Monday, April 02, 2012

Cisco poaching rivals for SDN spin-in

Critical milestones in Cisco history | INTERPOL: Lack of international laws, resources hurts cybercrime fight

Network World Cisco

Forward this to a Friend >>>


Cisco poaching rivals for SDN spin-in
Insieme Networks - the proper name of the SDN start-up that may be spun into Cisco - is actively recruiting people from around the Valley, according to two posts in the blogosphere this week. The recruits are not just coming from Cisco: SDNs start-ups Nicira and Big Switch have reportedly been hit, and Arista is targeted but says it hasn't lost anyone yet. Read More


WHITE PAPER: Symantec

Customer Success - Tree In The Glen
Treehouse in the Glen replaced a variety of security solutions with Symantec Endpoint Protection Small Business Edition. Since deployment, the store has had zero virus infections, system performance has improved, and security management time has dropped from three hours a week to 15 minutes. Learn More

WHITE PAPER: IBM

Shorten The Gap Between Customers and Development Value
It's a fine line to walk—trying to balance between the costs and the benefits of procuring development and test IT assets. Read this white paper to learn about the challenges that CIOs, IT managers and application development managers face as they attempt to select a cloud computing vendor to help find the right path. Learn More

Critical milestones in Cisco history
Cisco: From its Catalyst 6500 Ethernet switch rollout to 2011's 'transformation,' the networking giant has a rich history Read More

INTERPOL: Lack of international laws, resources hurts cybercrime fight
INTERPOL's chief today said that a lack of anti-cybercrime laws and resources to fight the scourge is damaging other countries around the globe's ability to fight cybercrimes. Read More


WHITE PAPER: Radware

2011 State of Cyber Security
Your organization's business continuity depends on understanding intricacies of the current attack landscape. The 2011 Radware Global Application & Network Security Report gives essential guidance and findings on the state of global cyber security and how you can better prepare for what comes next. Learn More

Why NEW architecture will happen
In my first column, I described a Next-generation Enterprise WAN ("NEW" for short) architecture. Here I'd like to cover why this NEW architecture will be widely deployed over the next few years. Part of the reason – and some would argue, the primary reason – is, to paraphrase Bill Clinton and James Carville, "It's the economics, stupid!" Read More

New IBM CEO in middle of Masters golf controversy
Two long-standing traditions at Augusta National Golf Club are on a collision course just a week before the institution's biggest event of the year. The host of the Masters, one of professional golf's most prestigious competitions, has never admitted a female member -- but the club's partnership with IBM has historically meant that the CEO of that company is offered one of the iconic green membership jackets. Read More


WHITE PAPER: Wildpackets

Ending the Blame Game: Troubleshoot Distributed Applications
Today's geographically distributed companies and applications require a 24x7 proactive approach to network performance management. Discover factors to consider when troubleshooting the performance of distributed applications. Learn must have criteria for distributed network analysis solutions. Learn More

IETF attendees re-engineer their hotel's Wi-Fi network
What happens when a bunch of IETF super nerds show up in Paris for a major conference and discover their hotel's Wi-Fi network has imploded? Read More

Why My Mama Runs Faster Than Your App
You know the drill. The request comes down to run XYZ app between offices. You run it on the LAN and, of course, it all looks fine, but when you put it on the WAN, performance drops to about as fast Rich Eisen's 40-yard dash time. Now you need to explain the problem to your users and come up with a solution. Let me save you the trouble. Here are the top five reasons your users' apps won't run... Read More

Mobile Device Security Reality
You've heard the same things I have: "You can't control mobile device proliferation." "Most large organizations are establishing BYOD problems." "You need to let new employees work with their own devices and use social networking sites if you want to recruit them." Poppycock, Rubbish, Nonsense, I say. Read More

Cloud Value Must Extend Past Cost Savings
Yesterday I took some time out of my Enterprise Connect schedule and headed to New York to participate in a cloud event held by Navisite, a leading provider of cloud services. The theme of the event was "Cloud: Beyond ROI," which I thought was a good topic of conversation for anyone considering the cloud. Read More



SLIDESHOWS

20 iPad business apps every CIO should want
iPad apps for sales forces, IT departments and more.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Uncle Sam wants to hack foreign video consoles and scrape gamers' data
  2. Cisco forces manufacturer's hand; adopts Microsoft Lync
  3. 10 fun (and safe) ways to pretend to be a hacker
  4. How open source powers a Battlestar Galactica-inspired flight simulator
  5. Dissecting Cisco's FabricPath Ethernet technology
  6. IETF attendees reengineer their hotel's Wi-Fi network
  7. AOL unplugs 10,0000 servers, saves $5 million
  8. Google says 'Go' to new programming language
  9. Threat of a bullet in the face keeping cybercrooks cautious
  10. Critical milestones in Cisco history

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment