Tuesday, March 01, 2011

Is VoIP too secure?

Verizon to offer cloud-based unified communications | The 6 biggest misconceptions about IPv6

Network World Wide Area Networking

Forward this to a Friend >>>


Is VoIP too secure?
It's hard to imagine, but roughly 10 years ago as VoIP was being rolled out corporate networkers were quite concerned about the security of VoIP. As we faced a move from voice going over a traditional (and, by the way, unencrypted) network, there was concern that VoIP would be much too easy to eavesdrop on - especially if it traversed the Internet. Read More


WHITE PAPER: Brocade

6 Questions to Ask about Virtual Data Centers
Organizations can control risk and reduce costs by choosing a cost-effective, phased network architecture upgrade that enables new levels of application flexibility and business agility. Discover how they accomplish this in this informative whitepaper. Read now!

WEBCAST: Infoblox

Automation Gives IT Network Stability
On this webinar, IT staff at Children's Hospital of Philadelphia will discuss how the hospital is using Infoblox network automation products to deliver "Life Critical" Network Uptime, augment current HIPAA strategies & simplify tasks. Register Now

Verizon to offer cloud-based unified communications
Verizon is getting set to offer its customers unified communications services that can include presence information, instant messaging, videoconferencing and fixed-mobile call handoffs through a Cisco Systems-based cloud infrastructure. Read More

The 6 biggest misconceptions about IPv6
For 15 years, Internet engineers and policymakers have been publicizing the need to upgrade the 'Net's current addressing scheme -- known as IPv4 -- to handle the network-of-network's explosive growth. Yet many U.S. CIOs and CTOs continue to harbor misinformation that they use to justify why they are not adopting the next-generation IPv6 standard. Read More


WEBCAST: Cisco

Mobile Powerplay: Secure, High Performance, Unified
The mobile revolution is here—and here to stay. iPhone, iPad, Droid--employees bring their mobile devices into the workplace, and they want access to personal and professional information. This brings a new set of concerns for IT and the business: IT needs to ensure that the corporate network and the access remains secure. Register Now

Waiting for Terabit Ethernet? Don't hold your breath.
Despite the fact that Facebook famously said that it needs Terabit Ethernet, the wait for the technology could last years, experts say. Read More

Cisco upgrades its video portfolio
Cisco Thursday unveiled new equipment top help large companies create and distribute videos. Read More


WHITE PAPER: Alcatel-Lucent

A Strategic View of Application Converged Networks
Access real-world lessons learned to help you successfully deploy a converged network. See how your technology choices can reduce complexity and costs while helping guarantee your convergence project's success. Read now

100G Ethernet stays pricey as speed needs soar
Virtualization, video and massive amounts of data are all driving enterprises and service providers toward 100-Gigabit Ethernet, but the cost of the fledgling technology remains prohibitively high and few products have been installed, industry observers said at the Ethernet Technology Summit. Read More

Google scrambling to restore Gmail to 150,000 users
Problem reset accounts and wiped out everything users had storedGoogle engineers continue to work this morning to restore Gmail accounts to the about one-tenth of one percent of users who found all their stored data had gone missing yesterday. From Mashable: About 150,000 Gmail account holders woke up to a nightmare this morning, with all their e-mail, attachments and Google Chat logs gone. What happened? Read More

20 awesome tech products at DEMO
Build-your-own iPhone and Android apps, cloud services, photo tools and more on display at DEMO Spring 2011. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

When IT professionals cheat
We asked 200 IT professionals to tell us how often IT workers cheat on certification exams, buy fake gear or illegally share software. Here are the results.

Tech 'firsts' that made a President's day
From the first presidential steamboat ride to the introduction of electricity in the White House to Obama's famous BlackBerry, our nation's commanders in chief have always enjoyed the privilege of being exposed to technology's cutting edge -- even if they haven't always embraced the opportunities.

MOST-READ STORIES

  1. IT graduates not 'well-trained, ready-to-go'
  2. Playing around with tracking protection in IE9
  3. The 6 biggest misconceptions about IPv6
  4. Fake online 'girlfriend' bilks $200,000 from Illinois man
  5. How to turn Chrome into gold
  6. Canonical overrides Banshee team's decision
  7. Google scrambling to restore Gmail to 150,000 users
  8. 802.11u: Wireless 'superglue'?
  9. Pay no attention to that widget recording your every move
  10. Juniper leapfrogs Cisco with QFabric data center product blitz

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wide_area_networking_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: