Search This Blog

Monday, March 17, 2014

Cisco Unveils New Video Collaboration Products

7 Reasons why we'll never solve the software patent wars | Big data can help accelerate UC adoption

Network World Cisco

Forward this to a Friend >>>


Cisco Unveils New Video Collaboration Products
Read More


WHITE PAPER: 8x8, Inc

Cloud Unified Communications: A Total Game Changer
Learn why enterprises increasingly switch to cloud-based VoIP unified communications, for benefits ranging from cost savings to improved customer satisfaction to better security, compliance and business continuity. Big wins include improved company unity, reduced management hassles and better support for mobile, global and distributed workers. Learn more >>

WEBCAST: Fortinet

How to Protect Tomorrow's Data Center Network
Data center networks, whether conventional or in the cloud, must handle ever-larger quantities of data. And those networks must provide access--securely--to an ever-broadening array of mobile devices. In this on-demand Webcast, you will learn how advanced firewall technology can enable you to meet these demands while keeping costs under control. Learn more >>

7 Reasons why we'll never solve the software patent wars
As I've noted in other posts, the SXSW conference is generally an optimistic event, so it was no surprise to see a panel called How to Fix Patent: Trolls, Innovators & Reform. Unfortunately, actually attending the panel left me with a very different impression... more along the lines of "abandon hope all ye who enter here." Read More

Big data can help accelerate UC adoption
Enterprise Connect, the industry's largest and best show dedicated to Unified Communications and all things collaboration, kicks off next week in Orlando, Florida. I'm expecting to see the typical themes: interoperability, cloud, video and Cisco versus Microsoft. Another theme I'm expecting to see become a bigger topic is "Big Data" for Unified Communications. Read More


WHITE PAPER: IBM Corporation

The hidden costs of storage
Storage is cheap. But is it really? Storage is often considered an inexpensive, quick and easy fix to demands for more space needed for our enterprise applications. The problem is that this "bargain" isn't always the deal it appears to be. View Now

Your Father's Flow Export Protocol (Part 1)
You may be familiar with NetFlow, IPFIX and other similar protocols like J-Flow and sFlow. These protocols provide useful insight into traffic mix and communities of interest. However, these protocols do not contain the application-layer details that some administrators desire. IT administrators need more application-level visibility to be able to perform Application Performance Management ( Read More

Major companies, like Target, often fail to act on malware alerts
Companies that suffer major data breaches almost always portray themselves as victims of cutting edge attack techniques and tools. The reality, though, is often much more mundane. Read More


WHITE PAPER: IBM Corporation

Oracle Exadata and IBM PureData System for Analytics
Read the eBook to learn how the PureData System's performance reduces the costs of owning and running data warehouses, and creates new business value by deploying analytic applications previously considered beyond reach. Learn which solutions best meet your business needs and how to achieve optimal results from your data. View Now

Network World has an Instagram account! Now what?
Network World has religiously expanded its presence online by creating social network accounts on Facebook, Twitter, Google+ (hello out there?), LinkedIn (here and here), Pinterest (we look go Read More

Cars get connected, and talkative
Connected cars are big at this year's Cebit trade show, with driverless cars and products to communicate with the vehicle' onboard computers on display, but cooler apps are needed for the sector to really take off. Read More

12 hot cloud computing startups to watch: Product photo gallery
Cloud management, development, security and more Read More


SLIDESHOWS

How to protect virtual machines (VMs)

These four products represent different approaches to VM security.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 28 facts about pi that you probably didn't know

2. Sophisticated scam targeting Verizon Wireless customers

3. 12 cloud computing companies to watch

4. 11 tips to prepare for SDN

5. CA moves from 'constantly acquiring' to innovation factory

6. IE zero-day flaw shows kinks in Microsoft patching

7. Best Instagram accounts of enterprise technology companies

8. Is this what iOS 8 will look like?t

9. Google Glass gets an extremely useful use case

10. What's better for your big data application, SQL or NoSQL?


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: