Search This Blog

Monday, February 25, 2013

Cisco virtual router targets the cloud

Cisco brings server virtualization to the branch office

Yahoo! home pages through the ages

Network World Daily News AM
February 25, 2013
Share this email

Cisco virtual router targets the cloud

The Cisco CSR 1000V router is designed for enterprise network managers who want to have a little piece of their Cisco infrastructure in the cloud.

READ MORE
 

Issue highlights

1. Cisco brings server virtualization to the branch office

2. Yahoo! home pages through the ages

3. Big Data, Big Business, Big Government, Bigger Brother

4. Imagination Technologies hopes to breathe new life into MIPS

5. IBM eyes mobile, social add-ons for mainframe

6. Top users of H-1B visas are offshore outsourcers, Computerworld study finds

7. Firefox to auto-block third-party ad cookies by summer

8. Data backup should never be Plan B

9. Akamai brews up more delicious Kona security tools

10. Juniper security products use device-fingerprinting as way to detect, block attacks

11. HP unveils 'Big Data Security' strategy

12. If Apple had unveiled Google Glasses...

13. Microsoft admits to being hacked too

14. Google Glass: Why Zuck's excited and I'm not

RESOURCE COMPLIMENTS OF: Commvault

Simpana 10: Never look at your data the same way again.

CommVault® Simpana® 10 software is more than an upgrade to an industry-leading solution for protecting, managing, and accessing corporate information. It's an exponential leap forward. With more than 300 new features, Simpana 10 enables you to not only protect your data, but to transform your business. Isn't it time your organization made the leap? Visit the Simpana 10 microsite to explore videos, whitepapers, analyst reports, testimonials and more.

Cisco brings server virtualization to the branch office

The Cisco UCS Express family is a new set of blades that add high-performance general-purpose Intel server capabilities to the ISR G2 series of routers. READ MORE

Yahoo! home pages through the ages

Looking back at how Yahoo's home page has changed over the years tells you a lot about the company - and the world around it. READ MORE

RESOURCE COMPLIMENTS OF: BlackBerry

BlackBerry for business. Built to keep your business moving.

Help employees make the most of business opportunities with BlackBerry smartphones powered by BlackBerry® 10. BlackBerry 10 features & apps work together seamlessly to deliver the ultimate end user experience. With BlackBerry® Enterprise Service 10, easily deploy, manage, secure & control BYOD & corporate devices to truly mobilize your business. Learn more about BlackBerry Enterprise Service 10 >

Big Data, Big Business, Big Government, Bigger Brother

In his 1990 book "The New Realities," Peter Drucker noted: "Knowledge is information that changes something or somebody - either by becoming grounds for action, or by making an individual (or an institution) capable of different and more effective action." And that is what Big Data is delivering ... new knowledge, new insights and new actions, all of which will give us new problems to deal with. READ MORE

WEBCAST: CDW Corporation

The Best Path to SaaS

Cloud computing is here to stay. Software-as-a-Service (SaaS) is particularly popular because it can lower cost while enabling business agility. But not all applications are suited to SaaS. In this Webcast you will learn the best applications for SaaS deployment and how to avoid SaaS pitfalls and cost overruns. Learn More.

Imagination Technologies hopes to breathe new life into MIPS

Imagination Technologies is moving forward with the development of the MIPS CPU architecture, trying to dispel concerns about the processor's future after acquiring struggling MIPS Technologies late last year for a heavily discounted price. READ MORE

WHITE PAPER: Salesforce.com

Magic Quadrant for CRM Customer Service Contact Centers

Gartner's 2012 Magic Quadrant for CRM Customer Service Contact Centers looks at vendors responding to the challenge of "any channel" customer engagement. Follow the leaders and find out why more than 100,000 customers worldwide rely on Salesforce CRM applications to transform their businesses. Read More!

IBM eyes mobile, social add-ons for mainframe

IBM is looking to bring mobile and social workloads onto mainframes as a way of keeping the expensive machines competitive. READ MORE

Top users of H-1B visas are offshore outsourcers, Computerworld study finds

The biggest users of H-1B visas are offshore outsourcers, many based in India, or U.S.-based companies whose employees are mostly located overseas, according to government data obtained and analyzed by Computerworld. READ MORE

Firefox to auto-block third-party ad cookies by summer

Mozilla will automatically block third-party cookies starting with Firefox 22, which is slated to ship this summer, according to the Stanford University researcher who coded the change. READ MORE

Data backup should never be Plan B

Data is more important to businesses today than it has ever been, doing everything from revealing trends in customer behavior to comparing sales performance across business units and regions. Comprehensive data collection provides the who, what, when and how associated with almost all organizational activity. This information is incredibly valuable to executives because it plays a critical role in strategic business decisions. As such, all businesses - big and small - must have a data backup strategy in place to protect against data loss. READ MORE

Akamai brews up more delicious Kona security tools

Web acceleration company Akamai today announced Version 2.0 of its Kona Site Defender service, which adds new ways for clients to protect themselves against denial-of-service attacks. READ MORE

Juniper security products use device-fingerprinting as way to detect, block attacks

Juniper Networks today rolled out a battalion of security products and services to protect corporate networks, stating that when it comes to defensive measures, security attacks can be better prevented by determining device-fingerprinting rather than blocking attacks based on IP address. READ MORE

HP unveils 'Big Data Security' strategy

HP today took the wraps off its Big Data Security strategy, describing how combining the enterprise search and knowledge management resources from its Autonomy subsidiary with its ArcSight security-event and information management (SIEM) can yield new ways to detect cyberattacks or rogue-employee behavior. READ MORE

If Apple had unveiled Google Glasses...

Since the passing of Steve Jobs, Apple has been rather wanting when it comes to innovation. Sure, there have been incremental upgrades to products like the iMac and MacBook Pro, but when's the last time Apple truly brought something interesting to the table? Even Apple's most recent product releases should ring warning bells for investors. READ MORE

Microsoft admits to being hacked too

Once upon a time, Microsoft claimed that falling prey to social engineering tactics and then being hacked was a "rookie mistake." But now is the time for companies to jump on the bandwagon, to admit they were targeted by cyberattacks and successfully infiltrated. The stage is so crowded with 'giants' at this point, that there are fewer 'bad press' repercussions than if only one major company had admitted... READ MORE

Google Glass: Why Zuck's excited and I'm not

Juxtaposed on Techmeme, the two headlines crystalize perfectly my personal disinterest in Google Glass. On Forbes: "No One Is More Excited For Google Glass Than Facebook CEO Mark Zuckerberg." On TechCrunch: "Google Glass Targeting End Of 2013 Consumer Release, With Price Tag Under $1,500." READ MORE

SLIDESHOWS

13 of the biggest security myths busted

13 myths about information-technology security you'll hear but should you believe?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Why Android 4.2.2 is an important update

2. Impressive HTC One should prove stiff competition for Galaxy S IV

3. How Colorado's CISO is revamping the state's information security

4. U.S. students get cracking on Chinese malware code

5. Cisco, EMC coalition expands data center portfolio

6. Microsoft Azure overtakes Amazon's cloud in performance test

7. Petition to legalize cell-phone unlocking tops 100,000 signatures

8. Cisco, Avaya feel the heat from Microsoft Lync

9. The Samsung Galaxy S 4 shows up in New Zealand, and on an AT&T stat sheet

10. Cisco declares war on Microsoft unified communications system

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

4 comments:

Anonymous said...

This is statutory counsel from the Part for Education. Village authorities (LAs) must make esteem to it when carrying out their stint to align proper full-time education (or part-time when boost in place of the offspring’s needs) suited for children who are unable to turn up at a mainstream or noteworthy fashion because of their robustness

http://www.mini.daszmasz.info/a/szkoly-policealne-warszawa,5118
http://animalstemcells.org/member.php?action=profile&uid=18817
http://neo-print.pl/tag/funkcja
http://www.agprint.com.pl/wielka-brytania?page=21
http://www.kodeks-karny.com.pl/wybor-2/

Anonymous said...

This released search apparatus searches the on the house full-text of more than 400 online law reviews and law journals, as well as paper repositories hosting speculative papers and related publications such as Congressional Research Aid reports. Particular of the law reviews and legit journals (such as the Stanford Technology Law Re-examine), working papers, and reports are at online only.

http://www.artykuliki.infoaukcje.pl/index.php/tag/prawo-k/
http://morril.com.pl/biznes-w-duzych-firmach/5841/
http://www.a-free-guestbook.com/gb/Kinok/34
http://spielgerae.e-katalog24.comnwww.spielgerae.e-katalog24.com/strona-glowna/prawo-i-podatki/prawnicy/adwokaci-sjs.html
http://www.eurexia24.sanok.pl/tag/doradztwo

Anonymous said...

Tyya's dad won't fall for absorb anything sizeable at the depend on - no ice cream, no sweetmeats, no cookies. But when the saleslady puts a assay sticker on Tyya's nose, Daddy is done feigned to net something uncorrupted

http://www.webhunter.pl/?p=1


http://mappage.org/page/16
http://xn--lubibiznes2-urb.net.pl/tag/wizerunek
http://salon-samochodowy-krakow.biz.pl/tag/pojazd/page/3
http://xn--nieruchomoci-pro22-god.biz.pl/budownictwo-fundamenty-konstrukcji
http://soundriver.pl/2012/05

Anonymous said...

A tooth (plural teeth) is a cheap, calcified, whitish structure found in the jaws (or mouths) of various vertebrates and habituated to to sever down food. Some animals, surprisingly carnivores, also take teeth for hunting or instead of defensive purposes. The roots of teeth are covered by gums. Teeth are not made of bone, but degree of multiple tissues of varying density and hardness.

The ordinary structure of teeth is similar across the vertebrates, although there is respectable modifying in their form and position. The teeth of mammals get deep roots, and this figure is also initiate in some fish, and in crocodilians. In most teleost fish, regardless how, the teeth are partial to to the outer surface of the bone, while in lizards they are attached to the inner come up of the jaw by one side. In cartilaginous fish, such as sharks, the teeth are seconded by means of cold ligaments to the hoops of cartilage that form the jaw.

http://www.seo-pustynia.eu/zdrowie,i,uroda/aparat,ortodontyczny,katowice,s,4926/
http://www.oldymer.edu.pl/zdrowie,i,uroda/aparat,ortodontyczny,katowice,s,3508/
http://www.selora.pl/zdrowie,i,uroda/centrum,stomatologii,katowice,s,1945/
http://www.megalinki.net.pl/zdrowie,i,uroda/danutaborczyk,pl,s,6765/
http://www.insraf.pl/zdrowie,i,uroda/danutaborczyk,pl,s,1838/

http://www.thalmir.edu.pl/zdrowie,i,uroda/stomatolog,dzieciecy,katowice,s,3529/
http://bonecrusher.ostrowiec.pl/zdrowie,i,uroda/ortodoncja,katowice,s,3758/
http://www.biglink.net.pl/zdrowie,i,uroda/protezy,katowice,s,2263/
http://www.linseo.net.pl/zdrowie,i,uroda/medycyna,estetyczna,katowice,s,2308/
http://www.izumar.edu.pl/zdrowie,i,uroda/bezbolesne,leczenie,zebow,s,703/

http://www.seo-noc.eu/zdrowie,i,uroda/wiecej,s,4654/
http://www.olspaw.com.pl/strony,blogi,fora/strona,glowna,s,359/
http://drmundo.com.pl/zdrowie,i,uroda/ortodonci,katowice,s,2177/
http://www.wydumany.com/zdrowie,i,uroda/more,s,11399/
http://lasad.pl/firmy/zatoki,szczekowe,leczenie,s,1909/