Search This Blog

Monday, December 03, 2012

Chinese media attack Cisco

  The Top 10 Priorities for CIOs in 2013 | DARPA program aims to find, shut backdoor, malware holes in commercial IT devices
 
  Network World Cisco

Forward this to a Friend >>>


Chinese media attack Cisco
Striking back at the recent backlash against homies Huawei and ZTE, China's state media has taken to bashing Cisco and the US for what it alleges are conspiracies to attack Chinese competitors and compromise the country's network infrastructure. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

LogMeIn Central: Automate, Monitor and Manage PCs.
LogMeIn lets you Monitor and Manage PCs, deliver patches and updates to multiple PCS simultaneously. Central helps IT deliver seamless support that keeps employees productive and up and running. LogMeIn Central - automate routine tasks and do more. Free Trial

RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

The Top 10 Priorities for CIOs in 2013
As we head into the new year, IDG Enterprise CEO Michael Friedenberg pairs his list of favorite quotes with questions to spark your thinking Read More

DARPA program aims to find, shut backdoor, malware holes in commercial IT devices
It is likely every security IT person's nightmare: the new mobile phone, network router or computer they just tied into the network actually has a secret backdoor that lets the malicious users or governments have unfettered access to the company's assets. Read More


WEBCAST: IBM

Business Intelligence Market Trends and Adoption Patterns
Date and Time: December 11th at 12:00 PM EST A valuable examination of the state of the BI marketplace, this report is the culmination of data from 859 users over topics such as quality and usefulness of product, sales experience, quality of technical support, quality and value of consulting services, integrity and recommendations. Register Now

Disturbing lack of disturbing tech vendor tchotchkes in 2012!
As the year winds down, it strikes me that 2012 has been the weakest year in memory for weird tech vendor tchotchkes. Take your NASDAQ numbers this and VC spending that, but tchotchke distribution and holiday party extravagance are really the main industry indictors worth watching. Read More

BYOD could drive more MDM-focused mergers and acquisitions
There's no hotter IT initiative today than "bring your own device." A recent survey ZK Research conducted shows that 82% of organizations now in some way support the use of consumer devices in the workplace. This is a marked difference from just a couple of years ago, when very few organizations supported it. For those companies that do not support it yet, get ready because the heat's going to... Read More


WEBCAST: Teradata

Big Data Done Right
View this on-demand webcast to learn how to reap the benefits of big data through a practical unified architecture; how to improve performance with in-memory technology; and how to lower costs and increase scalability through cloud computing. Register now.

ITU packet inspection standard raises privacy concerns, says CDT
The UN's telecommunications standards organization has approved a standard for deep packet inspection (DPI) that raises serious concerns about privacy, the Center for Democracy and Technology said. Read More

The non-Internet that never was but might be
The Internet as we know it might never have happened if the Comite Consultatif International Telephonique et Telegraphique (CCITT) had not turned down the offer of TCP/IP from Vint Cerf and other Internet pioneers about 35 years ago. Read More

Chapter 1: Internet Protocol Operations Fundamentals
Read More

 
 
 

SLIDESHOWS

Cool Yule Apps
13 new things to put onto your iPad or tablet.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Chinese media attack Cisco
  2. Consumer Reports names AT&T worst mobile service provider
  3. Cisco's internal security team fights to corral BYOD, malware and Wild West environment
  4. Microsoft tweaks, then silences IE haters
  5. Microsoft Surface RT or Surface Pro?
  6. 2013 IT salaries: 15 titles getting the biggest pay raises
  7. 14 of the most useful Linux websites
  8. New Linux smartphone OS 'Sailfish' passes the test
  9. 10 hard truths IT must learn to accept
  10. Android Jelly Bean resurrected my HP Touchpad
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: