Monday, October 05, 2009

For sale: Cisco data center rival Brocade; 10 seriously ridiculous hacks

10 Seriously Ridiculous Hacks; Virtualization: Tips for avoiding server overload
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Sunbelt Software
rule

Protecting Against the New Wave of Malware
This white paper examines why older, traditional antivirus approaches don't work and why a new approach to endpoint security is required to better protect your company from malicious threats. Learn about the scope of the malware problem and strategies that can help you defend against evolving threats.

Learn More

rule

Spotlight Story
For sale: Cisco data center rival Brocade

Brocade has reportedly put itself up for sale, a development that portends significant consolidation within the data center IT industry. Read full story

Related News:

10 Seriously Ridiculous Hacks
Use a rubber band to hold your phone on your head? Why not? But we'd caution against stringing an extension cord to the swimming pool to power your gadgets.

Virtualization: Tips for avoiding server overload
As virtualization stretches deeper into the enterprise to include mission-critical and resource-intensive applications, IT executives are learning that double-digit physical-to-virtual server ratios are things of the past.

News podcast: Network World 360
PayChoice confirmed that its online payroll systems operations were breached on Sept. 23 and is now beginning to offer details on what it thinks may have happened. Microsoft is changing up the next version of its System Center Configuration Manager so instead of managing devices it will manage users and their activities across multiple devices. (5:10)

Hackers plan to clobber the cloud, spy on Blackberries
A new era of computing is on the rise and viruses, spies and malware developers are tagging along for the ride.

Google Tries New Ploy to Challenge IE's Dominance
Google has unveiled a plug-in that embeds its Chrome browser into Microsoft's Internet Explorer, indicating that it isn't throwing in the towel on the browser business.

New Firefox security technology blocks Web attacks, Mozilla claims
Mozilla has released a test build of Firefox that adds new technology, dubbed "Content Security Policy," that's designed to stymie most Web-based attacks, the browser maker said.

Vonage App Brings VoIP to Blackberry and iPhone
Vonage is expanding its horizons beyond delivering VoIP over broadband Internet, and hoping to expand its customer base and revenue at the same time. The new app from Vonage allows Blackberry and iPhone users to place cheaper international calls from their mobile phones. It also highlights the shifting competitive landscape between previously separate technologies.

Hacker leaks thousands of Hotmail passwords, says site
More than 10,000 usernames and passwords for Windows Live Hotmail accounts were leaked online late last week, according to a report by Neowin.net.

Ready for Windows 7? Here's how to deploy it right
Windows 7 is right around the corner. The official release date is Oct. 22, but some PC makers will ship it before then. Most businesses skipped the poorly received Vista, choosing instead to run the now eight-year-old XP. So after holding off on a Windows upgrade for so long, many are no doubt ready to adopt Windows 7.

How to stop IT managers from going rogue
Nearly half of all data breaches come from inside an organization, which is why industry watchers say enterprise IT departments need to invest in technology that ensures no one person has all the power.

DDoS attack against Bitbucket darkens Amazon cloud
A crippling DDoS attack over the weekend against open-source hosting service Bitbucket and Amazon's EC2 service has questions being raised about the speed and effectiveness of Amazon's response to the emergency, as well as the general reliability of cloud services.

WAN optimization is not the only option
Although nearly three-quarters of organizations Nemertes benchmarks are using WAN optimization in some capacity, it is not the only choice for addressing performance problems on the WAN, such as might arise with use of UC on those links.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

4G Ahead! A new world of enterprise mobile broadband
This white paper defines 4G, examines the two leading 4G technologies, and discusses their various features, benefits and the progress of each technology to date. It concludes with a recommendation for companies considering future 4G deployments, and iPass' position.
Click here for all the details.


NetScaler VPX: Harness the Power of Virtualized Web App Delivery
Want to make your Web app delivery more flexible, dynamic and cost effective? Then attend this exclusive technical seminar which shows you how Citrix NetScaler VPX - a virtualized app delivery controller appliance - can improve your network infrastructure by offering: increased physical, functional, and operational flexibility for delivery of all of your Web apps and more.
Click here to register today.

 

October 05, 2009

MOST-READ STORIES

  1. Apple may take Woolworths to court over similar logo
  2. Good and wicked cool mobile, wireless companies to watch
  3. Ig Nobels honor Tequila diamonds, bra that converts to gas mask
  4. FBI warns of social networking fraud, malware escalation
  5. Cisco's struggle to move TelePresence down market prompts buyout
  6. Cisco releases IOS 15.0
  7. Microsoft turning configuration management "on its side"
  8. Vonage apps brings VoIP to BlackBerry and iPhone
  9. Verizon CTO: 'We told you so' about FiOS
  10. ICANN studies secretive domain owners

Managed Security for a Not-So-Secure World
Today's risky data environment, which has seen 213 data breaches in the first five months of 2009, is colliding with an IT landscape of shrinking resources. This paper explains how an IT and security service provider can provide a practical, manageable and reliable solution.
Read More



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment