Tuesday, August 18, 2009

How to build a 100,000-port Ethernet switch; 10 sports technologies to love and 5 to hate; DNS 'blacklist' unveiled

10 sports technologies to love and 5 to hate; DNS 'blacklist' unveiled
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Certeon
rule

Global Media on Virtualization
In this whitepaper learn why Global Media Company has made a strategic decision to embrace a virtualization strategy and has made a significant investment in WAN acceleration for SharePoint, Microsoft's enterprise content management (ECM) and collaboration technology. See how Certeon's aCelera virtual appliance for WAN acceleration and optimization can save you 60% in capital and operations TCO over proprietary hardware solutions, while reducing your application response time to remote users by 95%.

Global Media on Virtualization

rule

Spotlight Story
How to build a 100,000-port Ethernet switch

University of California at San Diego researchers Tuesday are presenting a paper describing software that they say could make data center networks massively scalable. Read full story

Related News:

10 sports technologies to love and 5 to hate
Technology is changing the way fans watch and interact with sporting events. In some cases it's changing the sports themselves.

DNS 'blacklist' unveiled
Nominum plans to announce on Tuesday a novel DNS security capability that functions like a spam blacklist, providing automated, real-time checking of DNS queries against a list of Web sites that are known to be malicious.

Account Password Reset Procedures a Joke
When I logged into one of my online accounts today it said it was locked out and I needed to call to get it reset. You won't believe what happened next.

Palm Pre readies app store e-commerce beta test
Palm is about to launch a beta test of an online system for selling and buying webOS applications. That means the "end of free" for Palm Pre users.

Qwest Wireless customers have two months to switch to Verizon
Qwest Wireless customers were told Tuesday that they have two months to switch their service to Verizon before their own service ends.

Ericsson President and CEO has no fear of competing with mighty Cisco
Totally unflustered by the probing questions asked in regard to Cisco competing against Ericsson during the following video interview, Ericsson President and CEO Carl-Henric Svanberg makes some revealing statements about Cisco's lack of prowess in the carrier space.

Motorola boosts wireless network security
Motorola Tuesday said it is adding vulnerability assessment to its wireless intrusion-prevention system (IPS) device so that organizations can scan for security holes in Wi-Fi and wireline networks.

John Gruber: How Android can (finally) beat iPhone
John Gruber has stuck his neck out again at his Daring Fireball blog, this time with a post offering advice to Google and especially to Android device makers on how challenge successfully the iPhone.

Start-up DroidSecurity tackles Google Android security
Start-up DroidSecurity is developing consumer and enterprise security software for the Google Android operating system, with its first offering a consumer-oriented antivirus and phone-tracking suite for Android smartphones.

FTC's electronic health record breach rule sparks debate
Trying to get a handle on what most certainly will be an explosion of digitization of medical records the Federal Trade Commission today issued the final rules requiring "certain Web-based businesses to notify consumers" when the security of their electronic health information is breached.

Juniper's enterprise attack is making progress
Juniper today trumpeted the fact that its EX Series Ethernet Switches have posted four consecutive quarters of revenue growth through 2Q09. Its EX series has surpassed one million ports shipped, according to the most recent Dell'Oro Ethernet Switching Market Report.

The day the blogging stopped
On Tuesday, 1,370 Japanese stopped blogging and Twittering. There's perhaps nothing unusual about that; after all, hundreds give up social media efforts every day. But for these people the halt to their online activities has been brought on by the law.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


Cool BlackBerry games
Black HatBlackBerries are known for e-mail, but they are also getting better at mobile games. Here are 10 of the best.

Google facts
IT quizTake this quiz to see how well you know the company – and no fair googling the answers.

Effectively Supporting Consumer-Owned Smartphones
Resolve Smartphone downtime incidents quickly by sharpening your approach to mobile device management. In this whitepaper Osterman Research clearly explains which Smartphones are being used, how IT shops are managing these devices and how the heterogeneous nature of the market is causing more complexity for IT professionals.
Learn More


Why You Need Citrix Essentials for Hyper-V
Citrix Essentials for Hyper-V adds advanced capabilities to Hyper-V to create, integrate, manage and automate virtual datacenters at half the cost of other solutions. Simply add Citrix Essentials for Hyper-V to your existing Hyper-V implementation to gain powerful new capabilities for your virtualization infrastructure.
Click here to learn more.

 

August 18, 2009

TOP STORIES | MOST DUGG STORIES

  1. Apple disasters
  2. Account password reset procedures a joke
  3. FAQ: How to get Windows 7 on the cheap
  4. When Apple flops: The worst products of all time
  5. Port 666
  6. Buy Guitar Hero 5, get GH Van Halen early
  7. Microsoft planned to bury XML developer, says federal judge
  8. How to build a 100,000-port Ethernet switch
  9. The greatest open source software of all time
  10. The 10 most idiotic iPhone apps

Perfecting your Disaster Recovery Strategy
How fast can you recover data in the event of a disaster? Optimize your backup and disaster recover strategy with this Executive Guide. Get expert tips and recommendations in this collection of in-depth articles from Network World and its sister publications.
Learn More



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: