Friday, August 29, 2014

Physical Layer management in 10G to 40G/100G Ethernet migration

  Juniper CEO on IoT, co-creation and the IOP | Three security practices that IoT will disrupt

 
  Network World Cisco  

Physical Layer management in 10G to 40G/100G Ethernet migration
  The ability to migrate from 10G to 40G or 100G Ethernet (GbE) hinges on knowing the particulars about your data center backbone. If you don't know the length of the circuit, connector style (LC, 12 or 24 fiber MPO) or the fiber type (OM2, OM3, OM4, SM, etc.), you don't know if it will support the higher speeds. While this type of information is rarely collected, Physical Layer Management (PLM) systems can fill in the blanks. Read More
 


WHITE PAPER: Red Hat

Modernize Your IT Infrastructure & Streamline Operations
Increasing line of business demands? Shrinking IT budget? See how Red Hat can help you meet growing. Read Now

WHITE PAPER: OPSWAT Inc.
 
Secure the Use of Portable Media in Critical Infrastructure
Securing critical infrastructure is crucial to ensuring that our current way of life is sustained. Our whitepaper provides insight into the development of strong security policies around the use of portable media, and how to effectively mitigate the threat from external sources. Learn more

Juniper CEO on IoT, co-creation and the IOP
An Internet of Things is much more than simply connecting things to thing or data to devices, argues Juniper CEO Shaygan Kheradpir; it should include the ability to inform users on why things are happeneing and then take appropriate action, such as reconfiguring itself to address or correct the situation.To read this article in full or to leave a comment, please click here Read More
 

Three security practices that IoT will disrupt
As the field of IoT devices continues to grow, so do the threats to well-established security practices Read More
 


WHITE PAPER: SugarCRM

CRM's Dirty Little Secret: How to Avoid CRM Sticker Shock
When making a CRM decision, it is important to ensure your deployment will not be hit with hidden fees or other extra costs that reduce the return on investment. This study reveals the total cost of ownership (TCO) among the three leading midmarket CRM solutions. View Now>>

Vulnerabilities on the decline, but risk assessment is often flawed, study says says
  Based on data gathered over the first six months of 2014, security researchers from IBM X-Force predict that the number of publicly reported vulnerabilities will drop to under 8,000 this year, a first since 2011.While the majority of flaws disclosed so far fall into the medium-risk category, the IBM researchers said that the widely used system to rate their severity often fails to reflect the real risk they pose to users.Over the first half of the year, the IBM X-Force team collected reports about 3,900 security vulnerabilities from advisories published by software vendors, security industry mailing lists and other sources. If vulnerability disclosures continue at the same rate, the number of flaws reported in 2014 will fall under 8,000, several hundred less than in each of the previous two years, the team said in a report released this week.To read this article in full or to leave a comment, please click here Read More
 

VMware calls new "hyper-converged" system a building block for software-defined data centers
SAN FRANCISCO – VMware this week unveiled at its VMworld event the first in a family of "hyper-converged" systems, a product called EVO:RAIL that it says will help customers build software-defined data centers. The product combines compute, network and storage functionality in a single appliance, and comes in a standard 2U form factor with four nodes. + MORE VMWORLD: VMware takes its best shot at the cloud | Hot products from VMWorld 2014 +To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: OpenMarket

How CIOs Can Guide the Enterprise to Mobile Success
In this paper we look at the new, front-line role of IT and security, specifically within enterprises using mobile messaging technologies, and suggest ways to mitigate risk and avoid costly mistakes and pitfalls. View Now>>

It's time for the Internet of Things to get serious
The Internet of Things is a really, really big deal; so why do all the demos seem so trivial? Read More
 

Toss routers with hardcoded passwords, expert says
Sometimes it is best to toss security-challenged technology, and that's the recommendation experts are giving to small businesses using a flawed router from a China-based manufacturer. Read More
 

 

SLIDESHOWS

12 oddball odes to open-source

Hey, I just met you / and this is crazy / but here's my pub key / so msg me maybe.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. 15 simple, secret Windows tips and tricks designed to save

2. 11 Internet of Things ideas worth watching

3. Is massive DNS hack responsible for Charter Internet outage?

4. How Google Fiber is disrupting the broadband

5. Internet of Overwhelming Things

6. Hot products at VMworld 2014

7. Google fires back at Microsoft's claims of 785 returning cloud customers

8. 21 Weird and Wacky Wearables You'll Actually Want

9. Customers praise Microsoft's 'no BS' explanation of cloud service outage

10. One frustrating Linux problem that Windows, Mac users don't deal with

JOIN THE IDG CONTRIBUTOR NETWORK

The IDG Contributor Network is a collection of blogs written by YOU -- leading IT practitioners -- about the technology, business opportunities and challenges you face everyday. We invite you to become a contributor or participate by joining the conversations your peers spark.

Apply now to become a member


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment