Tuesday, February 26, 2013

West Virginia auditor blasts Cisco, state for "oversized" router buy

  Juniper security products use device-fingerprinting as way to detect, block attacks | A new way to sell used IT equipment
 
  Network World Network Optimization

Forward this to a Friend >>>


West Virginia auditor blasts Cisco, state for "oversized" router buy
West Virginia wasted millions in federal grant money when it purchased 1,164 Cisco routers for $24 million in 2010, a state audit concluded. A report issued this month by the West Virginia Legislative Auditor found Cisco "showed a wanton indifference to the interests of the public" in recommending the investment in its model 3945 branch routers, the majority of which were "oversized" for the requirements of the state agencies using them. Read More


WHITE PAPER: Salesforce.com

Escape Lotus Notes
With the Salesforce Platform, you can develop and deploy mobile, secure, scalable apps faster than ever. You'll get real-time reporting, visual work-flow, and with automatic feature upgrades, your apps will always have the latest innovations. Read Now!

WHITE PAPER: AccelOps

BYOD Monitoring Strategies solution brief
This solution brief highlights how AccelOps' integrated security, performance and availability monitoring software allows you to confidently and securely support mobile device access to sensitive corporate IT resources. Read Now

Juniper security products use device-fingerprinting as way to detect, block attacks
Juniper Networks today rolled out a battalion of security products and services to protect corporate networks, stating that when it comes to defensive measures, security attacks can be better prevented by determining device-fingerprinting rather than blocking attacks based on IP address. Read More

A new way to sell used IT equipment
The buying and selling of used IT equipment is not a trivial market, but it doesn't get enormous attention. In many cases, enterprises unload used equipment as a trade-in or at bargain price to a wholesaler because they just want the equipment off the floor. Read More

Small-cell chip, network rollouts point to a diverse future
In Star Wars terms, the small cells that mobile carriers and vendors will be talking up this week at Mobile World Congress are more like the odd-couple androids R2-D2 and C-3PO than like their foes, the Empire's phalanxes of identical storm troopers. Read More


WHITE PAPER: F5 Networks

The New Application Delivery Firewall Paradigm
Learn how you can effectively combat these modern attacks with a new firewall paradigm that protects the datacenters and ensures reliability. Learn More!

Cisco virtual router targets the cloud
The Cisco CSR 1000V router is designed for enterprise network managers who want to have a little piece of their Cisco infrastructure in the cloud. Read More

How to predict the value of a content delivery network
Any enterprise with a web audience in multiple locations can benefit from using a CDN, but if your users are likely to download lots of stuff from your website, play media files, and/or watch or listen to live broadcasts, you are likely to benefit most. Read More

14 dirty IT tricks, security pros edition
The IT security world is full of charlatans and wannabes. And all of us have been "advised" by at least one of them. Read More


WHITE PAPER: IBM Corporation

Microsoft Dynamics CRM solutions from IBM
IBM provides consulting, implementation and application management services for Microsoft Dynamics CRM, a comprehensive solution that helps midsize and larger organizations easily create and maintain a 360 view of their customers from first contact through purchase and post-sales. Learn More.

A spectre is haunting Europe (and cloud computing everywhere) – the spectre of the 'trombone' effect
A spectre is haunting Europe – and North America, and Asia Pacific – in Enterprise IT managers' quest to leverage the power of cloud computing. It is the spectre of the "trombone" effect in enterprise Internet access. Read More

Six-strikes piracy alert system being rolled out in the US
A system that aims to curb Internet users from sharing copyrighted content is being rolled out in the U.S. after a number of delays. Read More

Salesforce.com delivers mobile customer service apps
Salesforce.com is planning to add a series of mobile applications to its Service Cloud line of customer service software, in a response to the rampant rise of mobile devices both in the consumer and business worlds. Read More

Hortonworks brings Hadoop to Windows
Hortonworks is bringing the popular open-source Apache Hadoop data processing platform to Microsoft shops. Read More

 
 
 

SLIDESHOWS

13 of the biggest security myths busted

13 myths about information-technology security you'll hear but should you believe?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. If Apple had unveiled Google Glasses ...

2. Google fixes 22 flaws in Chrome, slams silent add-ons

3. Cisco virtual router targets the cloud

4. iPhone 6 rumor rollup for the week ending Feb. 22

5. How successful are the companies behind the biggest Linux distros?

6. Why Android 4.2.2 is an important update

7. Microsoft Azure overtakes Amazon's cloud in performance test

8. Cisco brings server virtualization to the branch office

9. How Arista Networks got out in front of the SDN craze

10. Cisco, Avaya feel the heat from Microsoft Lync

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment