Thursday, August 02, 2012

Eye candy for IT: 25 award-winning designs

  DeepField Networks exits stealth mode to reveal cloud genome mapping | Dual-stack will increase operating expenses
 
  Network World Network Optimization

Forward this to a Friend >>>


Eye candy for IT: 25 award-winning designs
IT and communications products won big in this year's red dot design awards. The international awards program, which dates back to 1955, is among the world's most prestigious design competitions. Read More


RESOURCE COMPLIMENTS OF: SolarWinds

Top 5 Free Tools for Network Troubleshooting & Monitoring
Quickly identify network bandwidth hogs, simplify management of your IP Address space, perform reliable and secure file transfers, quickly configure devices and monitor performance and availability for your favorite network device, all with FREE tools from SolarWinds! Try one or all of them for FREE today! Collect the top 5 free tools for network troubleshooting and monitoring today! Choose from Real-time NetFlow Analyzer, Network Device Monitor, Network Config Generator, TFTP Server or IP Address Tracker. Download any or all 5 of these tools for FREE!

WHITE PAPER: Xirrus

Tablets in the Enterprise
Tablets are replacing laptops at lightning speed. Whether company-issued or part of the BYOD phenomenon, the increased use of smart devices has resulted in a dramatic shift in network traffic with an emphasis on wireless. This paper explains how to predict Wi-Fi demands and architect a best-fit wireless network strategy for your environment. Learn more.

DeepField Networks exits stealth mode to reveal cloud genome mapping
DeepField Networks, an Ann Arbor, Mich., startup, is coming out of stealth mode to announce an analytics tool that maps the traffic patterns, application performance and cost structure of networks for cloud computing companies, content providers and carriers. Read More

Dual-stack will increase operating expenses
As we start to plan for IPv6 and start to deploy it on our networks we should try to anticipate the operational costs related to running both IPv6 and IPv4. Read More

INSIDER
The state of network security
Network security is still as necessary as it was 15 years ago when the Black Hat Conference was first beginning. Sure the players have changed and the sophistication, but it is a classic good vs. evil scenario still. Read More


WHITE PAPER: Silver Peak Systems, Inc.

Proven Techniques to Cope with Packet Loss
If you have a WAN link with an RTT of 100 ms and packet loss of 1% the throughput is virtually nil. Learn how to overcome this issue in this paper that highlights: - Key WAN characteristics of out of order and lost packets - Packet loss impact on data replication - How MPLS statistics fool network professionals Learn more.

IBM attempts to redefine the IPS
IBM Tuesday introduced what it's calling a "next generation" intrusion-prevention system (IPS), an offering that not only is designed to stifle network-based attacks, but adds application-level controls and URL filtering capabilities typically found in separate products such as Web security gateways. Read More

Hackers reveal critical vulnerabilities in Huawei routers at Defcon
Security researchers disclosed critical vulnerabilities in routers from Chinese networking and telecommunications equipment manufacturer Huawei at the Defcon hackers conference on Sunday. Read More


WEBCAST: IBM

Changing the Competitive Dynamics of the Business
Date/Time: June 5, 2012, 11:00 a.m., EDT, 4:00 p.m. BST / 3:00 p.m. UTC Please join us for this webcast, as Dr. Barry Devlin, Founder and Principal, 9sight Consulting, describes what operational analytics can do for your business and reviews an architectural approach that will enable you to make it a reality. Register Now

AirTight: from WIPS to EWLS
Airtight Networks has been one of the leading suppliers of wireless intrusion protection systems (WIPS) since their founding, and is best known for their SpectraGuard Enterprise security system. SpectraGuard Enterprise consists of a server with a Web-based console and "scanners" that act as sensors. As it turns out, the difference between a scanner and an access point (AP) is fairly minimal. Read More

New requirements for security monitoring
Today's security threats are difficult to defend against. On the one hand, the volume of malware variants has gone through the roof over the past few years. On the other, targeted attacks have become more stealthy and damaging. How can CISOs possibly combat this cybersecurity double-edged sword? Read More

Oracle, Xsigo set network virtualization consolidation in motion
With Oracle's acquisition of Xsigo this week, it's now clear we have consolidation occurring in the server and network virtualization markets. Read More

SevOne offering free version of virtual network performance management product
SevOne has made a free, scale-limited version of its virtual network performance management tool available to the general public, and is planning an official roll-out for Wednesday. Read More

 
 
 

SLIDESHOWS

12 new network features in Windows 8
There are a bunch of new and impressive administrative features designed to increase network support, reliability, performance, and security.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Microsoft kissing Hotmail goodbye
  2. IBM attempts to redefine the IPS
  3. New data center design boasts 'world's most efficient cooling system'
  4. Following Xsigo acquisition, Oracle becomes the Apple of enterprise IT
  5. Outsourcers apparently don't miss a beat in face of massive India power outage
  6. Leaked Windows Phone 8 SDK brings app surprises
  7. In face of Flame malware, Microsoft will revamp Windows encryption keys
  8. Netflix uncages Chaos Monkey disaster testing system
  9. Meet the new email boss Outlook.com, not the same as the old boss Hotmail
  10. iPhone 5 unveiling set for Sept. 12, rumors claim
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment