Monday, January 23, 2012

Another reason for Cisco to pound its chest

FBI busts programmer for stealing US Treasury code | Kodak: A look at the icons of an icon

Network World Cisco

Forward this to a Friend >>>


Another reason for Cisco to pound its chest
Never one to pass up an opportunity to toot its own horn, Cisco is celebrating a milestone... and not in its traditional stronghold of switching and routing. In just over two years, Cisco has landed over 10,000 customers for its Unified Computing System (UCS) blade server platform, the controversial product that alienated longtime partners HP and IBM. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant on-demand remote support with LogMeIn Rescue
Without pre-installed software, quickly connect to PCs, Macs, smartphones and tablets anywhere in the world. Get in, solve the problem, and be done in a flash. Plus, Rescue's SaaS-based platform means free upgrades and zero maintenance. Try it free today.

RESOURCE COMPLIMENTS OF: CloudPassage

CloudPassage
Infrastructure-as-a-Service (IaaS) is one of the fastest-growing cloud computing. However, cloud providers usage agreements squarely make the user responsible for protecting servers, applications and data. CloudPassage Halo is the award winning cloud server security platform that has everything you need to secure your cloud servers. Read More

FBI busts programmer for stealing US Treasury code
The FBI said it arrested a computer programmer in New York this week and charged him with stealing proprietary software code from the Federal Reserve Bank of New York. The software known as the Government-Wide Accounting and Reporting Program (GWA) handles all manner of U.S. government financial transactions. Read More

Kodak: A look at the icons of an icon
American photography icon Kodak this week filed for Chapter 11 bankruptcy protection after 131 years in business. The company was the originator of the handheld film camera and in 1975 invented the digital camera which largely spelled the end of the film business Kodak dominated. Here we take a look at the products and services that made Kodak famous. Read More

Can employee-owned devices save companies money?
The "bring your own device" (BYOD) phenomenon is sweeping through the enterprise, and businesses such as Chicago-based design firm Holly Hunt have embraced it with gusto, offering stipends to employees to use their own mobile devices for work. Read More


WHITE PAPER: Riverbed

What's Needed for Cloud Computing
Just what is cloud computing anyway? This paper seeks to clarify the definition of cloud computing, identify how far along users are in terms of cloud deployment, and examine the role of the network in the cloud computing model. Read More!

Security roundup: Anonymous attacks DOJ, RIAA sites; Israeli-Palestinian cyberconflict escalates
Angered by the move by federal authorities to shut down the popular website Megaupload on charges it illegally shared movies, TV shows and e-books, hackers said to be working on behalf of the hactivist group Anonymous late yesterday launched denial-of-service attacks against a number of websites, including that of the Department of Justice (DOJ) and the Recording Industry Association of America (RIAA). Read More

The Future of Firewall Policies
The majority of today's firewalls have only IPv4 source and destination address objects in their policies. However, many of our firewalls are IPv6-capable and allow security administrators to configure either IPv4 or IPv6 policies. Over time, maintaining two firewall policies will become burdensome. Read More

Cutting-edge electronics will require US to revamp auto defect investigations
The often complex, interconnected electronics systems now proliferating across most cars and truck will require the US government that watches over auto safety -- the National Highway Traffic Safety Administration (NHTSA) -- to revamp the way it handles and researches problems. Read More


WHITE PAPER: Riverbed

Riverbed Services Platform Feature Brief
The enhanced Riverbed® Services Platform (RSP) provides customers with the capability to run up to five additional services and applications virtually on VMware in a protected partition on the Steelhead® appliance. Learn More Now.

Security history: Nothing like an old-fashioned boot sector virus
It has been 26 years to the day when the computing world was introduced to its first virus: The Brain. Read More

5 Hot Technology Policy Agenda Items You Need to Watch
From providing more spectrum space for wireless providers to battling online piracy to creating cybersecurity policy to protecting intellectual property, expect things to heat up in Washington this year. So pour yourself a cup of coffee and read on to learn how lawmakers will impact the tech world in the year ahead. Read More

Avaya releases IP Office 8.0
Avaya unveiled the latest version of the company's unified communications (UC) solution for small and midsize enterprises (SME) with the release of Avaya IP Office 8.0. The new version includes enhancements designed to improve collaboration with mobile capabilities. Avaya's latest mobile application builds on the previously available Essential Mobility solution for IP Office. Read More



SLIDESHOWS

12 available devices to test drive Windows 8
Here are a dozen off-the-shelf devices that Microsoft says it uses in its labs to put Windows 8 through its paces. You, too, can buy one if you haven't already.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. iPad 3 rumor rollup for the week ending Jan. 18
  2. Can employee-owned devices save companies money?
  3. Hacking critical infrastructure systems now as easy as pushing a button?
  4. Anonymous takes out DoJ, RIAA in response to Megaupload.com take-down
  5. U.S. losing high-tech jobs, R&D dominance to Asia
  6. Tips for Facebook Timeline Apps: Beware what you share
  7. Megaupload.com shut down, execs jailed
  8. Galaxy Nexus smartphone a worthy upgrade
  9. Top 7 truths about consumerization of IT
  10. Another reason for Cisco to pound its chest

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment