Friday, August 27, 2010

IPv6 roundup; How to protect your voice gateway

  London's calling…Through your voice gateway | Brocade suit alleges A10 copied Foundry
 
  Network World Cisco

Forward this to a Friend >>>


IPv6 is being deployed but not in the expected places
Eric Vyncke: IPv6 has existed for more than 15 years but which countries have deployed it most? Read More


WHITE PAPER: Brocade

The State of Data Center and Network Infrastructure
Instead of a preparation method of rip and replace, examine how organizations can follow a more cost-effective strategy of evolving their data centers. Go inside the phased network architecture upgrade, which enables new levels of application flexibility and business agility. Read now!

WHITE PAPER: HP

Implementing Tiered Storage:
IDC: Enterprises that are investigating deploying a tiered storage architecture should consider using an external services provider to assist with the migration. Of critical importance is the ability to offer a range of services from the initial planning all the way through to ongoing support and management. Read Now

London's calling…Through your voice gateway
Chris Jackson: Protecting your voice gateway is extremely important for preventing toll fraud and other criminal activities that can be conducted through your VoIP system. This post covers five key areas that can help reduce risks to your voice gateway. Read More

Brocade suit alleges A10 copied Foundry
Brocade Communications claims in a suit filed earlier this month that the founder of A10 Networks improperly used trade secrets and recruited top employees in order to build application delivery products that competed with those offered by Brocade. Read More

Low-threat worm caused 'most significant breach' of U.S. military net
The most significant breach of U.S. military computers ever was carried out in 2008 by W32.SillyFDC, a low-level-threat worm that got into the network via a thumb drive plugged into a military laptop. Read More


WHITE PAPER: NetGear

NETGEAR® Stream Scanning Technology
Security solutions must keep a company safe from the constant barrage of Internet-based threats without slowing down the speed of business. Where other technologies have failed, NETGEAR Stream Scanning architecture successfully achieves this balance. Learn more.

Social Security Administration to award massive network deal
The Social Security Administration says it will announce in September a new award for data networking services following Qwest's successful -- but secretive -- legal protest of the original awards to Verizon and AT&T. Read More

Disband the ITU-T IPv6 Group
When the ITU-T IPv6 Group gets together in Geneva next week, one of the things they should discuss is the need for their very existence. Read More

AT&T sees businesses wading slowly into IPv6
: Even though we're due to run out of IPv4 addresses in the next year, AT&T doesn't expect enterprises to be fully IPv6-ready when D-Day arrives. Read More


WHITE PAPER: F5 Networks

Optimize VMware View VDI Deployments with F5
Reduce the impact on the WAN from VDI by working with VMware View to optimize the connection between users and their VMs. F5 can control the amount of data passed back and forth between data centers, removing redundant application data and optimizing unique data for the client desktop. Learn more!

Verizon: Businesses need to move on IPv6
Verizon Business has a message to companies still reluctant to migrate their networks to IPv6: You're better off doing it now than later. Read More

Sale of ArcSight: No kidding?
Jon Oltsik: An industry friend just sent me a story from the Wall Street Journal proclaiming that security management leader ArcSight will be acquired within the next week. Read More

Visit the Cisco Subnet home page for more Cisco news
The Cisco Subnet community features industry-expert bloggers, giveaways and all the top news of interest to network professionals. Check out the Cisco Subnet home page. Follow us on Twitter @ciscosubnet Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Cloud storage lives up to the hype
We tested five cloud-based storage services under real-world conditions. We set up accounts, connected with the vendor storage network, uploaded and downloaded files, measured performance and analyzed cost structures. Our conclusions are that cloud-based storage can save you money. And cloud-based storage can be fast. However, there are still security concerns that you need to be aware of.

Wireless networks and mobility quiz
iPhones and other handhelds bought for home use are infiltrating corporate networks, but there's a host of other wireless technologies that comprise a wave of mobile computing that is creating sweeping changes in business infrastructure. How well versed are you in the technical and not-so- technical details?

MOST-READ STORIES

  1. Zero-day Windows bug problem worse than first thought
  2. Linux community finally fixes 6-year-old critical bug
  3. Intel-McAfee deal baffles security analysts
  4. Android 2.2: How to install Flash on Froyo
  5. Intel buys McAfee: My two cents
  6. Microsoft won't showcase Hyper-V at VMworld
  7. Cameron Diaz could wreck your PC, McAfee warns
  8. Decorate with Linux
  9. Intel to buy McAfee in $7.68 billion blockbuster
  10. Does Intel buying McAfee have any impact on open source
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment