Wednesday, September 19, 2012

Cisco looks to one-up Arista, Juniper with Nexus 3548

iOS 6 arrives: Its 16 key new features | Arista aims to ward off Cisco with new low-latency switch

Network World Daily News AM

Forward this to a Friend >>>


Cisco looks to one-up Arista, Juniper with Nexus 3548
Looking to reverse the momentum of rivals Arista and Juniper in high-frequency trading, Cisco this week unveiled a new generation of ultra low-latency Nexus switches based on custom silicon. Read More


RESOURCE COMPLIMENTS OF: Sprint

Streamline your business with UC&C from Sprint
If you're still weighed down by an outdated communications infrastructure, you're holding your business back. Our comprehensive cloud-based unified communications & collaboration (UC&C) solution offers a risk-mitigating migration strategy, providing scalability, network & cost efficiency, greater reliability, & enhanced mobility for all employees GET THE DETAILS

RESOURCE COMPLIMENTS OF: RIM

Introducing BlackBerry® Mobile Fusion
Easily manage and secure mobile device deployments with BlackBerry® Mobile Fusion. From a single interface, manage BlackBerry® smartphones, BlackBerry® PlayBook™ tablets and devices that use the iOS® and Android™ operating systems. Put an end to mobile chaos. Learn more at blackberry.com/mobilefusion

iOS 6 arrives: Its 16 key new features
Although the new OS for the iPad and iPhone is largely a collection of refinements, users will still want it Read More

Arista aims to ward off Cisco with new low-latency switch
Arista Networks this week lowered the latency and upped the software programmability of its switches with the introduction of the Arista 7150S series. Read More

Security startup isolates untrusted content in virtual machines
Security-software startup Bromium is shipping its first product, a virtualization client that runs any untrusted content inside its very own virtual machine -- a microVM -- protecting the underlying operating system and whatever content is stored on the physical machine from theft and malware infection. Read More


WHITE PAPER: F5

Capitalize on the Cloud with a Sound Network Strategy
New research underscores cloud computing's challenging effects on corporate networks, but solutions are available. Learn More!

FBI eager to embrace mobile 'Rapid DNA' testing
It's been the FBI's dream for years -- to do near-instant DNA analysis using mobile equipment in the field -- and now "Rapid DNA" gear is finally here. Read More

RSA looks to have SIEM do advanced real-time threat analysis, forensics
RSA is readying a product it calls Security Analytics whose purpose is basically to transform the company's traditional security information and event management (SIEM) product, EnVision, into a hunter of stealthy attackers, and a forensics tool to analyze attacks. Read More

Motorola launches Razr i smartphone with 2GHz Intel Atom processor
Google-owned Motorola Mobility has launched its first smartphone with an Atom processor from Intel, the companies announced at an event in London on Tuesday. Read More


WEBCAST: Teradata

Big Data Done Right
In this live, interactive Webcast you will learn how to reap the benefits of big data through a practical unified architecture; how to improve performance with in-memory technology; and how to lower costs and increase scalability through cloud computing. Register now.

10 ways to celebrate Talk Like a Pirate Day
Get ye pirate on each Sept. 19 Read More

How to future-proof your hardware for Windows 8
It's like a special consumer-tech corollary of Murphy's law: Your PC will inevitably die just before a new Windows OS is about to ship. You need a new laptop immediately, and you can't wait to buy one that comes with the new OS preinstalled. Read More

Maybe with help from Google and Adobe, Microsoft can kill Windows XP
Just like Internet Explorer 6, Microsoft can't bury Windows XP fast enough. Fortunately, it's getting a little help from Google and Adobe. Read More

Hackers exploit 0-day: Kick IE to the curb or catch a nasty Poison Ivy itch?
Do you use Internet Explorer 6, 7, 8 or 9? If so, then you might catch a nasty itch since malicious hackers are using those IE browsers "to install the Poison Ivy Trojan—malware that can steal data or take remote control of PCs," the BBC warned. This new zero-day can potentially infect "hundreds of millions" of IE browsers. Read More

The iPhone 5: What's Missing
I didn't write a specific analysis of the iPhone 5 announcement partially because everyone else did, and partially because there really wasn't anything there that was notably new and unexpected. You can read my column on how innovation is slowing here, but, suffice it to say for now that Apple will sell zillions of these because it's a great upgrade for people whose two-year carrier contracts are up.... Read More



SLIDESHOWS

TEST: 6 free email servers for small businesses
hMailServer (Windows only) wins our test; Citadel (Linux only) comes in a close second

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Oops. OpenStack board member says letting VMware into project was a mistake
  2. Windows Phone 8 has 'baked-in cybersecurity goodness'
  3. 5 free open source alternatives to Microsoft Office
  4. FBI warns financial institutions are being highly targeted by fraudsters
  5. Test: 6 free email servers for small businesses
  6. 20 awesome cloud services you've never heard of
  7. Juniper plotting open source alternatives to Cisco, VMware SDN controllers
  8. Forget iPhone 5: 10 top Apple alternatives
  9. Kaspersky researcher cracks Flame malware password
  10. Hard disk drives vs. solid-state drives: Are SSDs finally worth it?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment