Wednesday, July 28, 2010

Avaya stares down Microsoft, Cisco

Cisco Content Delivery System open to attack | Cisco best positioned for business tablet computing?

Network World Cisco

Forward this to a Friend >>>


Avaya stares down Microsoft, Cisco
After years of hanging around the top of the IP telephony market, the company is poised to take over unified communications, but Cisco and Microsoft stand in the way. Read More


WEBCAST: Oracle

Getting Started with Identity Compliance
The Burton Group's, Kevin Kampman, provides an overview of the latest technology for identity management. He'll help you sift through key, mandatory requirements and features and functionality that can wait. Kevin offers guidance on how you can get a 360-degree view of users' access and behavior, best practices and a real-world implementation. View Now.

WHITE PAPER: Novell

Efficiently Delivering Enterprise-Class File-Based Storage
IDC: Read about the exponential growth in file-based storage. Learn how having intelligence on data stored can help storage managers make smarter decisions about data storage, protection, archiving, retention, and disposition. Read Now.

Cisco Content Delivery System open to attack
Cisco this week issued another security advisory, this time on its Content Delivery System. The product's Internet Streamer application has a vulnerability that could allow an attacker to read files arbitrarily on the device. An unauthenticated attacker could exploit this vulnerability to access password files and system logs, the advisory states. Read More

Cisco best positioned for business tablet computing?
If tablet computing takes off in the enterprise, is Cisco best positioned to capitalize on it? That's the assertion posed by Motley Fool in this piece entitled "The Titan of Tablets: Apple or Cisco?" Read More

Avaya CEO on Cisco, Microsoft, Facebook, Twitter and how to win over Nortel customers
Avaya CEO Kevin Kennedy recently sat down at his office in Basking Ridge, N.J., with Network World Senior Editor Tim Greene to discuss the company's progress integrating Nortel enterprise assets into the company, the changing nature of the business communications market, the effects of Facebook and Twitter on corporate networks, the impact of Skype, the competition Avaya faces from Cisco and Microsoft and the promise of cloud computing. What follows is an edited transcript of that conversation. Read More


WHITE PAPER: HP

Implementing Tiered Storage:
IDC: Enterprises that are investigating deploying a tiered storage architecture should consider using an external services provider to assist with the migration. Of critical importance is the ability to offer a range of services from the initial planning all the way through to ongoing support and management. Read Now

NAC decisions you need to make now
One important piece of a multilevel security defense for companies of almost any size is network access control (NAC), which lets you enforce policies for end-user machines. Read More

US awards $122M for new lab that will spin sunlight into fuel
Making clean fuel out of sunlight is the idea behind a $122 million US Department of Energy award to a team of California researchers. Read More

Peer-to-Peer Security
Traditional security solutions are sort of like client/server computing. Security vendors take the role of the server, hosting the master software, adding new anti-malware signatures, and distributing them to all of the clients. This model was adequate in the past but it is no longer good enough. Why? Malware volume stresses the system and all too common zero-day attacks have free and clear access... Read More


WHITE PAPER: MessageLabs

Employee Web Use and Misuse:
This white paper examines a Web security solution that gives companies the ability to monitor and enforce their Internet usage policies, bringing site monitoring and URL filtering together while insuring security with anti-virus and anti-spyware protection. Read Now

Hosted UC Solutions and You
The market is literally abuzz about the various hosted offerings, both new and existing.  It seems that one can't turn around without seeing some kind of hosted this or hosted that.  With that in mind, I thought I'd jump on the Hosted UC bandwagon. Read More

IPv6 Enabled Web Browsers
One way to get your browser to navigate to an IPv6-capable web site is to simply enter the IPv6 address of the web server into the browser's address bar. IETF RFC 2732, Format for Literal IPv6 Addresses in URL's, which is updated by IETF RFC 3986, Uniform Resource Identifier (URI): Generic Syntax, defines the syntax that should be used when entering an IPv6 address directly. The format typically... Read More

It's Time to Start Loving Tunnels
I wrote a blog two years ago about how I could fix anything with a tunnel. Yes, it was a tad tongue in cheek, but it also had some truth to it. Tunnels are a weapon to use when faced with a difficult network design issue. However, as with any weapon, there can be collateral damage. Tunnels have proven to sometimes cost more than they are worth when they introduce sub-optimal routing, MTU issues,... Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: Apple iOS 4 vs. Android 2.2
Apple's iOS has been wowing users for four years in the iPhone and now the iPad. Available in smartphones and now tablets from various vendors going on two years, Google's Android has proven itself to be a strong contender that has the only real chance to surpass iOS.

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer.

MOST-READ STORIES

  1. Apple grants ABC access to its secretive "black labs"
  2. WPA2 vulnerability found
  3. Cisco study warns against "FarmVille"
  4. Is Sprint losing its WiMAX/4G gamble?
  5. MIT design could speed up the Internet
  6. Certified lies: Big Brother in your browser
  7. Avaya stares down Microsoft, Cisco
  8. Black Hat too commercial for you?
  9. Mobile deathmatch: Apple iOS 4 vs. Android 2.2
  10. Should you even bother looking at Windows Phone 7?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment