Search This Blog

Thursday, August 14, 2014

Cisco slashing up to 6,000 jobs

F5 CTO: We're working hard on the transition to software | How packet micro-shaping maximizes bandwidth utilization

Network World Network Optimization

Forward this to a Friend >>>


Cisco slashing up to 6,000 jobs
Cisco Systems will cut as many as 6,000 jobs over the next 12 months, saying it needs to shift resources to growing businesses such as cloud, software and security. The move will be a reorganization rather than a net reduction, the company said. I Read More


WHITE PAPER: BMC Software

Five Levers to Lower Mainframe MLC Costs
This paper discusses five levers you can use to lower your mainframe MLC costs by up to 20 percent or more. Explore best practices and real-world examples of dramatic savings through a mainframe MLC optimization strategy based on higher visibility, predictability, and automation. Learn More

WHITE PAPER: CDW

The Capacity Boost You Can Expect from WAN Optimization
WAN optimization techniques tweak bandwidth for better network performance and more. Read Now

F5 CTO: We're working hard on the transition to software
F5 Networks is a veteran player in the network management market, having sold its load balancing hardware - or application delivery controllers, as it prefers to call them - to large numbers of data center customers. One might think that the rapid shift toward software-defined networking, then, would spell trouble for a company like F5. But CTO Karl Triebes, speaking to Network World at F5's Agility event in New York on Tuesday, said that F5 is working hard on a shift of its own. Read More

How packet micro-shaping maximizes bandwidth utilization
Enterprises are increasingly virtualizing IT infrastructure by migrating storage, application, and database servers into cloud/hosted datacenters. As they do so, they need to partner with ISPs and service providers to establish reliable, performance assured, bandwidth optimized connections between each enterprise and data center location. In many cases, enterprises aren't getting what they paid for - often not even close. Read More

Emerging networking technology used by Apple, Cisco will frustrate firewalls
Today's security software is ineffective against an emerging networking technology already in use by Apple for its Siri voice-recognition software, according to research presented at the Black Hat hacking conference. Read More


WHITE PAPER: Aerohive

The New Mobility: Astonishingly Simple and Powerful
Mobility has not only changed how we live, it is also dramatically changing the network infrastructures that we rely on. For the better. As organizations cope with a tidal wave of mobile users, mobile applications, and demand for pervasive access, it's becoming clearer that prior-generation approaches to providing mobility are breaking. Learn more

The biggest iPhone security risk could be connecting one to a computer
Apple has done well to insulate its iOS mobile operating system from many security issues, but a demonstration shows it's far from perfect. Read More

ShoreTel Mobility 8 delivers mobile video collaboration
ShoreTel has launched a major update to ShoreTel Mobility with version 8, offering mobile-enabled video conferencing. Read More

Cisco patches traffic snooping flaw in operating systems used by its networking gear
The vulnerability affects the OSPF routing protocol implementation on Cisco networking equipment. Read More


WHITE PAPER: McAfee

The Significant Threat of Advanced Evasion Techniques
Advanced hacking methods, like advanced evasion techniques (AETs) have become more prevalent and harder to detect. Yet many network security vendors have downplayed the threat they pose as purely theoretical. Learn the false sense of security many IT professionals are under View Now

Hacker hunts and pwns WiFi Pineapples with 0-day at Def Con
After finding people using a WiFi Pineapple at Def Con, @IHuntPineapples supposedly deployed a zero-day exploit to "wreck" it before sending a message to the "skiddies." Read More

F5 CEO sees opportunity in myriad challenges facing IT
F5 Networks CEO John McAdam said at his company's Agility conference in New York that, in essence, the future of IT is complicated, confusing and riddled with security threats - and that's a good thing. Read More

Cisco: Blackhole arrest cuts exploit-kit traffic, but don't let your guard down
Exploit kits of cybercrime tools fell into a big slump in the first half of this year after Russian authorities nabbed the alleged creator of the popular Blackhole kit, but users aren't necessarily safer. Read More

Android tops iOS in online usage for the first time, says one tracker
A web metrics firm has announced that Android devices accounted for more mobile web traffic than iOS in July, the first time that's happened since NetMarketShare began tracking such statistics. Read More


SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Netscout sues Gartner over Magic Quadrant rating

2. Why TCP/IP is on the way out

3. Amazon Fire Phone: Nice but nothing to get fired up about

4. Rackspace bows out commodity IaaS market in favor of 'managed cloud'

5. Cisco's new UCS fabric interconnect: no ACI?

6. Smartphone kill-switch bill passes California assembly

7. Emerging networking technology used by Apple, Cisco will frustrate firewalls

8. IBM/DARPA turn out brain-like 5-billion transistor superchip

9. 10 ways to get noticed at Black Hat

10. Top 20 colleges for computer science majors, based on earning potential


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: