Monday, October 19, 2009

Overlooked VOIP Security Features

Ethernet everywhere!; Will Tandberg be tied solely to Cisco's call management platform?
Network World logo

Cisco Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Data Domain
rule

VMware Data Backup and Recovery Best Practices
VMware offers extraordinary benefits, but it can come at the cost of extra storage, backup resources and administrative challenges. Data Domain deduplication storage offers a way out by reducing redundant data across VMware data backups, operating at disk speeds, and providing cost-effective replication for fast DR using backup images.

Click here to learn more.

rule

Spotlight Story
Overlooked VOIP Security Features

I am wanker when it comes to VOIP. I am not a huge VOIP fan. Nope. Not much at all. When I was growing up, phracking never really appealed to me. I remember tripping my first 5ESS and not thinking "that's cool" but "so what". Kinda weird because VOIP possesses all the elements I like in engineering design. It has many parts, separate protocols, programming elements, high end user satisfaction, massive... Read full story

Related News:

Ethernet everywhere!
Inside planes, trains, cars and spaceships, Ethernet is a morph master

Will Tandberg be tied solely to Cisco's call management platform?
Norwegian news is reporting that Tandberg management received financial incentives directly from Cisco in order to promote Cisco's acquisition offer to Tandberg shareholders (apparently before Cisco's offer to buy Tandberg was made public): "Before Cisco was bidding for Tandberg, had the U.S. IT giant has already signed a bonus contract with the CEO Fredrik Halvorsen, and eight other leaders in...

Woman accused of stealing $23M from Cisco bragged about her success on Classmates.com
28-year-old Jennifer Leigh Harmon Easevoli bragged on Classmates.com: "For those of you who knew me and doubted me - I made it, and I made it big. "I am bigger and better than you thought I could be. "I am more successful than I could have dreamed and I have had a great time all the while."

Cisco's Starent grab bad for Juniper?
Did Cisco steal away Juniper's wireless partner by acquiring Starent Networks? So says UBS analyst Nikos Theodosopoulos, who states in a report that the two were about to formally announce their union to target the enhanced packet core of 4G networks.

Cisco backpedals on WiMAX with Starent buy
This week's $2.9 billion acquisition of Starent Networks indicates that Cisco is backpedaling from its WiMAX focus and shifting it to LTE as the 4G underpinning of next generation mobile data networks.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Cell towers in disguise
Cell towersSome of the cell towers that dwell among us are cleverly hidden; others, not so much.

The ultimate smartphone
SmartphonesWhat if you could combine the best parts of every phone out there?

5-Steps For Lowering Mobile Employee TCO
The rise of employee-owned BlackBerry, iPhone and other smartphones has created significant IT management and compliance challenges. This report recommends a 5-Step Mobility Management approach used by IT execs at best-in-class companies to cut mobility TCO, reduce risk and increase productivity.
Learn more.


The Power of Virtualized Web Application Delivery
The increased dependency on Web applications has created greater complexity in the environment making availability, performance and security of Web applications an imperative. This white paper discusses how any size organization can tune its Web application delivery services with a virtualized solution that will meet the unique characteristics of each individual application.
Read More

 

October 19, 2009

MOST-READ STORIES

  1. How to royally foul-up an IT outsourcing project
  2. Husband, wife team arrested for allegedly stealing from Cisco
  3. Missing dot drops Sweden off the Internet
  4. 15 genius algorithms that aren't boring
  5. NASA network security torched
  6. The Internet has shifted under our feet
  7. 10 great Google Apps add-ons for the enterprise
  8. He knows .Net and SQL ... not missile launchers
  9. Microsoft apologizes, recovers most Sidekick data
  10. Facebook applications at risk from attack

Improving Application Performance Troubleshooting
Dramatically reduce downtime with the right tools. This whitepaper explains the four key features your application performance management toolset should include. Look for automation, intuitive analysis, real-time support and proactive problem solving.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment