Monday, May 04, 2009

Juniper bolsters router, switch lines; Sprint still losing money; Open source shakeup in routers?

Emulex rejects Broadcom's hostile takeover bid; Open Souce Shakeup In The Routing Marketplace?
Network World logo

Daily News PM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by Dell
rule

Why virtualization? Why now?
In this video, our speakers tackle these questions, explaining how virtualization technology has become more mainstream. Businesses are under pressure to ease management and reduce costs, while retaining and enhancing competitive advantages, such as flexibility, reliability, scalability and security. Watch now to see how virtualization can help address these demands.

rule

Spotlight Story
Juniper bolsters branch router, switch lines

Jim Duffy By Jim Duffy
Juniper Networks this week will extend its branch office line with routers and switches designed to enable remote workers to securely access enterprise resources at lower cost. Read full story

Related News:

News podcast: Network World 360The owner of an obscure Illinois software development company is suing Google and everyone else in the Open Handset Alliance over their use of the word "Android." Also, HP ProCurve is adding a security blade to edge and core switches that enables businesses to insert firewalls, VPNs and intrusion-prevention systems wherever they have one of the switches. (5:11)

Emulex rejects Broadcom’s hostile takeover bid
Emulex has rejected a hostile takeover bid from Broadcom for the second time this year, saying a $764 million offer "significantly undervalues" the company.

Sprint still losing money despite prepaid wireless boost
Despite seeing a surge in prepaid wireless subscribers last quarter, Sprint continued to hemorrhage money and posted a net loss of $594 million.

Open Souce Shakeup In The Routing Marketplace?
The enterprise world is increasingly familiar with the concept of open source, and its acceptance is quickly gaining steam. We have heard of open source operating systems, telephony platforms, productivity software... and the list continues. Now, IT budgets are tightened, forcing decision makers to look at more cost-effective alternatives. Even core network infrastructure systems are being shifted to open source solutions.

BlackBerry Enterprise Server 5.0 now available
Research in Motion's latest version of its BlackBerry Enterprise Server, which features a Web-based interface for device management, is now available.

Do We Still Need Software Defined Radio?
I've written a bunch of articles over the years on software-defined radio (SDR), which is essentially the art of building electronics that can mimic a particular radio technology via software running on appropriate high-performance or otherwise specialized processors. The idea has obvious appeal - imagine a handset that can be a CDMA, GSM, LTE, Wi-Fi, DVB-H (or other digital broadcast), Bluetooth, or whatever radio, just by firing up the appropriate code on a common hardware platform. Pretty cool, huh?

Google hires 200 ... goats
Landscapers with lawn mowers need not apply. Google's decided to employ 200 goats to keep the brush surrounding its Mountain View, Calif., headquarters in check, and the move further underscores the company's commitment to opting for green solutions whenever possible.

iPhone crushes competition in customer satisfaction survey
When Steve Jobs introduced the iPhone at Macworld 2007, he said that Apple was motivated, in part, by the fact that most people hated their cell-phones. It's been 2 years since the iPhone first hit the market, and true to form, Apple has in fact delivered a phone that customers actually enjoy using, and some might say, can't live without.

Critics argue against a White House security lead
Critics raised questions last week about the growing chorus of calls for the White House to play a leading role in coordinating cybersecurity efforts involving the federal government and key private-sector industries.

Cloud security will supplant patching, says report author
Patching alone will never solve the long-running headache of insecure software, the author of the influential Laws of Vulnerability 2.0 report has said.

Web filters threaten national security
Internet heavyweights have attacked the federal government's Internet content filtering plans and claimed it opens vulnerabilities that could threaten national security.

Today on Google Subnet
The No. 1 way to love yourself more: Use Google!; Hulu may get Disney, but YouTube helps deliver babies; Google hires 200 ... goats; Monetizing 'Droids: OEMs and remixes; and Kaila Colbin posits: Is Google getting too big to fail?


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Dell
rule

Why virtualization? Why now?
In this video, our speakers tackle these questions, explaining how virtualization technology has become more mainstream. Businesses are under pressure to ease management and reduce costs, while retaining and enhancing competitive advantages, such as flexibility, reliability, scalability and security. Watch now to see how virtualization can help address these demands.

rule

Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

05/04/09

Today's most-read stories:

  1. Illinois programmer sues Google over "Android"
  2. Why mix Bluetooth with Wi-Fi?
  3. Use the Cisco restroom at your own risk
  4. Is it time to cut the Ethernet access cable?
  5. Some IT skills see pay hikes during downturn
  6. Juniper bolsters branch router, switch lines
  7. LexisNexis says its data was used by fraudsters
  8. Who's on deck to replace Cisco's Chambers?
  9. Microsoft aligning management, clouds
  10. Eliminate network gear maintenance fees to save big money
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment