Search This Blog

Thursday, March 26, 2015

To avoid NSA, Cisco gear gets delivered to strange addresses

School district gets an HP SDN makeover to address wireless growth, security problems | Akamai: Most Internet attacks in Q4 originated in China

Network World Network Optimization

To avoid NSA, Cisco gear gets delivered to strange addresses
It appears some Cisco Systems customers have since taken steps to prevent NSA tampering. The company has shipped equipment to addresses that are unrelated to a customer, said John Stewart, Cisco's chief security and trust officer, during the Cisco Live conference in Melbourne. In theory, that makes it harder for the NSA to target an individual company and scoop up their package. But supply chains are tough to secure, Stewart said, and once a piece of equipment is handed from Cisco to DHL or FedEx, it's gone. Read More


WHITE PAPER: Aerohive

BYOD and Beyond: How To Turn BYOD into Productivity
One of the most overlooked aspects of the BYOD phenomenon isn't just connecting the users to the network, but how to manage them once they're there. Getting mobile and BYO devices onto the network is now table stakes. View Now

WHITE PAPER: Worksoft, Inc.

Best Practices to Automate SAP Test and Delivery Processes.
Streamline testing and delivery of ERP projects. This IDC report quantifies the ROI and benefits enterprises have achieved by automating business processes. Learn how users have been able to: - Reduce regression testing time by 48% - Increase automation of business processes by 44% Learn More

INSIDER
School district gets an HP SDN makeover to address wireless growth, security problems
Faced with exponential growth in wireless devices and an increasingly digital curriculum, Jeff Dietsche, Systems and Infrastructure Manager for the South Washington County Schools in Minnesota, decided his only hope was to deal with a single vendor and use SDN to streamline operations. Dietsche tells the tale to Network World Editor in Chief John Dix. (Insider Story) Read More

Akamai: Most Internet attacks in Q4 originated in China
A majority of the Internet attack traffic in 2014's fourth quarter originated in China, followed by the U.S., according to cloud service provider Akamai. Read More

NFV and SDNs will make up the cloud
Carriers as we know it are about to change significantly by the unbundling of services and functionality of what's thought of as carriers and telcos. The bits and pieces of networking, already becoming rapidly redefined by Software Defined Networks (SDNs), have conceptual sockets connected to carriers' virtualized networking components. Read More


WHITE PAPER: Level 3 Communications

Secure Data Services: Breaking Down the Enterprise IT Silo
This paper explores how NSPs can truly help their customers break down their silo mentality with an alternative approach to bundled services that is aligned to the core business interests of their customers. The benefits of this approach – to both NSP and customer – are also explored. Learn More

F5 leverages LineRate to go lightweight for software defined IT environments
A little over two years ago, application delivery controller market leader F5 Networks acquired LineRate Systems to jump into the software defined networking (SDN) game. Read More

Bare-metal switches poised to take off in data centers
Bare-metal switches that can be programmed like Linux servers aren't just for big Web companies anymore. They may show up in a lot more average enterprises in the next few years. Read More

Top enterprise IT companies where people want to work
Poachable, a Seattle startup that specializes in connecting passive job-seekers with companies looking to hire, says enterprise network and IT companies such as Microsoft, IBM and Cisco are among the most desirable places to work. But largely consumer-focused companies, like Google, Apple and Amazon, are even more attractive. Read More


WHITE PAPER: Brocade Communications Systems, Inc

How Other Organizations Achieve IT Agility
Leading organizations actively seek ways to address the challenges of achieving IT agility and closing the Relevance Gap. Let's take a look at how two businesses accomplished the task. Learn more >>

Net neutrality rules let FCC police future ISP conduct
The U.S. Federal Communications Commission's new net neutrality rules allow the agency to police future network management practices and business models rolled out by broadband providers, raising concerns among critics that an activist commission will inject itself into ISP board rooms. Read More

Not your father's computer science building
College campuses across the U.S. are building news computer science facilities that encourage hands-on education and interdisciplinary research. Long, empty hallways are avoided. Labs are on display instead of tucked in basements. Circulation spaces become opportunities for students and professors to mingle and collaborate. Pictured is Bill & Melinda Gates Hall at Cornell University. Read More

Startup Rubrik goes all-in-one with backup appliance
All-in-one boxes are hot in data centers, and the concept is starting to expand into backup and recovery. Read More


SLIDESHOWS

7 things we want to see in the Surface Pro 4

Perhaps a "Surface Pro 4" will debut at the same time or soon after Windows 10 launches. Here's what we'd like to see in the Surface Pro 4.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Meet the White House's new open source-happy IT director

2. Linux users alarmed over Windows 10 lockout

3. 'When will IPv4 become obsolete?'

4. Mobile 'sextortion' schemes on rise, Trend Micro reports

5. Seven killer Linux apps that will change how you work

6. Hot IT skills that will get you hired and well-paid

7. How Congress enables fraudulent TurboTax e-filing

8. Stallman joins the Internet, talks net neutrality, patents and more

9. Not your father's computer science building

10. 12 free cloud storage options


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: