Monday, September 12, 2011

Inside Cisco global security operations

How the iPad is changing work, and working together | Want a job? These 10 tech firms are hiring

Network World Daily News AM

Forward this to a Friend >>>


Inside Cisco global security operations
Cisco's Security Intelligence Operations (SIO) provides threat information, vulnerability analysis, and mitigation solutions to enterprise customers. Staff and resources are at work around the world, including at 11 Threat Operations Centers. Network World visited Cisco's TOC in Austin, Texas, for an inside look at how the distributed security teams come together. Read More


WHITE PAPER: BMC

Six Advantages of a Cloud-Based Help Desk
Small and midsize companies shouldn't have to use less efficient, limited-functionality service desk solutions. Today's cloud-based help desks pack the same punch as on-premise enterprise solutions, without a large up-front investment or long installation time. Read more to find out how to get started with a cloud-based help desk today. Read More Today!

RESOURCE COMPLIMENTS OF: Citrix

XenServer is FREE
Citrix XenServer is the only free, enterprise-class, cloud-proven virtualization platform available. Organizations of any size can immediately benefit from the power of server virtualization. With features such as live migration, centralized multi-server management, and shared storage support, you can't afford not to download it now – it's free! Click to continue

How the iPad is changing work, and working together
In the enterprise, the iPad seems to have a liberating effect on the way people work, and how they engage with each other. It has less to do with CPU cycles and RAM and more with the touch UI, dimensions and weight, and battery life. Here's why. Read More

Want a job? These 10 tech firms are hiring
A lot of technology companies are in the midst of hiring sprees -- in some cases looking for hundreds of new workers. Execs explain what skills they need, and where they are looking for top talent. Read More


WHITE PAPER: Kaseya

How to Launch a Successful IT Automation Initiative
In this paper, we'll look at IT automation from the corporation's perspective, and discuss the steps organizations should take before launching such an initiative. We'll hear from companies that successfully implemented computer automation platforms, what their early steps were and what they would do differently if they could repeat the process. Read now

Broadcom to pay $3.7B for comms processor maker NetLogics
Broadcom has agreed to acquire communications processor company NetLogics Microsystems for US$3.7 billion, the companies announced Monday. Read More

Tech Titans We Will Miss and Ones Better Off Dismissed
In the wake of Carol Bartz's firing from Yahoo, let's take a look at how tech CEOs' personalities and business tactics defined or are defining their companies, for good or ill. Here are 10 dynamic current and former tech CEOs, some we will miss, and others ... not so much. Read More


WHITE PAPER: Quest Software

New NetVault Backup Licensing Model
Read a report from an industry-leading analyst to see why traditional backup and recovery licensing methods no longer make sense. You'll learn how you can dramatically cut costs with a different strategy that's more intuitive, reasonable, enduring, and flexible. Download the report today. Read Now!

How long is your downtime?
It's always a fine line to walk how much you need to pad your downtime estimates. The business doesn't want to be down forever, but at the same time they get upset when you run over for whatever reason. Read More

Samsung to show a Windows 8 tablet next week, report says
Samsung reportedly will unveil a new tablet computer that runs on the Windows 8 OS next week. It would become a convenient alternative to the legally imperiled Android OS used in Samsung's Galaxy Tab computers. Read More

Anonymous supporters claim NBC News Twitter hack
Hackers calling themselves the Script Kiddies took control of the NBC News Twitter account on Friday afternoon and used it to send out a series of hoax Twitter messages claiming there was a repeat terrorist attack on New York's Ground Zero. Read More

Woman sentenced for selling counterfeit Cisco equipment
A Virginia woman gets prison time for importing counterfeit Cisco equipment. Read More



SLIDESHOWS

What do top CIOs make?
How high can a senior IT leader ascend in the ranks of a public company? High enough to rank among a company's most highly paid executives. High enough to enjoy perks such as company cars, financial planning services, and access to the corporate jet.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. ACLU: You have every right to photograph that cop
  2. Carnegie Mellon opens competitions aimed at building slick robots
  3. 9/11 anniversary: What our emergency response systems still can't do
  4. Microsoft inks licensing deals with two more Android makers
  5. OpenFlow inventor: Network provisioning will inevitably be automated
  6. Why I'm ignoring my W7 warning messages
  7. Hacker claims he can exploit Windows Update
  8. ATM hack gives cash on demand
  9. Behind the scenes of Wellesley College's desktop virtualization rollout
  10. 9/11 continues to influence IT strategy

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment