Friday, May 30, 2014

Chambers is giddy about IoT, and other takeaways from Cisco Live 2014

China accuses Cisco of supporting US cyberwar efforts | The hot tech of the cool White House Science Fair

Network World Cisco

Forward this to a Friend >>>


Chambers is giddy about IoT, and other takeaways from Cisco Live 2014
Cisco Live 2014 gave a glimpse into what has the networking giant excited for the future. Read More


WHITE PAPER: Network Instruments

Survival Tips for Big Data's Impact on Network Performance
Big Data projects slam network performance. This paper offer survival tips to prepare your network before the Big Data projects hit, not after. Learn how to monitor and manage network performance for bandwidth, consistent low latency, scalable storage, processing power and security. Learn More

WEBCAST: Network Instruments

5 Best Practices for Optimizing UC Monitoring
This webcast discusses five best practices on how to successfully optimize and manage UC, as well as how to gain clear picture of overall performance and quickly troubleshoot when the inevitable issues arise. Learn More

China accuses Cisco of supporting US cyberwar efforts
China is attacking secret surveillance programs of the U.S. government with harsh words from its state-controlled press, accusing Cisco of helping the U.S. in cyberespionage. Read More

The hot tech of the cool White House Science Fair
Robots, unique apps, virtualization all part of annual White House Science Fair Read More


WHITE PAPER: Intigua

Systems Management Virtualization
Discover how virtualizing the management layer, by de-coupling agents from the underlying server infrastructure, eliminates the need to install physical agents on servers and makes ongoing management tasks such as provisioning and updating agents as simple as copying a single "virtual agent" file to all required servers. Read more. Learn More

Security Threat Landscape: May 2014
Security Threat Landscape: May 2014 In this month's episode, Keith Shaw (IDG Enterprise) and Derek Manky (Fortinet) discuss the BlackShades arrests, ransomware updates, new evasion techniques and other security threats seen this month. From: Network World Views: 1 0 ratings Time: 19:01 More in Science & Technology Read More

How MIT and Caltech's coding breakthrough could accelerate mobile network speeds
What if you could transmit data without link layer flow control bogging down throughput with retransmission requests, and also optimize the size of the transmission for network efficiency and application latency constraints? Read More


WEBCAST: Brocade Communications

IT Agility: How Do You Stack Up?
Are you faced with increasing pressure to deploy technology faster? You're not alone. This year, over half of enterprises will be prioritizing building a private cloud, a concept introduced less than five years ago. View Now>>

Is Cisco Back (as an enterprise security leader)?
It wasn't too long ago that Cisco was a dominant force in information security technology. The company was a market leader in firewalls, IDS/IPS, and email security and was actively pushing products for endpoint security and SIEM as well as security "blades" for Catalyst switches. Heck, Cisco even articulated a bold vision of "self-defending networks" with security policy, enforcement, and intelligence... Read More

13 hot new open source projects
Open source projects are a great barometer of the tech industry. While companies take time to establish themselves and venture capitalists take months to decide where to place their bets, open source software takes just one programmer and a public repository. If the programmer has a fast Internet connection and the project is small, it only takes seconds for the world to see yet another possible branch in technology's evolution. Read More

Cisco Live lives it up at 25
It started with a sobering declaration and ended with what for some was an inebriating party. Read More


SLIDESHOWS

10 biggest CEO pay raises

Which tech leaders received the most generous pay hikes in 2013?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. The Top 11 Cities for Technology Careers

2. Gartner: Amazon runs away with IaaS cloud Magic Quadrant; Microsoft catching up

3. Hacking Windows XP to get security patches is a really bad idea

4. 10 IT security risks that small businesses can't afford to ignore

5. Juniper, Palo Alto settle long-running firewall patent lawsuits

6. Registry hack enables free Windows XP security updates until 2019

7. Outage caused by single admin mortifies cloud provider Joyent

8. A major mystery behind Microsoft's 'brain-like' speech-to-speech translator

9. 20 best iPhone/iPad games of 2014

10. Teach your router new tricks with DD-WRT or OpenWrt


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment