Search This Blog

Wednesday, December 02, 2009

IBM buys Cisco-funded database security firm

Avaya's Nortel buy might not power it over Cisco; Visual Voicemail
Network World logo

Cisco Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Sybase
rule

Bloor Research: Data Warehousing with Sybase
Read this Bloor Research report to see their views on data warehousing appliances, where they fall short and how Sybase IQ, with its column-based data base approach, provides superior performance and tuning flexibility.

Download the Report Now

rule

Spotlight Story
IBM buys Cisco-funded database security firm

IBM has acquired a Cisco-funded company that makes software for securing databases. Guardium is a Waltham, MA.-based firm that was founded in 2002 and raised $21 million in funding from Cisco, several venture companies and others. Read full story

Related News:

Avaya's Nortel buy might not power it over Cisco
Even after it buys Nortel, Avaya won't dominate Cisco in the battle for business-communications customers, according to a new study.

Visual Voicemail
Visual Voicemail is a feature of Cisco Unity that allows voicemail users to see all of their voicemails on the Cisco IP Phone when the Messages button is selected from the phone. Visual voicemail requires Cisco Unified Communications Manager (CUCM) integrated with Unity Connection 7.0 or later. Cisco Unity voicemail has supported visual voicemail since Unity 5.0.

Alcatel-Lucent takes bite out of Cisco's SP edge router market share
Networking and telecommunications industry market information gurus, The Dell'Oro Group, published its Routers Report 3Q09, which stated the following: "Alcatel-Lucent reported strong performance in 3Q09. It was the only SP Edge Router vendor to record Q/Q and Y/Y increases. Despite the global recession, Alcatel-Lucent performed well during the first three quarters of 2009, increasing its year-to-date...

Can Santa Deliver a Hummin' Dynamips Platform for Christmas?
Bam! A quick idea about how something works on a router pops into your head. 5-10 clicks later, you're typing in the config you want to test, while waiting 5-10 minutes for one of your saved Dynamips pods to boot up. Soon, you're consoled in to the 12 routers in one of you standard topologies, tweaking a baseline config before testing out the config you just created for this latest brainstorm. Read...

Message Monitor
Cisco Unity 5.0 introduced a live call screening feature called message monitor. The message monitor feature is not supported on Cisco Unity Connection (CUC) or Cisco Unity Express (CUE) at the time of this writing. The message monitor feature displays a screen on the Cisco IP Phone every time a call is routed to the phone's associated primary line voicemail inbox. When the message monitor...

Data center start-up expands Gigabit Ethernet switch line
Arista Networks has unveiled a Gigabit Ethernet data center switch designed to better accommodate increasing traffic loads between the server access and core layers of the network.

Today from the Subnet communities

On Cisco Subnet: Why IBM Bought Guardium and Cisco extends Tandberg deadline again; On Microsoft Subnet: Microsoft moves to hands-on certification tests; On Google Subnet: Chrome OS will rely on not-yet-finished HTML 5 spec for offline app access

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

An Executive's Guide to Web Application Security
Unfortunately, network firewalls and network vulnerability scanners can't defend against application-level attacks. Cyber-criminals are leveraging relatively simple application exploits to gain access to sensitive information for fun and profit. It's more important than ever to implement secure application strategies to effectively protect your business.
Learn More


Take Control of Change, Configuration & Compliance
Live: Wednesday, December 9th 2 PM ET / 11 AM PT. Join Industry experts as they discuss how IT management can now automate continuous configuration compliance across their server infrastructures to maintain security, comply with regulations, follow configuration best practices, and meet SLAs.
Register today!

 

December 02, 2009

MOST-READ STORIES

  1. Latest Microsoft patches cause black screen of death
  2. Is Apple testing a new iPhone model?
  3. Avaya's Nortel buy might not power it over Cisco
  4. Ye olde vintage computer gift guide
  5. 10 IT management technology start-ups to watch
  6. Typewriter puts identity thieves in federal prison
  7. IBM buys database security firm Guardium
  8. Users don't buy Microsoft's Exchange 2010 savings claims
  9. Is certification valuable, or not?
  10. After year of trouble, Big Bang machine breaks world record

Business-Critical Benefits of Workload Automation Solutions
This paper explores the current Workload Automation Solutions (WLA) landscape and an innovative solution that addresses historical obstacles to implementation.
Learn More



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: