Tuesday, September 01, 2009

Test on Cisco IPS 7.0 shows boost in effectiveness; IBM BladeCenter delivers speed, power savings

IBM BladeCenter delivers speed, power savings; BES 5.0 a smart choice for smartphone management
Network World logo

Product Test Alert

NetworkWorld.com | Update Your Profile


Sponsored by HP
rule

IDC: Optimizing Storage to Reduce Data Footprint and Lower Costs
Read this review on today's storage optimization and technologies. Learn how they reduce the data footprint and identify how various technologies work toward this goal.

Learn more

rule

Spotlight Story
Test on Cisco IPS 7.0 shows boost in effectiveness

Our reviewers found that the addition of a global threat correlation feature increases the value of the Cisco software -- and the appliances it runs on -- and is easy to deploy. Read full story

Related News:

IBM BladeCenter delivers speed, power savings
Optimizing power consumption, CPU performance, and form factor is a never-ending battle in server design and IBM's Bladecenter HS22 succeeds on all counts.

BES 5.0 a smart choice for smartphone management
Many factors enter in when an individual end user chooses between a BlackBerry, an iPhone or another device – there's coolness, cost, cachet, ease of use, features, apps. But for IT execs deploying a fleet of mobile devices, it's all about management.

Windows 7: The Good, The Bad, and The Unknown
For most people who are considering moving to Windows 7, October 22 is D-Day. On that date Microsoft's newest operating system lands on store shelves, both as a shrinkwrapped upgrade and preinstalled on new PCs. For some folks, though, D-Day has already arrived.

Belkin Gigabit Powerline HD Starter Kit
I had high hopes for Belkin's new Gigabit Powerline HD Starter Kit. Having recently reviewed Belkin's Powerline AV+ Starter Kit, which performed well and had great features, I was expecting to find more of the same, plus faster performance in the Gigabit product. However, the results made me wish that Belkin had forgone the use of the word Gigabit.

Can You Trust Free Antivirus Software?
Free antivirus programs vary just as much as paid security programs do in the quality of their protection. And frugal computer users on the hunt for no-cost antivirus software--already faced with tons of options--will have even more to choose from when new free offerings from Microsoft and Panda join the programs currently available from Alwil (Avast), AVG, Avira, Comodo, and PC Tools.

Linksys by Cisco Conductor Music Streamer
The $700 (as of 8/27/09) Linksys by Cisco Conductor (DMC350) is the flagship product in Cisco's awkwardly branded suite of networked audio devices. But if you expect the Conductor to use your Wi-Fi network to control and deliver radio-quality audio streams throughout your home, you could well find the device disappointing--as I did in my tests.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Why Citrix Essentials for Hyper-V?
Citrix Essentials for Hyper-V adds advanced capabilities to Hyper-V to create, integrate, manage and automate virtual datacenters at half the cost of other solutions. Simply add Citrix Essentials for Hyper-V to your existing Hyper-V implementation to gain powerful new capabilities for your virtualization infrastructure.
Learn more today.


Controlling Access to Privileged Accounts
This white paper explores insider attacks and insider risk, and shows how to control them by controlling and monitoring access. The paper describes the more common vulnerabilities exploited by insider attacks and a method for assessing insider risk.
Learn More

 

September 01, 2009

TOP STORIES | MOST DUGG STORIES

  1. Wi-Fi encryption cracked in 60 seconds
  2. Developer denies software to beat Chinese censors is malicious
  3. 12 words you can never say in the office
  4. FBI investigating laptops sent to U.S. governors
  5. China game boss sniped rivals, took down Internet
  6. The opposite of Twitter
  7. 12 cool ways to donate your PC's spare processing power
  8. Proposed bill gives Obama power to shut down Internet
  9. Group offers tools to evade China's Web censorship
  10. 5 techs that could reinvent cell phones

Independent Test Results: Citrix vs. F5
Latency is an important metric when measuring Web applications. See the benchmark results from independent tester, Tolly, to learn how Citrix fared against F5 in a wide range of scenarios.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment