Search This Blog

Thursday, November 20, 2014

SDN in action: Hands-on with Cumulus Linux

Cisco open sources security | New cruise ship a floating heaven for tech geeks

Network World Network Optimization

INSIDER
SDN in action: Hands-on with Cumulus Linux
The stage is set for SDN (software-defined networking) to change the way we push data through our infrastructures, with the promises of more agile network provisioning and management, as well as more affordable network hardware. But for many, the SDN concept is still amorphous. What does SDN look like in practice? Read More


WEBCAST: Ciena Corporation

Security+ Guide to Network Security Fundamentals
Serious IT breaches happen too often. Is there a way to reduce or eliminate the impact on consumers? Attend this Live Webinar Dec. 2nd,1:00 PM ET / 10:00 AM PT to learn methods for protecting your information resources. Learn More

: Venafi

Securing Keys and Certificates to Critical Assets
Today's most devastating cyber attacks—including ShellShock, Heartbleed and Zombie Zero—prey on trust. And that puts your digital certificates at risk. This informative resource center explores how next-generation trust protection can help you combat today's attacks, ensuring trusted access to critical assets. Learn More

Cisco open sources security
Cisco this week announced the availability of an open source security framework designed to harness big data analytics to combat data loss. Cisco OpenSOC integrates elements of the Hadoop ecosystem, such as Storm, Kafka, and Elasticsearch, to provide a platform incorporating full-packet capture indexing, storage, data enrichment, stream processing, batch processing, real-time search, and telemetry aggregation. It also provides a centralized platform to enable security analysts to detect and respond to threats, Cisco says. Read More

New cruise ship a floating heaven for tech geeks
Walking up the gangway to board Royal Caribbean's tech-laden Quantum of the Seas, it was hard not to marvel. Across the harbor was Manhattan, and at 348 meters the new ship is almost as long as the Empire State Building is tall. But it's what the ship contains that made my inner geek salivate. Read More

Extreme extends SDN products, partners
Extreme Networks this week announced new products and technology partners for its Software Defined Architecture data center product line. Read More


WHITE PAPER: Akamai

The Importance of Improving and Adapting Web Security
With so much depending on web site availability, Chief Security Officers are considering new ways to be cost-effectively proactive and vigilant. This paper looks at the challenges and options to web security deployment. Learn More

Gartner's cloud showdown: Amazon Web Services vs. Microsoft Azure
Gartner IaaS Research Director Kyle Hilgendorf says one of the most common questions he gets from enterprise customers looking to go to the cloud is: AWS or Azure? Amazon Web Services has been anointed the public IaaS cloud leader by Gartner and many others, but over the past year or so Satya Nadella's Microsoft has made significant advancements to its public cloud platform. AWS now has competition. Read More

Alcatel-Lucent virtualizes WANs and routers
Alcatel-Lucent's Nuage Networks SDN venture has broadened its product line to tackle enterprise WANs, an increasingly vital market for the technology. Read More

Google Internet balloon drops in on farmer
Buyers of the earthly explanation for whatever fell from the sky in Roswell, N.M. back in 1947 are likely to appreciate the reaction of a South African farmer who recently came across what he assumed to be a crashed weather balloon. In this case, however, the confusion proved only temporary. Read More


WHITE PAPER: Presidio

Top 5 Criteria for Data Center Transition to Private Cloud
Converged Infrastructure Solutions are changing the game for data centers and private cloud implementations. How can you extend your data center into a private cloud? Top five recommendations for selecting converged infrastructures. View now

USB Armory is the Swiss army knife of security devices
"Where's Andrea?" That was the question on the lips of attendees at this week's No Such Con security conference. They were looking for Andrea Barisani, Chief Security Engineer of Italian security consultancy Inverse Path, and more precisely the prototype USB security device he was carrying. Read More

Activists release Detekt tool that finds surveillance malware
A free tool released Thursday allows users to scan their computers for surveillance malware that has been used in attacks against journalists, human rights defenders and political activists around the world. The open-source tool is called Detekt and was developed by security researcher Claudio Guarnieri. Read More

Microsoft Azure thrown out of gear during a performance update
A service interruption on Azure storage services late Tuesday was caused by Microsoft's attempts to roll out a performance update that had been earlier tested for several weeks. Read More


SLIDESHOWS

Pi, translated: The evolution of Raspberry Pi

It's only been two years, but the Raspberry Pi has already come a long way.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

MOST-READ STORIES of 2014

1. How does a Windows bug go undetected for 19 years?

2. 20-plus eye-popping Black Friday 2014 tech deals

3. Microsoft releases emergency patch to stymie Windows Server attacks

4. 10 hottest IT skills for 2015

5. Cisco open sources security

6. The SWAMP: How to avoid the coming software armageddon

7. Peeping into 73,000 unsecured security cameras thanks to default passwords

8. The 10 mightiest supercomputers on the planet

9. Cool Yule Tools: Best techie gifts for 2014

10. 10 enterprise Internet of Things deployments with actual results


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: