Search This Blog

Thursday, February 16, 2012

IBM's top network exec rips Cisco's rip and replace

  Cisco aims to blunt the power of Microsoft-Skype merger | Skyrocket? Maybe the word for mobile data growth is exa-rocket
 
  Network World Network Optimization

Forward this to a Friend >>>


IBM's top network exec rips Cisco's rip and replace
IBM reversed course on networking in 2010 when it acquired Blade Network Technologies, one of its key network suppliers. Network World Editor in Chief John Dix and Managing Editor Jim Duffy recently caught up with Vikram Mehta, founder of BNT and now vice president of IBM System Networking, for an update on IBM's network visions going forward. Read More


RESOURCE COMPLIMENTS OF: Infoblox

Time-to-Value Through Network Automation
IT is essential to business competitiveness, particularly in financial services and health care. But virtualization, cloud computing, mobility, IPv6 and tight budgets are applying pressure. IT execs need automation tools that deliver rapid time-to-value by enabling dynamic network services, liberating IT staff to pursue strategic goals. Learn more now.

WHITE PAPER: VMware

Performance Analytics: How Normal is Your Data
This VMware paper takes a technical look at a variety of IT performance data (operating system metrics, quality-of-service metrics, business performance metrics, etc.) to determine how well these metrics can be modeled as "normally distributed." Read Now!

Cisco aims to blunt the power of Microsoft-Skype merger
Cisco's plea to make Skype video conferencing protocols public is at least in part a defensive move to protect Cisco's dominance in video as it faces the potentially formidable blending of Skype with Microsoft's unified communication platform, Lync, experts say. Read More

Skyrocket? Maybe the word for mobile data growth is exa-rocket
Mobile data globally is expected to grow 18-fold by 2016, Cisco said in the update to its Visual Networking Index. Read More

How to choose a router for your business
Buying a router for a business isn't as simple as picking a consumer product with the best ratings from an online merchant or the best price on the shelf at a local electronics superstore. Your company has serious needs, such as supporting scores of users (including guests) on the network, and locking down company data to guard against snoops. Read More


WHITE PAPER: NetIQ

First Industy-Wide BSM Maturity Benchmark Study
This first-of-its-kind benchmark study reporting the IT and Business maturity illustrating the business service management imperative today. The survey offers insight into the current and future state of the Business Service Management imperative across global organizations. Learn More

iPad 3: Should it support LTE?
Faster wireless data networks can help usher in a new class of big, beautiful, always-on hosted iPad apps that will need serious bandwidth speed. Read More

Malware network threats rising, how to defend yourself
In 2011, cybercriminals stepped up their game with the creation of malware networks (malnets)-distributed network infrastructures that exploit popular places on the Internet like search engines and social networking sites to repeatedly launch a variety of malware attacks. Read More

Juniper exec gives inside look at QFabric
R.K. Anand, executive vice president and general manager of Juniper Networks' Data Center Business Unit, was employee No. 12 of the network startup back in 1996, leaving a job as a microprocessor designer at Sun Microsystems. Years later he left Juniper for a brief stint at another startup, but came back to help finalize the company's QFabric product and get it out the door. Network World Editor in Chief John Dix recently caught up with Anand at the company's headquarters in Sunnyvale, Calif., for a deep dive on the company's answer to high-end data center demands. Read More


WHITE PAPER: Webroot

Turning Security Upside-down
This paper looks at the kinds of security facilities needed now and in the future, and consider how individuals, organizations and the whole industry should be thinking about security. Learn More!

Full visibility into high-performance nets: Demand 100% packet capture
A new class of packet-based network monitoring and recording solutions are emerging that enable companies running high-speed and ultra-high-speed networks to address the issue of network blindness, a condition that exposes organizations to a raft of operational, legal, compliance and reputational risks. With the cost of network downtime measured in millions of dollars per hour, knowing what's going on inside the network isn't just a nice to have, it's critical. Read More

LightSquared's options to save its network are limited
Though would-be mobile carrier LightSquared says it still wants to find a solution to interference with GPS, its options are limited, industry observers said on Wednesday. Read More

Rx for iPads: More healthcare IT support needed
Plenty of doctors are using Apple iPads, but not many of the tablet computers are outfitted with enterprise network and data access, according to a new survey from Spyglass Consulting Group. Read More

Zynga makes dramatic shift from public cloud
Zynga has moved most of its users away from Amazon Web Services and onto its private cloud in a move to maximize the reliability and performance of its social games network. Read More

 
 
 

SLIDESHOWS

Firefox faceoff: Nightly vs. Pale Moon vs. Waterfox
Three unofficial Firefox variants take advantage of 64-bit processors and 64-bit version of Windows 7.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. 13 security myths you'll hear -- but should you believe?
  2. 10 years after famous Slashdot marriage proposal
  3. Researcher: Email wording a dead giveaway of who's the boss
  4. Forget about public or private cloud, it's all about hyper-hybrid
  5. Mozilla will ask all certificate authorities to revoke SSL-spying certificates
  6. FBI says social media monitoring won't infringe privacy rights
  7. Crypto experts analyze millions of X.509 certificates, call RSA crypto flawed
  8. Two-thirds of Google+ users are men
  9. First look: Cisco Cius
  10. NASA unplugs last mainframe
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: