Security and Government Affairs Committee (HSGAC) introduced a cybersecurity bill that would outline the Department of Homeland Security's responsibilities for overseeing cybersecurity at privately-owned critical infrastructure organizations. Read More

The Evolution of Endpoint Security
Back in 2007, ESG asked 206 IT enterprise security professionals to respond to the following statement: Endpoint security has become a commodity market with little difference between products. A majority (58%) of respondents either "strongly agreed" or "agreed" with this statement. Read More



SLIDESHOWS

Firefox faceoff: Nightly vs. Pale Moon vs. Waterfox
Three unofficial Firefox variants take advantage of 64-bit processors and 64-bit version of Windows 7.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. iPad 3 rumor rollup for the week of Feb. 14
  2. iPad 3: Should it support LTE?
  3. ENIAC, world's first digital computer, turns 66
  4. EFF promises new fight against software patent abuse, but ....
  5. 13 security myths you'll hear -- but should you believe?
  6. Forget about public or private cloud, it's all about hyper-hybrid
  7. One more take on the iPad of the future: the MacPad Pro
  8. U.S. cyber counterattack: Bomb 'em one way or the other
  9. Cisco study finds The Who was right
  10. Cisco loses its smart grid head

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: