Friday, March 30, 2012

Dissecting Cisco's FabricPath Ethernet technology

  Massive payments data breach originating with Central American gang through NYC garage? | Inside Google's London Campus, an incubator for tech startups
 
  Network World Daily News PM

Forward this to a Friend >>>


Dissecting Cisco's FabricPath Ethernet technology
Cisco's FabricPath data center Ethernet technology is designed to combine traditional, Spanning Tree-based Ethernet with a next-generation architecture that uses a link-state protocol to allow for multiple active paths. Deploying multiple active paths in a data center network is required to flatten the infrastructure to reduce latency and better support traffic flow between server racks. Read More


RESOURCE COMPLIMENTS OF: Rocky Mountain IPv6 Task Force

2012 North American IPv6 Summit
Become a certified IPv6 Engineer! Nephos6, in collaboration with the IPv6 Forum is hosting IPv6 certification testing. 2012 NA IPv6 Summit attendees can test for IPv6 certification during the conference. Save $50 off conference registration with this code: SPON700. Register Now

WEBCAST: Wildpackets

Distributed Network Analysis for Distributed Applications
Corporate computing has crossed the threshold to highly distributed -- whether your organization has 50 or 50,000 employees. It's imperative that you distribute your network analysis capabilities. Learn technologies and approaches to best deal with today's highly distributed network applications View Now

Massive payments data breach originating with Central American gang through NYC garage?
Both Visa and MasterCard Friday are acknowledging a possible data breach of a payment-card processing company network that, once an investigation is completed, could show that sensitive data from cardholders was stolen and payment fraud committed due to the break-in. Read More

Inside Google's London Campus, an incubator for tech startups
A look at Google's new 7-floor co-working fortress in London Read More

Windows 8 Update: Back up Windows Server 8 to the cloud
Microsoft is offering free tests of online backup for Windows Server 8 via its Azure cloud storage service, which could be a convenient way to protect data without having to spend a lot of time designing and cash outlay deploying private backup. Read More


WHITE PAPER: Silver Peak Systems, Inc.

Optimizing Offsite Disaster Recovery with Virtual WAN Op
Learn why one of the world's largest media companies chose Silver Peak virtual WAN Optimization for their cross country replication challenges including an on-demand media database requiring 7 x24 access. Complicating the challenge was a lack of space in the state-of-the-art data center for additional physical hardware. No problem. Learn more.

New IBM CEO in middle of Masters golf controversy
Two long-standing traditions at Augusta National Golf Club are on a collision course just a week before the institution's biggest event of the year. The host of the Masters, one of professional golf's most prestigious competitions, has never admitted a female member -- but the club's partnership with IBM has historically meant that the CEO of that company is offered one of the iconic green membership jackets. Read More

Ukraine shuts down forum for malware writers
Ukrainian authorities have shut down a long-running forum that was used to trade tips on writing malicious software, a sign the country's law enforcement may be watching hackers more closely. Read More

Intel plans 'superchip' for high-performance computing
Intel this week said it was investing in the development of a "superchip" for high-performance computing systems that the company hopes will raise its supercomputing profile. Read More


WHITE PAPER: PhoneFactor

5 Critical Considerations Before Renewing Security Tokens
As the threat landscape and needs of your users rapidly change, technology must also quickly evolve. This paper addresses five critical factors all IT buyers should consider before renewing or extending their security token implementation so they don't make a vital mistake by overpaying for outdated authentication technology. Learn More

BlackHole exploit targets Java bug through browser-based attacks
A powerful new exploit has been identified in the wild that could turn PCs running outdated versions of Java into bots for spam or DDoS attacks, or even loot them for sensitive information. Read More

Social media helps make indelible mark on lifesaving cause
Because we live in a world where social media permeates daily life, Annie Rose Ramos - or at least her tattooed back -- may soon become a symbol for a global lifesaving cause that will get a round of deserved attention as a result. First the picture, which has viral written on it as clearly as "half the sky": Nicholas Kristof of the New York Times explains on Google+: Read More

Cloud Value Must Extend Past Cost Savings
Yesterday I took some time out of my Enterprise Connect schedule and headed to New York to participate in a cloud event held by Navisite, a leading provider of cloud services. The theme of the event was "Cloud: Beyond ROI," which I thought was a good topic of conversation for anyone considering the cloud. Read More

The Byte - RIM revenue, Android tablets, Dell smartphones, OnStar Family Link
Research in Motion's fourth quarter revenue plummeted 25 percent as it struggles to stay relevant.Google will open an online store where it will market and sell tablets directly to consumers, according to the Wall Street Journal. Read More

 
 
 

SLIDESHOWS

20 iPad business apps every CIO should want
iPad apps for sales forces, IT departments and more.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Uncle Sam wants to hack foreign video consoles and scrape gamers' data
  2. Cisco forces manufacturer's hand; adopts Microsoft Lync
  3. 10 fun (and safe) ways to pretend to be a hacker
  4. How open source powers a Battlestar Galactica-inspired flight simulator
  5. Dissecting Cisco's FabricPath Ethernet technology
  6. IETF attendees reengineer their hotel's Wi-Fi network
  7. AOL unplugs 10,0000 servers, saves $5 million
  8. Google says 'Go' to new programming language
  9. Threat of a bullet in the face keeping cybercrooks cautious
  10. Critical milestones in Cisco history
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

Virtualization, Unified Communications Meet, At Last

If you have trouble viewing this email, read the online version.

TechWeb Networking News Update -- Issue Highlights:
TOP STORY: Virtualization, Unified Communications Meet, At Last
ALSO SEE: Computing Cartels Shake Up IT Purchasing
ANALYTIC REPORT: Fundamentals: 10 Steps to Effective Data Classification
WHITE PAPER: Extending the Value of Legacy Applications Through Application Transformation
MOST POPULAR: 10 CIOs: Career Decisions I'd Do Over
BLOG: Seagate's HAMR Time: Can't Touch This...Yet!
WEBCAST: How Can You Be Certain Your Environment is Still Locked Down?
RESOURCES: Take Our Public Cloud Survey

TechWeb
NETWORKING NEWS UPDATE 
  Friday, March 30, 2012
REPORTS & WHITEPAPERS   |     MOST POPULAR   |     BLOG   |     WEBCASTS   |     RESOURCES  
TOP STORY
Virtualization, Unified Communications Meet, At Last
Unified communications servers and virtualization do mix, more enterprises find. But desktop virtualization and UC remains tricky.

ALSO SEE
Computing Cartels Shake Up IT Purchasing
Massive firms with global reach will emerge during the next 10 years, offering optimized stacks of computing capability on a pay-per-use basis.

The Upside-Down SAN
Vendors are pushing local flash storage for your most active data, which may turn your storage area network to a digital dumping ground.

HP Displaces Cisco, EMC In Sabre Data Centers
$800 million deal with travel industry leader replaces rivals' aging equipment with HP's latest virtualized, converged systems.

Avaya Buys Radvision, Broadens Video Reach
Radvision will help Avaya provide low-bandwidth, high-definition video to a broader variety of devices.

Cloud ROI: The Missing Link
What return are you getting on your investments in public cloud services? New research reveals you probably don't know, and that's a problem.


 

REPORTS & WHITEPAPERS:
FEATURED REPORTS
Fundamentals: 10 Steps to Effective Data Classification
It sounds simple enough: Define categories to protect information according to how devastating its loss would be to the organization. But unfortunately, complexity, cultural barriers and a lack of business user motivation can derail even the best-laid plans. We reveal how to keep classification initiatives on track.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

spacer spacer spacer
FEATURED WHITEPAPERS
Extending the Value of Legacy Applications Through Application Transformation
Gain insight into why automated application migration is the least risky, least expensive and fastest choice for achieving tangible results of all available legacy application modernization alternatives.
 

TODAY'S MOST POPULAR STORIES @ TECHWEB.COM:
10 CIOs: Career Decisions I'd Do Over
Listen and learn as leading CIOs share the decisions they'd do over, from misusing outsourcing to adopting tech too early.

How To Secure Your Flat Network
You don't have to trade control for a faster network architecture.

How To Sync Evernote With Google+
Evernote and Google+ are a good team. Here's how to make them work together.

 

FROM THE NETWORK COMPUTING BLOG:
Featured Blogger Seagate's HAMR Time: Can't Touch This...Yet!
By Steve Wexler
Seagate is inching closer to the next evolution of disk technology – heat-assisted magnetic recording (HAMR) – with the demonstration of 1 terabit (1 trillion bits) per square inch and the intention of releasing 3.5-inch hard drives with up to 60 terabytes capacity as early as 2015. That's double the capacity of the current drive technology, Perpendicular Magnetic Recording (PMR), which replaced longitudinal recording, starting in 2006.

Boundary Hosts Network Monitoring Service
By Frank J. Ohlhorst
Real-time network monitoring is quickly becoming a must have capability for network managers supporting transaction intensive networks, especially when cloud based applications are involved.

Data Classification Tips & Technologies Part 2
By Esther Shein
Even though the process of classifying data is, in theory, well understood and considered a tenet of good business and security practices, industry observers say companies are not doing it across the board—or doing it well.

 

WEBCASTS:

How Can You Be Certain Your Environment is Still Locked Down?
IT security and operations managers will find that this webinar presents a set of best practice methods which allows them to quickly and easily manage and mitigate privilege creep. It happens Tuesday, April 3, 2012.
More Information & Registration
 

RESOURCES AND EVENTS:
Take Our Public Cloud Survey
InformationWeek is conducting a survey on the state of private cloud use in the enterprise. Upon completion of our survey, you will be eligible to enter a drawing to receive an 32-GB Apple iPod Touch. Additionally, you will receive a discount code good for 25% off Flex and Conference passes to Interop Las Vegas 2012, to be held at the Mandalay Bay, May 6-10.
It happens March 25-29 in Orlando, Fla.


This e-mail was sent to networking.world@gmail.com

NETWORKING NEWS UPDATE
-- Published By TechWeb
600 Community Drive
Manhasset, NY 11030


To subscribe to our other newsletters, change your e-mail
address or format (Text/HTML) or to unsubscribe, click here



Keep Getting This Newsletter
Don't let future editions of Techweb's Networking News Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

Spring Fashion Show and Startup Gala at the Fairmont

You are cordially invited to the Spring Fashion Show and Startup Gala at the Fairmont San Francisco!
Email not displaying correctly?
View it in your browser.
Spring Fashion Show and Startup Gala

You are Cordially Invited to the Spring Fashion Show and Startup Gala

Experience the elegance of this festive event at the Fairmont San Francisco on Friday April 27th 2012

What: Spring Fashion Show and Startup Gala
When: Friday April 27th 2012 (7:00 PM)
Where: Fairmont San Francisco

Link: http://sffashion.eventbrite.com/

Please purchase your tickets early!
~~~~
Tickets: http://sffashion.eventbrite.com/
~~~~
We sincerely hope that you take advantage of our Early Bird Special
All attendees receive a gift bag valued at over $500. 


Copyright © 2012 Startup Saturdays, All rights reserved.
You are receiving this email because you attended an event sponsored by Startup Saturdays or Women in Tech or you attended an event co-sponsored by Startup Saturdays and Women in Tech or you are a part of an affiliate organization to Startup Saturdays and Women in Tech. Or you are involved with Startups and Fashion.

Email Marketing Powered by MailChimp
unsubscribe from this list | update subscription preferences 

Threat of a bullet in the face keeping cybercrooks cautious

Review: 7 password managers for Windows, Mac OS X, iOS, and Android | 10 funny (?) April Fools' pranks - Web style

Network World Compliance

Forward this to a Friend >>>


Threat of a bullet in the face keeping cybercrooks cautious
Scott Borg, director of a cybersecurity research institute, kicked off the SecureWorld Expo Boston with an uplifting talk about the end of the cybersecurity world as we know it. Sure, more sophisticated threats are on the way, but those in cybersecurity also have new opportunities to defend threats and even enable economic growth. Read More


WHITE PAPER: IBM

Get more out of cloud with a structured workload analysis
Adopting cloud technology is a reasonably easy decision. Figuring out when and how to get the most value from cloud computing is the next—often more challenging—step. Read this white paper to learn how a robust analysis of your workloads can help identify candidates for your target cloud environments. Read Now

WHITE PAPER: NetIQ

Simplify Compliance and Security
This introduction to NetIQ Sentinel Log Manager provides insight into a flexible and cost-efficient software appliance that lights a clear path to complete, real-time, identity-aware security information and event management. Learn More!

Review: 7 password managers for Windows, Mac OS X, iOS, and Android
1Password and KeePass lead the field in features, flexibility, browser integration, and ease-of-use Read More

10 funny (?) April Fools' pranks - Web style
Our roundup of some of 2011's Internet-based April Fools' pranks should get you in the mood for this year's inevitable crop. Get ready to wince. Read More

Operation Global Blackout: Real danger or irrelevant?
Anonymous announced March 31 as the date of the attack, along with the method they intend to use -- disabling the Domain Name Service through DDoS attacks. Read More


WHITE PAPER: Oracle

Oracle Solaris on the Oracle Exalogic Elastic Cloud
This paper provides a high level overview of the Oracle Exalogic Elastic Cloud and then describes the value that Oracle Solaris brings to the Oracle Exalogic offering. Learn More!

Ukraine shuts down forum for malware writers
Ukrainian authorities have shut down a long-running forum that was used to trade tips on writing malicious software, a sign the country's law enforcement may be watching hackers more closely. Read More

Microsoft bot takedowns help, but are no cure
Takedowns of Zeus botnet command and control servers like the one executed last week by Microsoft and others do reduce the criminal activity they spawn - for a while - but attackers learn from the experience and come back with more sophisticated techniques, a security expert says. Read More

Do-it-yourself plan to take down Sality botnet outlined on public mailing list
A method that anyone can use to hijack a massive multipurpose botnet called Sality was described in detail on a public mailing list on Tuesday. Read More


WHITE PAPER: Tripwire

Responding to New Threats in More Complex IT Environments
As organizations today face the challenge of protecting their valuable data, they must balance that protection with giving business users and customers access to the data. Learn More!

Fake 'The Roar of the Pharaoh' Android app latest Trojan scam
It may look like an app for a Chinese game called "The Roar of the Pharaoh," but it's actually just another fake Android app that's really a malware Trojan in disguise, according to security researchers warning about it today. Read More

Avira becomes latest vendor to offer Mac antivirus software
German security company Avira has released free antivirus software for Apple Macs, joining a host of security software providers offering protection for OS X. Read More

AVG adds 'do not track' technology to antivirus
AVG has become the first antivirus vendor to offer a privacy filter to monitor and block websites and ad networks that silently collect Internet usage data from consumers, the company has announced. Read More

Q&A: What the FTC recommendations mean for online privacy
Future of Privacy Forum co-chair Christopher Wolf answers questions about privacy "self-regulations," centralized data broker websites and more. Read More

OnStar introduces new tracking feature
Onstar will roll out a new feature called Family Link that lets drivers find and track their cars. Read More



SLIDESHOWS

20 iPad business apps every CIO should want
iPad apps for sales forces, IT departments and more.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. IETF attendees reengineer their hotel's Wi-Fi network
  2. New Google Account Activity lets you know what Google knows about you
  3. Cisco acquires home network management company
  4. Cloud services face taxing dilemma
  5. More fun with naming wireless nets
  6. Steve Jobs wasn't a fan of the Siri name
  7. International security team shoots down second Hlux/Kelihos botnet
  8. Firewall fail: A tale both funny and sad
  9. Critical milestones in Cisco history
  10. 7 password managers for Windows, Mac OS X, iOS, and Android

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **