Tuesday, January 25, 2011

Cisco, Verizon enlist in 24-hour IPv6 trial

Gartner slams Cisco's single-vendor network vision | Five ways to speed up your home network

Network World Network Optimization

Forward this to a Friend >>>


Cisco, Verizon enlist in 24-hour IPv6 trial
Two leading network vendors -- Cisco and Verizon Business -- have enlisted in an upcoming trial-by-fire of IPv6, the long-anticipated upgrade to the Internet's main communications protocol called IPv4. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: Quantum Corporation

Long-Term Data Protection and Retention
IT organizations of all sizes contend with a growing data footprint with more data to manage, protect and preserve for longer periods of time. Read Now

Gartner slams Cisco's single-vendor network vision
Businesses are better off deploying multivendor networks, no matter what Cisco and other large network vendors may tell you, according to a recent report from Gartner. Read More

Five ways to speed up your home network
Maybe you're tired of paying the cable company and want to get your movies and other entertainment from the Web. Naturally you'll want to watch those shows on your TV with the aid of a Roku box or similar device. More and more people are doing that, and if you want to join the crowd, you've got to be sure you're home Internet network is up to the challenge. Read More

The never-ending "big vs. managed" pipe battle
It's been at least 15 years since I participated in my first "should you manage what you've got or just throw more bandwidth at the problem" network strategy discussion. Back then, proponents of ATM largely took the side of "manage" while emerging Ethernet vendors argued that it was cheaper and easier to just throw more bandwidth at the problem. Read More


WHITE PAPER: Google Postini

Eliminate Email Disk Space Concerns
Google Message Discovery is a complete email security and archiving solution that creates a centralized and searchable email repository, secures emails from threats and helps you manage compliance requirements more effectively. Read now!

Cisco: Puppy cams threaten Internet
Network demand will explode, fueled by unexpected growth in ambient video, like puppy cams and surveillance video, according to reports from the 33rd Pacific Telecommunications Council (PTC) conference held last week in Hawaii. Read More

Top 10 tasks for IPv6 application developers
Many IT people who are unfamiliar with IPv6 believe the responsibility for IPv6 deployment falls on the network teams. However, those who are knowledgeable about IPv6 realize the migration to IPv6 will involve any system that uses an IP address. Read More

Breaking a few eggs: Fedora 15 changes network device naming
The Fedora Project is getting ready to break a lot of networking scripts that depend on the ethX naming convention — by being the first major distro to ship Consistent Network Device Naming. Read More


WHITE PAPER: Symantec

Enterprise Vault & Microsoft Business Productivity Suite
Microsoft Business Productivity Online Suite (BPOS) is a set of Microsoft hosted messaging and collaboration services. Companies choose BPOS to migrate Exchange offsite -- to help reduce costs . This whitepaper outlines the integration of offsite email service with an on-premises Archive solution. Read now!

Digital black market offers cheap botnets for hire
Botnets for hire to launch your own spam campaign and stolen credit card information sold at the rock bottom price of $2 are just two of the commodities easily found on the cyber-crime black market today, according to a report released this month by Panda Security. The report, which was conducted by PandaLabs researchers who posed as cyber criminals, details a vast criminal network selling stolen bank account information in forums and dedicated online stores. Read More

SolarWinds blows into virtualization and application performance management
The ever-ambitious SolarWinds, a longtime network management fixture, is broadening its reach once again. Read More

Brian Gentile, CEO of Jaspersoft on the open network
My latest guest on the Open Network podcast is Brian Gentile, CEO of opensource powerhouse Jaspersoft. Jaspersoft is a poster child for the successful open core model. What I didn't know is that Jaspersoft is also finding great success in the cloud too. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

12 geekiest snow and ice sculptures
Not all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.

2011's 25 Geekiest 25th Anniversaries
Our fifth annual collection of the year's "geekiest anniversaries" kicks off with The Mentor's "Hacker's Manifesto" and includes such memorable characters as Captain Midnight and Ferris Bueller, institutions the likes of the IETF and Spy magazine, and inventions like the Super Soaker and disposable camera.

MOST-READ STORIES

  1. Gartner slams Cisco's single-vendor network vision
  2. Is retaliation the answer to cyber attacks?
  3. Three more Microsoft executives jump ship
  4. 90% of Microsoft customers in China using pirated software
  5. Cisco: Puppy cams threaten Internet
  6. The case of Apple's mystery screw
  7. Got $500? You can buy a hacked U.S. military Web site
  8. Apple App Store hits magical 10 billion app download milestone
  9. Is Apple expanding use of tamper-resistant screw for iPhone?
  10. Yahoo IPv6 upgrade could shut out 1 million Internet users

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment