Friday, September 28, 2012

Cisco thinks smart, acquires ThinkSmart

Does anyone want to volunteer their private security information? | Wi-Fi architectures are changing, and new products are improving accordingly

Network World Cisco

Forward this to a Friend >>>


Cisco thinks smart, acquires ThinkSmart
Yesterday, Silicon Valley's biggest shopaholic, Cisco, added to its wireless portfolio when it announced the acquisition of a small company that develops Wi-Fi analytic technologies called ThinkSmart Technologies. ThinkSmart is a Cork, Ireland, based technology company that uses the information it gains from Wi-Fi networks to collect intelligent information such as time of day, traffic patterns and... Read More


RESOURCE COMPLIMENTS OF: Google

Google Apps for Business
Do more for less with your team using Google Apps. Custom web-based email, calendars, and documents to easily share & work together in the cloud. Start with a free 30-day trial!

WHITE PAPER: FandoTech

Understanding Recovery vs. Continuance
Understanding the difference between "disaster recovery" and "business continuance" is imperative to finding the right-fit backup, recovery and restoration solution for any organization. Consider the 4 business factors that drive RPO and RTO requirements essential to surviving unplanned outages. Learn more.

Does anyone want to volunteer their private security information?
It has been almost 10 years since FISMA was enacted, the last major federal law to focus primarily on information security. Even then, the scope of FISMA was limited to federal government agencies and selected contractors. Read More

Wi-Fi architectures are changing, and new products are improving accordingly
The current, dominant architecture for enterprise Wi-Fi networks is to have a bunch of "thin" access points (APs) deployed for coverage with a number of controllers used as the "brains" of the deployment. The APs provide the connectivity to the devices and the controller acts as a central point of control for configuration, security and policy. This model is very common and has been in place... Read More


RESOURCE COMPLIMENTS OF: Google

Google Apps for Business
Do more for less with your team using Google Apps. Custom web-based email, calendars, and documents to easily share & work together in the cloud. Start with a free 30-day trial!

Big Changes Could be Coming in the Endpoint Security Market
Over the past few weeks, I've spoken to a number of security vendors including Bit9, Bromium, CounterTack, Invincea, Malwarebytes, and Sourcefire. Each of these firms is offering some type of new security technology for detecting/blocking advanced malware that circumvents traditional defenses like firewalls, IDS/IPS, and antivirus software. Read More

Air Force sets first post in ambitious Space Fence project
The US Air Force this week said it will base the first Space Fence radar post on Kwajalein Island in the Republic of the Marshall Islands with the site planned to be operational by 2017. Read More


WHITE PAPER: BMC Software

Standardize on Process-oriented Best Practices
If you're looking to adopt IT best practices to realize efficiencies and make better use of your limited resources while keeping pace with the growing demands of the business, ITIL can help! And adopting those best practices put forth by ITIL doesn't have to be a complicated or expensive project! Read Now!

Connected devices to outnumber humans six to one by 2020
By 2020, connected devices will outnumber connected people by six to one, and mobile broadband will be driving internet usage as fixed connections dwindle, according to a new report. Read More

12 Common Project Management Mistakes--and How to Avoid Them
So many projects, so much mismanagement. That's the refrain of many IT executives. Indeed, even with project management software, IT projects often wind up taking longer (much longer) than planned and costing more than budgeted. Read More



SLIDESHOWS

15 more useful Cisco sites
Another lineup in our continuing search for the most useful sites on the Web for Cisco users and practitioners.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. .xxx to launch porn search engine
  2. First look: Ubuntu 12.10
  3. The three best, Star Wars-influenced approaches to learning Linux
  4. Islamic hacktivists' bank hacking claims gain credibility
  5. Time to eat crow: Windows 8 is better than Windows 7
  6. Torvalds calls Romney 'a f***ing moron'
  7. iOS 6 device users report baffling range of Wi-Fi problems
  8. 11 (free!) Microsoft tools to make life easier
  9. Six free Cisco Labs
  10. 'Replacement Google' creator awaiting NFL penalty flag

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment