Search This Blog

Friday, March 16, 2012

Cisco pays $5 billion for video company buy

Cisco Rolls out its Next Generation Fabric Computing | Advanced tech conflict: China's rare earth stranglehold

Network World Cisco

Forward this to a Friend >>>


Cisco pays $5 billion for video company buy
Cisco this week said it will acquire NDS Group Ltd., a provider of video software and content security systems for service providers and media companies, for $5 billion. Read More


RESOURCE COMPLIMENTS OF: Microsoft

Try Microsoft Office 365, free
Collaborate in the cloud with Office, Exchange, SharePoint, and Lync videoconferencing. Access, edit, and share documents. Starting at $8/user/month. Try it free.

WHITE PAPER: Bradford Networks

BYOD Deluge
This white paper will explore network access control (NAC) and mobile device management (MDM) and how together they can enable IT departments to effectively oversee devices and the network in this new era of IT consumerization. Learn more.

Cisco Rolls out its Next Generation Fabric Computing
Cisco as a server vendor! Ha! Read More

Advanced tech conflict: China's rare earth stranglehold
The battle over access to rare earth materials, critical components of all manner of advanced technologies from smartphones and computers to aircraft and cars, raged again this week as the United States, Europe and Japan joined forces to challenge China's restrictions on exports of the metals. The crux of the situation: China controls some 95% of the world's rare earth materials and sets prices and access to the materials willy-nilly and of course has threatened to cut off access to the stuff at the drop of a hat. The U.S. and Australia have begun mining rare earth materials but they are years away from equaling China's production. So the battle rages. Here's a look at the conflict. Read More


WHITE PAPER: Dell

Can Your Network Infrastructure Handle It All?
Virtualization and other application layer technologies demand unification. The first step to creating a unified IT department that can build application-aware infrastructure is creating an inventory that reflects all resources that were once held in silos. Answer the 7 questions in this eGuide to get started. Learn More Now!

Wordless tribute to a machine that moved millions of voices
AT&T has given new life to "The Hello Machine," a 1974 wordless film that celebrates the hand-crafting by Western Electric workers of a complete Electronic Switching System, which at the time was not yet 10-year-old technology. Directed by Carroll Ballard ("Never Cry Wolf," "The Black Stallion"), the 11-minute "film-poem" was posted to the AT&T Tech Channel on YouTube earlier this month. Read More

CIA director tells a funny computer engineering joke
Had to pass this one along. Seems CIA Director David Petraeus made an amusing computer engineering joke to start of his speech at the recent In-Q-Tel CEO Summit. It goes like this: Read More


WHITE PAPER: FireEye

FireEye Advanced Threat Report – 2H2011
This report is unique in that it is not an analysis of well-known malware or billions of spam messages. Instead, we provide insight into the threats that are successful and therefore dangerous -- those which got through traditional defenses and into enterprise networks in 2H 2011. Read now.

Avaya giving UC line a video boost with $230M Radvision buyout
In a move aimed at enhancing video capabilities in its unified communications offering, Avaya announced plans Thursday to purchase videoconferencing company Radvision for $230 million. Read More

From Coca-Cola: How to empower IT
As the CIO of the Coca-Cola's Bottling Investments Group, Javier Polit has strong ideas about how to ensure that IT is in sync with the company's business needs. Read More

It's Time For An Enterprise Encryption Strategy
A few years ago, I began writing and talking about data encryption management problems on the horizon. I was right about the issues but a bit aggressive on the timing. Based on what I'm seeing lately however, the encryption management sky may finally be falling (or at least starting to fall). Read More



SLIDESHOWS

Useful security threat data advisory tools
Check out these browser-based tools to keep up on the latest cyber security threats.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Judea Pearl, a big brain behind artificial intelligence, wins Turing Award
  2. 10 ways to celebrate Pi Day
  3. Microsoft: Don't hate on IE 10
  4. Apple joins iPad trade-in bandwagon, offers competitive deals
  5. A look at China's cyberwar planning
  6. Alcatel-Lucent switch pushes Cisco, HP at the edge
  7. Looking for stolen iPad, police find 750 pounds of Meth
  8. Talent pool not big enough to meet cloud computing job demand
  9. Cisco rolls out its next generation fabric computing
  10. Indiana turns up 100G Ethernet research net

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: