Friday, March 30, 2012

Dissecting Cisco's FabricPath Ethernet technology

  Massive payments data breach originating with Central American gang through NYC garage? | Inside Google's London Campus, an incubator for tech startups
 
  Network World Daily News PM

Forward this to a Friend >>>


Dissecting Cisco's FabricPath Ethernet technology
Cisco's FabricPath data center Ethernet technology is designed to combine traditional, Spanning Tree-based Ethernet with a next-generation architecture that uses a link-state protocol to allow for multiple active paths. Deploying multiple active paths in a data center network is required to flatten the infrastructure to reduce latency and better support traffic flow between server racks. Read More


RESOURCE COMPLIMENTS OF: Rocky Mountain IPv6 Task Force

2012 North American IPv6 Summit
Become a certified IPv6 Engineer! Nephos6, in collaboration with the IPv6 Forum is hosting IPv6 certification testing. 2012 NA IPv6 Summit attendees can test for IPv6 certification during the conference. Save $50 off conference registration with this code: SPON700. Register Now

WEBCAST: Wildpackets

Distributed Network Analysis for Distributed Applications
Corporate computing has crossed the threshold to highly distributed -- whether your organization has 50 or 50,000 employees. It's imperative that you distribute your network analysis capabilities. Learn technologies and approaches to best deal with today's highly distributed network applications View Now

Massive payments data breach originating with Central American gang through NYC garage?
Both Visa and MasterCard Friday are acknowledging a possible data breach of a payment-card processing company network that, once an investigation is completed, could show that sensitive data from cardholders was stolen and payment fraud committed due to the break-in. Read More

Inside Google's London Campus, an incubator for tech startups
A look at Google's new 7-floor co-working fortress in London Read More

Windows 8 Update: Back up Windows Server 8 to the cloud
Microsoft is offering free tests of online backup for Windows Server 8 via its Azure cloud storage service, which could be a convenient way to protect data without having to spend a lot of time designing and cash outlay deploying private backup. Read More


WHITE PAPER: Silver Peak Systems, Inc.

Optimizing Offsite Disaster Recovery with Virtual WAN Op
Learn why one of the world's largest media companies chose Silver Peak virtual WAN Optimization for their cross country replication challenges including an on-demand media database requiring 7 x24 access. Complicating the challenge was a lack of space in the state-of-the-art data center for additional physical hardware. No problem. Learn more.

New IBM CEO in middle of Masters golf controversy
Two long-standing traditions at Augusta National Golf Club are on a collision course just a week before the institution's biggest event of the year. The host of the Masters, one of professional golf's most prestigious competitions, has never admitted a female member -- but the club's partnership with IBM has historically meant that the CEO of that company is offered one of the iconic green membership jackets. Read More

Ukraine shuts down forum for malware writers
Ukrainian authorities have shut down a long-running forum that was used to trade tips on writing malicious software, a sign the country's law enforcement may be watching hackers more closely. Read More

Intel plans 'superchip' for high-performance computing
Intel this week said it was investing in the development of a "superchip" for high-performance computing systems that the company hopes will raise its supercomputing profile. Read More


WHITE PAPER: PhoneFactor

5 Critical Considerations Before Renewing Security Tokens
As the threat landscape and needs of your users rapidly change, technology must also quickly evolve. This paper addresses five critical factors all IT buyers should consider before renewing or extending their security token implementation so they don't make a vital mistake by overpaying for outdated authentication technology. Learn More

BlackHole exploit targets Java bug through browser-based attacks
A powerful new exploit has been identified in the wild that could turn PCs running outdated versions of Java into bots for spam or DDoS attacks, or even loot them for sensitive information. Read More

Social media helps make indelible mark on lifesaving cause
Because we live in a world where social media permeates daily life, Annie Rose Ramos - or at least her tattooed back -- may soon become a symbol for a global lifesaving cause that will get a round of deserved attention as a result. First the picture, which has viral written on it as clearly as "half the sky": Nicholas Kristof of the New York Times explains on Google+: Read More

Cloud Value Must Extend Past Cost Savings
Yesterday I took some time out of my Enterprise Connect schedule and headed to New York to participate in a cloud event held by Navisite, a leading provider of cloud services. The theme of the event was "Cloud: Beyond ROI," which I thought was a good topic of conversation for anyone considering the cloud. Read More

The Byte - RIM revenue, Android tablets, Dell smartphones, OnStar Family Link
Research in Motion's fourth quarter revenue plummeted 25 percent as it struggles to stay relevant.Google will open an online store where it will market and sell tablets directly to consumers, according to the Wall Street Journal. Read More

 
 
 

SLIDESHOWS

20 iPad business apps every CIO should want
iPad apps for sales forces, IT departments and more.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Uncle Sam wants to hack foreign video consoles and scrape gamers' data
  2. Cisco forces manufacturer's hand; adopts Microsoft Lync
  3. 10 fun (and safe) ways to pretend to be a hacker
  4. How open source powers a Battlestar Galactica-inspired flight simulator
  5. Dissecting Cisco's FabricPath Ethernet technology
  6. IETF attendees reengineer their hotel's Wi-Fi network
  7. AOL unplugs 10,0000 servers, saves $5 million
  8. Google says 'Go' to new programming language
  9. Threat of a bullet in the face keeping cybercrooks cautious
  10. Critical milestones in Cisco history
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment