Friday, October 14, 2011

Gasp! Cisco and HP collaborate on blade switch

  iPhone 5 rumor roll-up for the week ending Oct. 14 | 10 tech-centric MBA programs
 
  Network World Daily News PM

Forward this to a Friend >>>


Gasp! Cisco and HP collaborate on blade switch
Perhaps it's a matter of keeping your friends close but your enemies closer: Bitter data center and networking rivals Cisco and HP collaborated to develop a switch for HP's blade server systems to address the needs of joint customers. Read More


WHITE PAPER: NetGear

10 Things to Know Before Deploying 10GB Ethernet
NETGEAR ProSafe™ Managed Switches are ideal for cost-sensitive organizations considering 10 Gigabit Ethernet for Top-of-Rack and Aggregation applications. They help growing companies support rising bandwidth requirements, new applications, and the demands of a fast-paced business environment. Read Now

WEBCAST: Quest Software

Data Protection for Data Growth
Today's unprecedented growth in data - and the need to protect it - means you must find an effective, inexpensive to backup and potentially recover your company's data! In this Quest Software on-demand video, learn how to develop and manage a flexible backup and recovery strategy. Watch it today. View Now!

iPhone 5 rumor roll-up for the week ending Oct. 14
While many in the iOSsphere are preordering the relentlessly familiar new iPhone 4S in record numbers, and standing in the rain to buy one today, many others simply wait. They know, they just know, that the iPhone 5 is out there. Calling to them. Read More

10 tech-centric MBA programs
See what kinds of IT classes MBA students can take to earn an IS concentration Read More

Security roundup: Steve Jobs, Apple and IT security; DDoS attacks against VoIP; a hot week for SIEM
This week the respectful thoughts of many turned to Steve Jobs, the legendary co-founder of Apple, who passed away at the age of 56. When it comes to security, Apple computers were remarkable for the kinds of troubles they largely didn't have in comparison to Microsoft-based computers with their high rate of enterprise adoption that the Apple Macintosh never achieved. Microsoft operating systems and applications over time have been relentlessly targeted by attackers if only because Microsoft products constituted a large field of malware opportunity due to their huge market acceptance, plus the number of vulnerabilities discovered in them month after month. Read More

PCI Should Focus on the Real Problem
I had a very enjoyable argument with my friend and colleague Nathan Clevenger at Interop on the subject of local apps vs. applications hosted in the cloud. Read More


WHITE PAPER: Citrix Systems

Windows 7 Migration Made Easier with Desktop Virtualization
Windows 7 presents both an opportunity and a challenge for enterprises and their IT organizations. . Unless IT can simplify the adoption process, the enterprise faces potential long term disruptions to IT and end users alike. Read this whitepaper to learn how desktop virtualization offers a better way forward. Learn More

iPhone 4S huge draw for current iPhone owners
As the new iPhone 4S goes on sale today, owners of earlier Apple smartphone models are expected to make up the bulk of buyers, with surprisingly strong interest shown by iPhone 4 owners even though some number of them have months left on their current contract. Read More

Researcher uses Google Earth to track India's nuclear program
The Institute for Science and International Security in Washington has used imagery from Google Earth to arrive at the conclusion that India may be constructing a gas centrifuge plant for uranium enrichment for military purposes, reinforcing Indian fears that Google Earth can be misused to compromise national security. Read More

Office 365: Non-Profit Moves to Cloud for Global Relief
NetHope, a consortium of IT leaders serving humanitarian agencies, has been keeping things in-house with Sharepoint for years. But a recent move to the cloud via Office 365 is freeing up IT staff and allowing agencies to better share information. Read More

Social Security agency leaks thousands of SSNs every year, report says
The Social Security Administration puts thousands of Americans at risk of identity theft each year by accidentally leaking their Social Security Numbers and other data, according to an investigative report by the Scripps Howard New Service. Read More


WHITE PAPER: HP

Reducing Network Complexity
In this white paper you will learn about the challenges associated with conventional switch solutions; the advantages of HP's Intelligent Resilient Framework (IRF), and the very real business benefits that can result from installing HP A-series switches that employ this technology. Read now

An annotated guide to iFixit's iPhone 4S tear-down
The people at iFixit, who love screwdrivers more than gadgets, Friday walked us through a dissection of the Apple iPhone 4S, which goes on sale today. Read More

Apache asserts OpenOffice stewardship
Despite the growing momentum of the LibreOffice fork of OpenOffice, the Apache Software Foundation (ASF) is urging the community of volunteer developers to rally around the OpenOffice code base as the canonical version of the open source software suite. Read More

iPad vs. everyone (NOTE: Must register to read)
Apple's iPad 2 continues to dominate the tablet market, a market it essentially created on its own, though many competitors have arisen to try to knock off the king of the hill. Read More

Macworld: A conversation with Siri on the iPhone 4S
Macworld's Jason Snell talks with the iPhone 4S's new Siri technology. Read More

 
 
 

SLIDESHOWS

26 helpful open source network management tools
Over the last decade or so, open source development has skyrocketed, and network management software has ridden that wave. Many frustrated IT administrators have turned to free tools to monitor, configure and map their networked devices. Here are 26 examples of open source network management software tools to help you do your job.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Should tech pros get an MBA?
  2. 2011 tech industry graveyard
  3. Vint Cerf on Google's privacy practices
  4. Dennis Ritchie, father of Unix and C programming language, dead at 70
  5. Did FBI tail terror suspect using Wi-Fi called 'FBI Van 1'?
  6. Many users complain of broken iOS5 upgrade process
  7. 2012 IT budgets, salaries on the rise, survey says
  8. Oh Siri, you so silly!
  9. Of Cisco, Citrix, VMware and WAAS
  10. Computer infected? Blame yourself, Microsoft report concludes
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment