Monday, September 13, 2010

Cisco Announces Wireless Vulnerabilities

Let's Get D-I-G-I-T-A-L (Configuration) | Businesses struggle with cloud performance

Network World Cisco

Forward this to a Friend >>>


Cisco Announces Wireless Vulnerabilities
Just when I decided to dedicate more time to blogging about Cisco Wireless and other Cisco related areas but didn't have anything to blog about Cisco has brought me the answer. The answer to my blogging dilemma lies in Document ID: 112062. This document is a Cisco Security Advisory that details seven different vulnerabilities that are said to be independant of each other. The vulnerabilities include:... Read More


RESOURCE COMPLIMENTS OF: Cisco

Cisco Data Center Architecture Event
Join us Sept. 14, 2010, 9-10 a.m. PT for this online event to learn how Cisco's new architectural vision for the data center helps companies evolve their data center and cloud computing needs to easily respond and adapt to the changing needs of the dynamic networked organization. Register Now!

WHITE PAPER: RIM

The CIO's Guide to Mobile Unified Communications
Unified Communications (UC) integrates multiple communications modalities and adds presence features to allow workers to communicate and collaborate more effectively with co-workers, customers and suppliers. Learn about the cost, productivity and reachability issues. Read Now.

Let's Get D-I-G-I-T-A-L (Configuration)
Greetings all. In my last video blog we discussed the theory of digital port operation, including Channel Associated Signaling (CAS) on both a T1 and an E1 and Common Channel Signaling (CCS).  This video blog installment wraps up the digital port topic with a demonstration of digital port configuration (covering both CAS and CCS configuration). Read More


WHITE PAPER: Iron Mountain

Cloud Data Protection
Even the most skeptical are looking to leverage cloud-based data protection services. They can save both administrative time and capital budgets if they migrate. Read this paper to learn why lower disk costs and bandwidth-optimized data transfer are fueling disk-to-cloud (D2C) and disk-to-disk-to-cloud (D2D2C) strategies for server backup. Read Now

Businesses struggle with cloud performance
Businesses should do more than measure cloud performance says Compuware Read More


WHITE PAPER: F5 Networks

A Green Architectural Strategy That Puts IT in the Black
Green computing tends to focus on individual servers and devices, but even greater benefits can be realized with an architectural strategy that leverages green computing practices across the data center. Read More!

10G Ethernet vendor Myricom taps new CEO, expands beyond HPC
Myricom, a pioneer in high performance computing that has shifted its focus to more mainstream networking applications in recent years, has named co-founder Nan Boden as its new president and CEO. Read More

Layer 2 Data Center Interconnect options
For more than 20 years we have been using Layer 3 connectivity powered by dynamic routing protocols to route traffic between data centers, but adoption of virtualization and geo-clustering technologies is forcing us to re-examine our data center interconnect (DCI) models. Read More

Survey highlights need for access controls
We can't seem to get far from data/identity governance issues this month. Dave McKee, from Aveksa (he's actually director, senior media strategy at Schwartz Communications doing PR for Aveksa) just sent me a link to a new survey from the Association of Certified Fraud Examiners (ACFE) entitled "Who is Most Likely to Commit Fraud at Your Company? Profile of a Fraudster Drawn from ACFE Survey of Experts." Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

6 useful Wi-Fi tools for Windows
Free or cheap apps can help troubleshoot your wireless network, turn your laptop into a hot spot, and more.

IT personality types: 8 profiles in geekdom
Consider this your field guide to the flora and fauna of your work life: the eight classic personality types you'll find in virtually any reasonably sized IT department.

MOST-READ STORIES

  1. Rackspace pulls plug on Koran-burning church's Web site
  2. Cisco wireless controllers open to attack
  3. 'Here you have' e-mail worm spreads quickly
  4. Epic failures: 11 infamous software bugs
  5. IT personality types: 8 profiles in geekdom
  6. Microsoft plans double-sized Patch Tuesday next week
  7. The 22 best Android apps
  8. 10 businesses you can start from your smartphone
  9. U.K. government could drop Microsoft for Linux
  10. Linux desktop market share: Small no matter how you measure

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment