Search This Blog

Thursday, August 16, 2012

Cisco answers user questions about upcoming Apple Bonjour Gateway

  What do Katy Perry and Aruba Networks have in common? | 26 helpful open source network management tools
 
  Network World Network Optimization

Forward this to a Friend >>>


Cisco answers user questions about upcoming Apple Bonjour Gateway
To cope with the rising tide of iOS devices trying to use Apple's Bonjour discovery protocol on enterprise networks, Cisco recently announced that it is building a Bonjour gateway for its wireless LAN controllers. The company replied to nine follow-up questions after an online webinar for IT professionals about the product. Read More


WHITE PAPER: Silver Peak Systems, Inc.

Proven Techniques to Cope with Packet Loss
If you have a WAN link with an RTT of 100 ms and packet loss of 1% the throughput is virtually nil. Learn how to overcome this issue in this paper that highlights: - Key WAN characteristics of out of order and lost packets - Packet loss impact on data replication - How MPLS statistics fool network professionals Learn more.

WHITE PAPER: F5

Capitalize on the Cloud with a Sound Network Strategy
New research underscores cloud computing's challenging effects on corporate networks, but solutions are available. Learn More!

What do Katy Perry and Aruba Networks have in common?
Aruba Networks' new LAN solutions address the connectivity problems that Katy Perry has so perfectly described in the past. Read More

26 helpful open source network management tools
Over the last decade or so, open source development has skyrocketed, and network management software has ridden that wave. Many frustrated IT administrators have turned to free tools to monitor, configure and map their networked devices. Here are 26 examples of open source network management software tools to help you do your job. Read More

Attack on airport VPN bypassed multi-factor authentication, security firm reports
Cybercriminals have found a way to circumvent the multi-factor authentication systems used to protect business VPNs, according to security firm Trusteer, which has reported a recent targeted attack on an airport network using this method. Read More


WHITE PAPER: Cisco

Cisco Bring Your Own Device
This paper explores the challenges mobile devices create for IT, offers key considerations before adopting a BYOD strategy and highlights a comprehensive architecture from Cisco that enables freedom of choice for users while affording IT security and control. Learn more.

Want to know where Motorola Mobility is going? Look at who's driving
Most of the $12.5 billion Google paid for Motorola can be attributed to the value of the patents it acquired that it needs to defend against patent litigation from companies like Oracle and Apple. Read More

Tech bullies behaving badly
Tech giants have thrown their weight around to get what they want for years. Here's a look at some of the big tech companies that have been caught indulging in boorish behavior. Read More

The security game changes when the bad guys are backed by foreign governments
Fidelis Security Systems has an interesting perspective on the world of security, working, as it does, with the U.S. government to keep other countries from prying into some of our nation's most critical networks. Now that many of those same countries are after intellectual property housed by enterprise shops, commercial customers are knocking at Fidelis' door looking for help. Network World Editor in Chief John Dix talked to Fidelis CEO Peter George about the shifting threat landscape and what companies are doing to cope. Read More


WHITE PAPER: HP

Bring Your Own Mobile Devices to School
In today's educational environments, more and more students, guests, and faculty are bringing in their own Wi-Fi devices into the school's network. This paper discusses the challenges and solutions IT administrators are facing and how to address the security and management of the multiple devices being introduced into the wireless/wired network. Learn more.

IBM wants RIM's crown jewel -- its enterprise business, report says
IBM has shown interest in acquiring the vital enterprise services business of struggling smartphone maker Research in Motion, according to a Bloomberg report on Friday. Read More

HP aims three-part effort at network virtualization
Hewlett-Packard is readying three new software capabilities that are designed to help enterprises pool their computing and storage resources across a network. Read More

Walmart, Target, others team to offer mobile payments network
More that a dozen retailers including Best Buy, Walmart, Target and 7-Eleven have joined forces to form the Merchant Customer Exchange (MCX), a mobile-payments network that will compete with Google and Isis. Read More

Salesforce.com app lets companies build online communities
Salesforce.com plans to announce a new application on Tuesday that lets companies create enterprise social networks where they can interact with customers and partners. Read More

 
 
 

SLIDESHOWS

9 ex-Googlers on the move
Former Google employees continue to make their mark on the tech world.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. United Airlines 'loses' 10-year-old girl, torments parents
  2. Anonymizer tied to company selling TrapWire surveillance to governments
  3. The fascinating world of the ubiquitous antenna
  4. Gartner: Cloud computing's most over-hyped terms
  5. HP aims three-part effort at network virtualization
  6. Unblinking surveillance stare: Army's 7-story flying football field-sized blimp
  7. RTM builds of Windows 8 reveal Microsoft blocked any bypassing of the Metro desktop
  8. Do you know where your used Cisco is coming from?
  9. Inside the real economy behind fake Twitter accounts
  10. 25 essential business apps for Android
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: