Search This Blog

Monday, July 22, 2013

Cisco celebrates 10,000th patent

Apple reportedly interested in purchasing 55 and 65-inch Ultra HD TV panels from LG | With Lenovo partnership, how does Extreme Networks stack up in the Stack Wars?

Network World Voices of Networking

Forward this to a Friend >>>


Cisco celebrates 10,000th patent
Earlier this month, Cisco celebrated its 10,000th U.S. patent. Patent No. 8,478,859 enables a way to indicate presence so that end users can determine the best way to communicate. Cisco filed its first patent in February, 1988, and was awarded its first US patent in 1992, no. 5,088,032, for the Interior Gateway Routing Protocol. Worldwide, 13,000 patents have been awarded to Cisco innovators, says... Read More


WEBCAST: Sprint

The Network Foundation of an IT-to-ET Transformation
There's an evolutionary process at work that will eventually affect every enterprise IT department. Nemertes Research describes it as a transformation from IT to ET – Enterprise Technology. Learn More

WEBCAST: IDG

Mobile Device Performance in High-Density Environments
Industry analyst Joanie Wexler explores this topic with Özer Dondurmacıoğlu from Aruba Networks and Bruce Miller from Xirrus, discussing how a high-density Wi-Fi design can handle the flood of traffic from smartphones, tablets and other mobile devices. View now.

Apple reportedly interested in purchasing 55 and 65-inch Ultra HD TV panels from LG
If there's one Apple related rumor that just won't die, it's the long-rumored Apple HDTV. Indeed, rumors of Apple releasing a dedicated HDTV set go back many years. The reality, though, is that the HDTV market isn't exactly in desparate need of innovation. What's more, the margins on HDTVs aren't as high as the margins Apple typically enjoys on its other products. Nonetheless, there is a very real... Read More

With Lenovo partnership, how does Extreme Networks stack up in the Stack Wars?
It seems that data centers have been in continual transition now for the past 15 years. In that time, the industry has seen the rise of server virtualization, the growth of on-demand computing, the transition to network fabrics and the introduction of software defined networks. The latest wave is the movement to converged infrastructure, and Extreme Networks is the latest network vendor to ride this... Read More


WEBCAST: IDG

Tips on How to Manage Network Policies
In this webcast, Rob Haviland from HP and Robin Layland explore how to implement and manage policies uniformly across both the wired and mobile side of your network. They also review tools you will need, policies that are unique to mobile users and the role of software-defined networking (SDN) in managing Wi-Fi. View now.

Is Microsoft starting from scratch with Windows Phone 9?
Windows Phone 8 is what can best be described as a slow-moving success. Each quarter, it gains just a little more ground, and now sits at about 5% of the smartphone market. Considering that it has essentially one OEM, that's not too shabby, but it does pale in comparison to Samsung and Apple. Microsoft moved rather quickly with Windows Phone 8 and 8.5, bringing the same kernel and vital code from the... Read More

iPhone 5S specs leaked; NFC capability, 12 megapixel camera, and fingerprint authorization sensor expected
This is a rumor folks, so take it with a grain of salt. Still, the following is a rather big, and more importantly, believable rumor, so take heed if you can't wait to find out what type of goodies Apple may have in store for us when they finally unveil the iPhone 5S. Read More


WHITE PAPER: IDG

The 2013 Wi-Fi Challenge
The makers of network infrastructures have been working hard to keep their solutions up to the task of handling new challenges of high-density RF and network management, security, and performance management. So what do the leading vendors provide and how do their solutions differ? Learn more.

Hijacking Office 365 and other major services via cookie re-use flaw
When is logging off the opposite of security? One example would be Office 365 since logging off blocks the authorized user, but not the attacker. Microsoft's Office 365 isn't the only offender as ethical hacking professor Sam Bowne pointed out after testing cookie-reuse on major websites. Read More

MSFT to developers: Fix Windows app security flaws in 180 days or be kicked from stores
App developers have no more than 180 days to fix security flaws or Microsoft will kick the vulnerable app from the Windows Store, Windows Phone Store, Office Store, and Azure Marketplace. Microsoft's new security policy for apps states: Read More

Cisco Live Distinguished Speaker Hall of Fame: First Inductees
"The average teacher explains complexity; the gifted teacher reveals simplicity." ~Robert Brault Read More


SLIDESHOWS

Can your IP address give away your identity?

Can hackers, stalkers, criminals, and other Internet users track you down by your Internet Protocol (IP) address?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPad 5 rumor rollup for the week ending July 18

2. 'This is a 3D printed jet engine'

3. Just like that, Android 4.3 is out, ahead of its release date

4. Hijacking Office 365 and other major services via cookie re-use flaw

5. New vulnerability found in Java 7 opens door to 10-year-old attack

6. Apple, Samsung phone security features to be scrutinized

7. Yahoo chief Marissa Mayer's first year

8. Facebook Open Compute project has "weaknesses," Cisco CEO says

9. Cisco building an Internet of Everything router: Chambers

10. Citrix edges Microsoft and VMware in VDI face-off


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: