Tuesday, November 15, 2011

Arista again looks to buck Cisco, others in data center

Network World Daily News AM - Newsletter - networkworld.com
8 Amazon Kindle Fire Apps for Newbies | Sprint slashes mobile data prices

Network World Daily News AM

Forward this to a Friend >>>


Arista again looks to buck Cisco, others in data center
Arista Networks this week has rolled out four switches and enhanced software designed to address the scalability, resilience and density requirements of cloud computing. Read More


WHITE PAPER: Trend Micro

Protect Virtual Desktops
Protecting virtual servers, virtual desktops and data stored in the cloud requires security optimized for the unique characteristics of these environments. See Tolly Enteprises' Independent performance tests comparing the performance of Trend Micro, McAfee, and Symantec. Read Now

RESOURCE COMPLIMENTS OF: Palo Alto Networks

10 Things Your Next Firewall Must Do
Choosing a next-generation firewall is more than a simple comparison of technical features. It's about balancing the needs of the business with the risks associated with modern applications. Gain access to valuable information in one location- read articles and watch videos that will empower you to make the right decision. Learn More!

8 Amazon Kindle Fire Apps for Newbies
Love your new Kindle Fire tablet but unsure of what apps to use? Let us help. Read More

Sprint slashes mobile data prices
Sprint may be axing its unlimited 4G plans for most devices but at least it's making sure you pay less for what you use. Read More

Researchers find new way to hide messages in VoIP
Researchers have devised a new scheme for hiding secret data within VoIP packets, making it possible to carry on legitimate voice conversations while stolen data piggybacks on the call undetected, making its way to thieves on the outside. Read More

6 more cities getting AT&T LTE next week
AT&T is accelerating its LTE deployments and will launch its LTE services in six cities next week. Read More


RESOURCE COMPLIMENTS OF: mNext

Protect, Prepare, Profit ­ Join Us At Enterprise MobileNext
Join your peers and IDC thought leaders at Enterprise MobileNext, where speakers from Fortune 500 companies cover what matters most from securing and protecting your organization from common "BYOD" exposures to mobile enabling your sales team and beyond. Register today for your complimentary pass to Enterprise MobileNext, Nov 30-Dec 1, SF, CA Click to continue

10 ways to beat SAP at the bargaining table
It's crunch time for SAP customers and salespeople around the world, as many new software deals and contract renewals get hammered out in the fourth quarter in time to be booked before the end of the company's fiscal year. Read More

Google+ will gain enterprise social collaboration features
Google plans to release to customers in the future a version of Google+, already in use internally at the company, that has features designed specifically for workplace collaboration. Read More

Users prefer older iPhones over newer Android devices
Apple's iPhone continues to be the most popular smartphone on the market according to data recently released by the NPD Group. Specifically, the iPhone 4 during the Q3 of 2011 was the most popular individual device followed by the iPhone 3GS, the HTC EVO 4G, the Motorola Droid 3, and the Samsung Intensity II. Read More

10 petaflop Japanese supercomputer world's fastest
As perhaps expected, the Japanese supercomputer ranked #1 on the Top 500 fastest supercomputers defended its title and today was listed again the world's fastest machine, this time hitting 10 quadrillion calculations per second (10.51 petaflops). The TOP500 list was previously announced in June 2011. Read More


RESOURCE COMPLIMENTS OF: mNext

BYOD, Security, Policy. Prepare at Enterprise MobileNext
Enterprise MobileNext can help. Whether you are banking on mobile technology to drive enterprise growth or trying to protect your organization against risk, we'll show you how to successfully deploy, secure and manage your mobile strategy. Sign up today to secure your complimentary registration for Enterprise MobileNext, Nov 30-Dec 1, SF, CA. Click to continue

CA takes to the cloud for identity management
CA Technologies has gotten its feet wet with cloud-based security before, but now the company is moving further in with a package of cloud based identity and access control services. Read More

Microsoft to move to license-by-core for SQL Server 2012
Hmmm… think back to 2005, Microsoft is marketing its plans to release a new version of Microsoft SQL Server (2005) – remember how Microsoft executives were swearing that "unlike Oracle", they would never count the number of cores, only the number of physical processors? Well, Oracle changed its licensing model in 2008 and in 2012 so will Microsoft. Read More

Microsoft has no plans to fix months old Office 2010/WP7 sync bug
Windows Phone 7 won't sync with the 64-bit version of Office 2010. And Microsoft has no plans to fix that, the company says. Read More

Huawei buys out Symantec in joint venture
Huawei Technologies will buy out the rest of a joint venture with Symantec for US$530 million, the companies announced on Monday. Read More

Symantec's cloud-based security service supports Microsoft Lync
Symantec today widened its cloud-based security service to include Lync, Microsoft's latest instant-messaging client, so that enterprises using Lync can do anti-malware filtering and exert security controls for blocking inappropriate content along with basic data-loss prevention. Read More

Federated Cloud Strategies: What CIOs Need to Know
As cloud computing adoption skyrockets and business functions increasingly look to external cloud providers to provision IT services, CIOs need to consider federated cloud strategies to integrate and manage this mixed bag of cloud computing environments. Read More



SLIDESHOWS

Wi-Fi security do's and don'ts
Wi-Fi is inherently susceptible to hacking and eavesdropping, but it can be secure if you use the right security measures. Unfortunately, the Web is full of outdated advice and myths. But here are some do's and don'ts of Wi-Fi security, addressing some of these myths.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Will IT certs get you jobs and raises? Survey says yes
  2. DARPA program to alter security authentication techniques
  3. Gartner: The top 10 strategic technology trends of 2012
  4. Cisco girds for Huawei's U.S. entry
  5. iPhone 5 rumor roll-up for the week ending Nov. 11
  6. Top 10 Android smartphone browser alternatives
  7. How IBM started grading its developers' productivity
  8. Cisco's Q1 solid, but access routers, Nexus 7000 lagging
  9. Fabric wars: Cisco vs. Brocade vs. Juniper
  10. Windows 8 coming in 2012? 6 reasons why this could derail Windows 7 now

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: