Thursday, June 12, 2014

Cisco: Broadband providers should not treat all bits the same

Biggest, baddest, boldest software backdoors of all time | VMware corrects Cisco

Network World Network Optimization

Forward this to a Friend >>>


Cisco: Broadband providers should not treat all bits the same
All bits running over the Internet are not equal and should not be treated that way by broadband providers, despite net neutrality advocates' calls for traffic neutral regulations, Cisco Systems said. Read More


WHITE PAPER: Network Instruments

4 Key Survival Tips for Planning Your Next Big Data Project
Big Data projects slam network performance. This paper offer survival tips to prepare your network before the Big Data projects hit, not after. Learn how to monitor and manage network performance for bandwidth, consistent low latency, scalable storage, processing power and security. Learn More

WHITE PAPER: Network Instruments

4 Key Survival Tips for Planning Your Next Big Data Project
Big Data projects slam network performance. This paper offer survival tips to prepare your network before the Big Data projects hit, not after. Learn how to monitor and manage network performance for bandwidth, consistent low latency, scalable storage, processing power and security. Learn More

Biggest, baddest, boldest software backdoors of all time
These 12 historically insidious backdoors will have you wondering what's in your software -- and who can control it. Read More

VMware corrects Cisco
In the continuing saga of VMware vs. Cisco, VMware fired the latest shot with a counter to Cisco's claims that its networking rival's NSX network virtualization platform has only found a "handful" of paying customers. VMware CEO Pat Gelsinger claimed at a recent Wall Street analyst meeting that NSX has, in fact, 100 paying customers. Read More

Zeus Trojan alternative created from scratch hits the underground market
A new Trojan program that can spy on victims, steal login credentials and interfere with browsing sessions is being sold on the underground market and might soon see wider distribution. Read More


WHITE PAPER: HP

HP ArcSight ESM Solution Helps Bank to Combat Fraud
Turkey's Finansbank needed a way to spot potential fraud among millions of electronic transactions. But implementing a commercial fraud management application would take 18 months. Based on their experience using HP ArcSight Enterprise Security Manager (ESM) for IT security operations, they decided to adapt HP ArcSight ESM for fraud management. Learn More

10 countries that pay you what you're worth
Are you a software developer wondering in which country your skills would be most rewarded? Good news: Bloomberg recently published data about the median annual income (based on cash earning, e.g. salary, bonuses, profit sharing) for software engineers in 50 nations. Read More

Google engineer: We need more Web programming languages
Web applications may one day surpass desktop applications in function and usability -- if developers have more programming languages to choose from, according to a Google engineer. Read More

Why database monitoring may, or may not, secure your data
A majority of IT security pros believe that continuous monitoring of the database network is the best approach to prevent large-scale breaches like the ones that occurred at retailers Target, Michaels and Neiman Marcus, a study showed. Read More


WHITE PAPER: Infortrend

Optimized Efficiency for SMB Datacenters
Did you know that Infortrend's EonStor DS systems are ideal solutions for storage infrastructure consolidation, high-availability clusters, server virtualization and green datacenters? And now, they're 16Gb Fibre Channel-ready. Learn more >>

This IT worker had to train an H-1B replacement
This is the story of an IT worker who was replaced by a worker on an H-1B visa, one of a number of visa holders, mostly from India, who took jobs at this U.S. company. Read More

Microsoft Azure service lets IT control identity and access management to select applications
As part of its Azure cloud service, Microsoft yesterday turned on a "preview", as it likes to call it, of a new proxy service for identity and access management (I&AM) that lets IT managers set up a way that users can access selected applications hosted in the internal corporate network or external cloud services. Read More

How to maximize storage space on your Windows tablet
One of the unfortunate hallmarks of affordable Windows-based tablets is limited storage space. It is not uncommon for low-priced tablets to come with only 32GB or 64GB drives. Read More

Blackphones coming in three weeks, will ship in millions, backers say
The Blackphone security-focused smartphone will go on the market in three weeks and "a few thousand" have already been sold through pre-orders, executives from the device's makers say. Read More


SLIDESHOWS

Network World's 2014 State of the Network survey

Exclusive research from Network World shows that cloud and mobility are gaining in importance.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Daunting photos of a village built to handle electronic waste

2. What's the best approach to building next-generation data center networks?

3. This IT worker had to train an H-1B replacement

4. iOS 8 MAC randomizing just one part of Apple's new privacy push

5. Gartner Magic Quadrant shifts focus from MDM to Enterprise Mobility Management

6. HP unveils Cisco-like SDN switch

7. HP has lots to Discover

8. How to change Windows 8.1 to local account with no Microsoft email account required

9. I guess California Chrome owner can kiss Google endorsement goodbye

10. Quick Look: Ubuntu GNOME 14.04


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment