Monday, February 25, 2013

Etsy gets crafty with big data

  Cisco virtual router targets the cloud | Juniper security products use device-fingerprinting as way to detect, block attacks
  Network World Network/Systems Management

Forward this to a Friend >>>

Etsy gets crafty with big data
Handmade marketplace Etsy has grown to 800,000 sellers and 40+ million monthly visitors. All that activity generates enormous quantities of data, which Etsy uses to drive site improvements. Read More


Integrating the iPad into Enterprise Wireless
Network administrators need to be prepared to support the ever-growing number of tablets and other mobile devices on enterprise wireless networks. This whitepaper shows how to survive the iPad crush with a detailed look at the challenges of supporting mobile devices and BYOD initiatives. Learn More!

WHITE PAPER: Silver Peak Systems, Inc.

Silver Peak vs. Riverbed Test Comparison
If you can add WAN acceleration to branch offices without adding another device, why wouldn't you? This InfoWorld review highlights how Silver Peak's VX/VRX virtual WAN appliance can be deployed on an existing hypervisor to provide improved WAN performance for remote users. See why InfoWorld gave it an "Editor's Choice" award. Learn more.

Cisco virtual router targets the cloud
The Cisco CSR 1000V router is designed for enterprise network managers who want to have a little piece of their Cisco infrastructure in the cloud. Read More

Juniper security products use device-fingerprinting as way to detect, block attacks
Juniper Networks today rolled out a battalion of security products and services to protect corporate networks, stating that when it comes to defensive measures, security attacks can be better prevented by determining device-fingerprinting rather than blocking attacks based on IP address. Read More

Akamai brews up more delicious Kona security tools
Web acceleration company Akamai today announced Version 2.0 of its Kona Site Defender service, which adds new ways for clients to protect themselves against denial-of-service attacks. Read More


Enjoy Better Network Performance Economics
IT organizations are finding it critical to monitor application performance closely, optimize network usage, and make sure that changes to the environment do not degrade the end-user experience. Discover how cost-effective packet capture and analysis can be without adding hardware to your branch offices. Learn more.

Red Cross offers Office 365 to its units worldwide to improve communications
The International Federation of Red Cross and Red Crescent Societies (IFRC) now offers its more than 180 National Societies the option to adopt Office 365, Microsoft's cloud-based suite of email, collaboration and productivity software. Read More

A new way to sell used IT equipment
The buying and selling of used IT equipment is not a trivial market, but it doesn't get enormous attention. In many cases, enterprises unload used equipment as a trade-in or at bargain price to a wholesaler because they just want the equipment off the floor. Read More

BYOD gets attention at Mobile World Congress
Helping IT shops deal with the security and management of consumer smartphones and tablets in the workplace will be a big theme at Mobile World Congress this week. Read More


Protect Critical Assets with Virtual Patching
Virtual patching, using predictive threat coverage, automated vulnerability scanning, and risk visualization, is a scalable, cost-effective approach to protecting critical assets. This paper discusses change management approaches and details the McAfee solution suite. Read Now

Top users of H-1B visas are offshore outsourcers, Computerworld study finds
The biggest users of H-1B visas are offshore outsourcers, many based in India, or U.S.-based companies whose employees are mostly located overseas, according to government data obtained and analyzed by Computerworld. Read More

MIT aims to boost robot-human synergy
With robots increasingly being used on factory floors and elsewhere, researchers are looking for ways to help humans work better with their robotic peers. Read More

New SDN events help bolster industry effort
This year is shaping up to be critical in the development of software-defined networking technology, and two new events are helping chart the way. Read More

IBM eyes mobile, social add-ons for mainframe
IBM is looking to bring mobile and social workloads onto mainframes as a way of keeping the expensive machines competitive. Read More



13 of the biggest security myths busted

13 myths about information-technology security you'll hear but should you believe?


As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn


1. Why Android 4.2.2 is an important update

2. Impressive HTC One should prove stiff competition for Galaxy S IV

3. How Colorado's CISO is revamping the state's information security

4. U.S. students get cracking on Chinese malware code

5. Cisco, EMC coalition expands data center portfolio

6. Microsoft Azure overtakes Amazon's cloud in performance test

7. Petition to legalize cell-phone unlocking tops 100,000 signatures

8. Cisco, Avaya feel the heat from Microsoft Lync

9. The Samsung Galaxy S 4 shows up in New Zealand, and on an AT&T stat sheet

10. Cisco declares war on Microsoft unified communications system


Do You Tweet?
Follow everything from on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact:

To contact Network World, please send an e-mail to

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to **


No comments: