Monday, May 07, 2012

Intel Romley slowing sales of Cisco UCS?

CIOs see Cisco gaining, Juniper in trials | DARPA system to blend AI, machine learning to understand mountain of text

Network World Cisco

Forward this to a Friend >>>


Intel Romley slowing sales of Cisco UCS?
While Interop is in full swing next week, Cisco will announce its fiscal 2012 third quarter earnings on Wednesday, May 9. At least one analyst expects Cisco to hit its targets, based on 35 interviews with channel partners in the US and Europe. Read More


WHITE PAPER: HP

Defining Next-Generation Network Intrusion Prevention
This HP newsletter on Next-Generation Intrusion Prevention features a recent report by Gartner, "Defining Next-Generation Network Intrusion Prevention," that outlines their view of what "next-generation" IPS means and the security features it needs to deliver. View Now

WHITE PAPER: CenturyLink

Network/Cloud Security & Business Continuity eGuide
Network security today means much more than simply building a perimeter around the enterprise network to defend from threats. With cloud-computing models becoming more popular, enterprises are extending corporate data and applications outside the four walls of the data center. Learn More!

CIOs see Cisco gaining, Juniper in trials
The top three priorities for CIOs in 2012 are security, wireless LAN and Ethernet switching, according to a survey conducted by investment firm UBS. Read More

DARPA system to blend AI, machine learning to understand mountain of text
The Defense Advanced Research Projects Agency (DARPA) will next this month detail the union of advanced technologies from artificial intelligence, computational linguistics, machine learning, natural-language fields it hopes to bring together to build an automated system that will let analysts and others better grasp meanings from large volumes of tex Read More


WHITE PAPER: HP

Migrate Your Data Center to Open, Standards-based Networks
Discover the merits of a dual-vendor strategy for data center networking, and learn how to migrate your data center to open standard HP networks. This document discusses the planning and deployment phases that are an integral part of the Plan, Deploy, Install, and Operate (PDIO) model. Learn more.

Gartner says half of enterprises are wasting money on social media
Getting a positive return on investment from a social media campaign is about more than tracking the number of your Facebook fans and Twitter followers. It's about linking the social strategy to measurable business objectives, according to Gartner, which says most businesses aren't doing this. Read More

IBM: The rapidly changing role of top security executives
Security issues are exerting a ton of pressure and monetary concerns on the executives in charge of keeping corporate networks and assets safe. Read More


WHITE PAPER: Condusiv Technologies (formerly Diskeeper Corporation)

Best Practices for Using V-locity® on SANs
This white paper provides a clear and in-depth look at what's really going on and how to significantly improve performance of SAN storage. Learn More

FAQ: What you need to know about CISPA
The U.S. House of Representatives last week passed the controversial Cyber Intelligence Sharing and Protection Act (CISPA) despite opposition from privacy advocates, lawmakers and the White House, which threatened to veto the bill if it lands on the president's desk in its current form. Read More

10 Must-Have Gadgets for the Traveling Executive
Members of an increasingly mobile workforce can suffer from gadget overload. From smartphones, tablets and notebooks to a wide variety of peripherals for security, battery charging and productivity on the go, deciding which devices to pack can be a daunting challenge. Here are 10 smart gadgets to help you work better while on the go. Read More

The sizzling world of asteroids
From new space mining venture to causing the end of the world, asteroids are a hot topic Read More

The Most Mortifying Moments in IT Security History
From Lockheed Martin and HBGary Federal to the US government and Cornell University, no one is immune to humiliating security glitches Read More



SLIDESHOWS

7 reasons why Linux is a desktop flop
Writer Maria Korolov runs through all the reasons why Linux has not made any headway despite its many strengths.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 10 ways to celebrate Star Wars Day
  2. Samsung's Galaxy S III: four things to know
  3. Microsoft Researchers say cybercrime loss estimates are a bunch of bunk
  4. How to land a cybersecurity job
  5. Hottest IT skill? Cybersecurity
  6. Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial
  7. The 10 worst Web application-logic flaws that hackers love to abuse
  8. Why Linux is a desktop flop
  9. Tech's 10 most famous college dropouts
  10. Step aside Anonymous, here comes The Unknowns

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment