Wednesday, February 27, 2013

West Virginia auditor blasts Cisco, state for "oversized" router buy

  Entrusting Cisco could cost you | When did you learn how to code?
 
  Network World Cisco

Forward this to a Friend >>>


West Virginia auditor blasts Cisco, state for "oversized" router buy
West Virginia wasted millions in federal grant money when it purchased 1,164 Cisco routers for $24 million in 2010, a state audit concluded. A report issued this month by the West Virginia Legislative Auditor found the state used a "legally unauthorized purchasing process" when awarding the router contract, paid for with federal stimulus funds, to Cisco. The auditor also found Cisco "showed a wanton indifference to the interests of the public" in recommending the investment in its model 3945 branch routers, the majority of which were "oversized" for the requirements of the state agencies using them, the report stated. Read More


WHITE PAPER: Riverbed

4 Ways WAN Optimization Can Benefit Your Organization
WAN optimization has evolved into a complete system that optimizes traffic across a broad range of most popular applications while providing deep visibility into performance. Read Now

WHITE PAPER: Ixia Anue

The Evolving Visibility Challenge
Network monitoring has become more complex over the last few years, due in large part to virtualization and convergence. Learn how a state-of-the-art monitoring system that maximizes your existing monitoring tool investment can help you attain greater visibility into your network without adding complexity. Say goodbye to virtual blind spots. Learn More

Entrusting Cisco could cost you
The State of West Virginia wasting millions by buying way more router capacity than needed; California State University saving $100 million through a competitive bid while San Jose State pays more for its own network than the entire university system through a non-bid contr Read More

When did you learn how to code?
"I think everybody in this country should learn how to program a computer - because it teaches you how to think." --Steve Jobs Read More


WHITE PAPER: HP, Microsoft & Intel

Easing the Online Overload
Many transaction processing systems have reached their capacity limits, so the time is right to consider the potential for running tier 1 mission-critical workloads on opens standards. This white paper highlights the key components of a properly structured and highly optmized SQL Server OLTP reference architecture. Read Now!

Cisco virtual router targets the cloud
The Cisco CSR 1000V router is designed for enterprise network managers who want to have a little piece of their Cisco infrastructure in the cloud. Read More

FTC: Identity theft retains its throne as No.1 worst scourge in Top 10 consumer complaint list
Identity theft has been the top consumer complaint to the Federal Trade Commission now for 13 years running. Read More


WHITE PAPER: Riverbed

End-To-End Application Acceleration Technologies
Download this 7-page survey-driven analysis by Forrester to learn how to overcome cloud-related performance issues by extending optimization to SaaS applications. Read now.

CDN Value Predictor
Any enterprise with a web audience in multiple locations can benefit from using a CDN, but if your users are likely to download lots of stuff from your website, play media files, and/or watch or listen to live broadcasts, you are likely to benefit most. The headline content types for CDN services are: Read More

Hottest products at RSA Conference 2013
Our roundup of new security products on hand at this week's show. Read More

Juniper security products use device-fingerprinting as way to detect, block attacks
Juniper Networks today rolled out a battalion of security products and services to protect corporate networks, stating that when it comes to defensive measures, security attacks can be better prevented by determining device-fingerprinting rather than blocking attacks based on IP address. Read More

Etsy gets crafty with big data
Handmade marketplace Etsy has grown to 800,000 sellers and 40+ million monthly visitors. All that activity generates enormous quantities of data, which Etsy uses to drive site improvements. Read More

 
 
 

SLIDESHOWS

10 tech company social media bloopers

Social media blunders are nothing new, and the technology industry is not immune to them.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. West Virginia auditor blasts Cisco, state for 'oversized' router buy

2. 14 dirty IT tricks, security pros edition

3. Hottest products at RSA Conference 2013

4. Microsoft admits to being hacked too

5. Hottest products at Mobile World Congress 2013

6. iPhone 6 rumor rollup for the week ending Feb. 22

7. If Apple had unveiled Google Glasses ...

8. Cisco virtual router targets the cloud

9. Samsung finally makes Galaxy S IV official

10. Why Android 4.2.2 is an important update

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment