Search This Blog

Tuesday, July 15, 2014

Cisco singing a different ACI tune

Network World Network Optimization - Newsletter - networkworld.com
10 changes CEO Nadella wants from Microsoft workers | The Firewall: Questions abound about its future role in cloud, mobile and SDN environments

Network World Network Optimization

Forward this to a Friend >>>


Cisco singing a different ACI tune
Cisco's Application Centric Infrastructure is SDN after all, the company now says. This, after claiming it was not SDN at last fall's Interop conference in New York. Read More


WHITE PAPER: VCE

Business Benefits of Running SAP on Converged Infrastructure
Forrester Consulting conducted a Total Economic Impact™ study and examined the potential return on investment (ROI) enterprises may realize by replatforming SAP on factory-integrated systems. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact on their organization. Learn more

WHITE PAPER: Dell

Achieve Deeper Network Security and Application Control
Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet to safeguard an organization from today's ever-evolving threats, NGFWs must be able to deliver an even deeper level of network security. View Now

10 changes CEO Nadella wants from Microsoft workers
CEO Satya Nadella last week gave what amounted to a public tongue-lashing to Microsoft's 127,000 employees, which was followed up by an analyst's report that the company plans to announce layoffs of up to 10% of that number at its quarterly earnings report July 22. Read More

The Firewall: Questions abound about its future role in cloud, mobile and SDN environments
It's been 20 years since Check Point Software Technologies shipped its first enterprise network firewall, marking the beginning of a mass market for firewalls that has protected millions of networks across the world. Read More

The Black Hat Quiz 2014
lack Hat draws the elite of the security world to one place and has earned a reputation for introducing shocking new security exploits, takeovers of seemingly secure gear, means of recruiting botnets and ways to steal identities. The flip side is that all of this malicious education can be used to help protect networks, devices and data. Here's a brief set of questions about past Black Hats to test how well you know the contributions they have made to the infosec community. Read More


WHITE PAPER: Fujitsu America

Why Managed Network Outsourcing Makes Good Business Sense
A recent survey by IDG Research Services indicates there are significant benefits to partnering with an experienced company capable of handling network management. The right partner can also eliminate the need to build, manage and maintain a network operations center. Learn more >>

Why password managers are not as secure as you think
University researchers have raised concerns about the security of web-based password managers that free people from the burden of having to remember website credentials. Read More

Say goodbye to desktop phones
VoIP apps and a high-density 11ac Wi-Fi network let an Oklahoma insurer scrap its desktop phones. Read More

How the FCC's in-school Wi-Fi program could affect vendors
Last week, the Federal Communications Commission (FCC) approved a plan to spend $2 billion over the next two years to bring Wi-Fi to underserved schools. The plan should impact at least 10 million kids is US schools. Read More


WHITE PAPER: Symantec

Archiving Is More Than E-mail
Some IT professionals assume that archiving is mostly related to e-mail and that it is done mainly to support regulatory compliance. Nothing could be further from the truth. As a data-management process, archiving yields a wide variety of operational benefits beyond regulatory adherence. Learn more!

The worst security SNAFUs this year (so far!)
Security SNAFUs? How bad is it so far this year? Well, let's start with Snapchat's 4.6 million user database SNAFU, followed by a parade of retail stores including Neiman Marcus and Sally Beauty Holdings, telling their customers how their payment card information had been hacked. Read More

IBM updates cloud strategy after CIA loss
Two years after losing high-profile government work to Amazon Web Services, IBM has revamped the way it structures enterprise cloud services contracts, thanks in part to its US$2 billion acquisition of cloud services provider SoftLayer. Read More

Hardcoded SSH key gives backdoor access to Cisco communications manager
An unprotected SSH access key left inside the Cisco Unified Communications Domain Manager product for remote support purposes allows attackers to take complete control of affected deployments. Read More

Lights out for Yahoo's Shine site, Xobni email apps, other products
Yahoo is shutting down a range of products, including apps from its acquisition of email management service Xobni, and its Shine women's lifestyle site. Read More


SLIDESHOWS

Worst data breaches of 2014…So far

We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Windows Phone 8.1 and its first update could appear this week

2. Ubuntu 14.04: Is Canonical taking on too much?

3. 20 cool things you can do with a Raspberry Pi

4. The Firewall: Questions abound about its future role in cloud, mobile and SDN environments

5. Cisco singing a different ACI tune

6. Apple's most important iPhone upgrades over the years

7. Hero hacks: 14 Raspberry Pi projects primed for IT

8. Tech's top-paid CEOs

9. Y2K bug resurfaces and sends draft notices to 14,000 men born in the 1800s

10. NSA stores 80% of Americans' phone conversations, claims NSA whistleblower Binney


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: