Friday, October 18, 2013

Cisco says controversial NIST crypto – potential NSA backdoor -- 'not invoked' in products

Cisco raises Catalyst switch prices by up to 67% | ONF looking northbound

Network World Cisco

Forward this to a Friend >>>


Cisco says controversial NIST crypto – potential NSA backdoor -- 'not invoked' in products
Controversial crypto technology known as Dual EC DRBG, thought to be a backdoor for the National Security Agency, ended up in some Cisco products as part of their code libraries. But Cisco says they cannot be used because it chose other crypto as an operational default which can't be changed. Read More


WHITE PAPER: F5 Networks

Application Performance in a World of Cloud and Mobility
Cloud, mobility, and networking have shifted the dynamics of application performance. As a result, IT is under more pressure than ever to improve application performance. Learn how to ensure that employees and customers can access applications effectively without being forced to expend more resources on network upgrades. Read more >>

WHITE PAPER: Riverbed Technology

Path Selection Infographic
Path selection technology provides the ability to re-direct select traffic and application flows through alternate WAN routes based on service metrics, such as path availability and priority. View Now

Cisco raises Catalyst switch prices by up to 67%
Cisco is raising the price on older generation Catalyst switches in an effort to prod users into buying newer gear. Read More

ONF looking northbound
The Open Networking Foundation, a user-driven organization defining and promoting OpenFlow-based software-defined networks, has established a working group to define a "northbound" API between SDN controllers and applications. Read More


WHITE PAPER: Motorola Solutions Inc.

What You Need to Know About 802.11AC
The first standard wireless LANs emerged at 1Mbps and 2Mbps to serve niche applications such as warehouse picking, inventory scanning and, in office buildings where mobility wasn't a requirement, cordless PC connections aimed at lowering cabling costs. Fast forward through several WLAN generations to today, and the story has completely changed. Learn more.

How Avaya's Aura CE is impacting the communications-enabled app market
Doesn't it seem like the UC industry has been talking about a world of communications-enabled applications for over a decade now? This is where in-house developers and independent software vendors (ISVs) will drop UC features into business applications to create new business processes and the companies that build them get a significant jump on the competition. Almost everyone I talk to agrees this... Read More

SDN Adoption Puts DevOps Pros in High Demand
The shift toward network automation and virtualization offered by Software Defined Networks will increase demand for DevOps professionals. If you have both technical expertise and business acumen, you may soon have new IT career options. Read More


WHITE PAPER: HP

Unleash the full potential of BYOD with confidence
Growing numbers of smartphones and tablets are pushing enterprise networks to the limit and creating security and management challenges for IT organizations. This white paper reviews BYOD administration, performance, and security implications, and describes how the HP BYOD solution lets you realize all the benefits of BYOD, with confidence. Learn more.

10 old-school IT principles that still rule
These graybeard IT tenets still reign -- when applied in their modernized guise Read More

World's craziest Halloween coffins
From KISS caskets to lions and airplanes, a plethora of burial boxes populate the world Read More

The 9 hardest things programmers have to do
Software developers have all sorts of hard tasks - most of which don't involve writing code Read More

The unsung women of technology
Sure, you've heard of Ada Lovelace and Grace Hopper. But how about Frances Allen, Deborah Estrin or Radia Perlman? Read More


SLIDESHOWS

8 most interesting tech gadgets of 2013

Here's a list of the eight most significant tech gadgets released to date. These aren't necessarily the best selling or most popular, but each stands out for one reason or another.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Remarkable reunion made possible by Google Earth

2. Yes, indeed, Yahoo has that Y3K problem under control

3. 20 must-see products at DEMO 2013

4. Dexter malware kills again

5. Ethernet's 400-Gigabit challenge is a good problem to have

6. 12 drones to own

7. Most parents allow unsupervised Internet access to children at age 8

8. The unsung women of technology

9. Alcatel-Lucent challenges Cisco, Brocade unified access

10. With Windows 8.1, Microsoft seeks redemption of bold, flawed OS redesign


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment