Issue highlights 1. Big Switch says 'thin' virtual switch will lower costs, spur OpenFlow adoption 2. Microsoft's relationship with Samsung gets ugly 3. Brocade evolves the storage network 4. When industry jargon and buzzwords backfire 5. YouTube change more unpopular than Congress? 6. Cell system used in Antarctica may help to cover the Plains 7. 30 months in the slammer for man who pointed green laser at aircraft 8. Researchers identify targeted email attack distributing Android Trojan app 9. IRS uncorks Dirty Dozen Tax Scams for 2013 10. Network Security Trumps Server Security in the Enterprise 11. ZTE to let airline passengers access Internet using Wi-Fi and LTE 12. CIA Chief advises you to ask: What are your rights? Who owns your data? |
WHITE PAPER: Cisco BYOD, virtualization and cloud are making application deployment and delivery more challenging than ever for IT departments. Employees want to access applications anytime, from anywhere, on any device, and they expect the same level of performance and reliability. Read Now |
In an effort to accelerate the adoption of OpenFlow for software-defined networking, Big Switch Networks this week unveiled an open source-based "thin" virtual switch for servers and commodity switches. READ MORE |
A while back I commented on the rumor that Samsung was trying to torpedo Windows Phone and harm Microsoft. The idea struck me as ludicrous, not to mention potentially dangerous. Well, it doesn't appear Samsung has to do anything behind the scenes. The war of words is now coming out in public. READ MORE |
Normally, when a vendor is the undisputed king of a market, there's a risk of the company taking their eye off the ball and letting markets slip away. BlackBerry in the smartphone market, 3Com with NIC cards and switches, and Nortel with almost everything they made are some examples of this. However, every once in a while vendors do surprise by trying to change the very market they dominate. Sure,... READ MORE |
This guest post was submitted by Lorinda Brandon, Director of Strategy at Smartbear Software READ MORE |
WHITE PAPER: Dell As IT environments evolve to hybrid cloud computing, strategic IT oversight and best-practices life-cycle data management are key imperatives to help ensure oversight, service levels, and security. This white paper examines cloud options as it relates to storage and explains the benefits a cloud-enabled storage architecture can offer. Learn More |
When Change.org announced yesterday that it has now hosted more than 500,000 petitions, the press release listed those individuals and entities that have most often been targeted by these grassroots virtual uprisings. You might think President Obama or the public's favorite punching bag, Congress, would head the list, but you'd be wrong. READ MORE |
Rural residents in North America may soon get a shot at better cellular coverage with an open-source technology being used in Antarctica, Mexico and Papua, Indonesia. READ MORE |
In a move federal prosecutors hope sends a strong message to the knuckleheads who point lasers at aircraft for fun, a California man was sentenced to 30 months in prison for shining one at two aircraft. According to the FBI Adam Gardenhire, 19, was arrested on March 29, 2012 and named in a two-count indictment filed in United States District Court in Los Angeles that said he pointed the beam of a laser... READ MORE |
Security researchers from antivirus vendor Kaspersky Lab have identified a targeted email attack against human rights and political activists that distributed a custom Android Trojan app with information-stealing capabilities. READ MORE |
WHITE PAPER: Cisco Systems Research reveals new ways for banks to prosper. Customers are ready for omnichannel experiences. Respond now-learn how to manage the transition to omnichannel banking and reap the rewards of delivering innovative services. Read Now |
The Internal Revenue Service today reminded taxpayers that there are plenty of scam artists and cybercriminals that want your money. READ MORE |
There is a historical conundrum in cybersecurity about where to concentrate security skills, controls, and oversight. Hackers penetrate networks in order to compromise hosts and steal data. Given this obvious workflow, should CISOs focus security resources on networks, hosts, or a balanced combination of both? ESG recently posed this question to 395 security professionals working at mid-market (i.e.... READ MORE |
After years of development, airline passengers will be able to access the Internet using LTE this year, according to ZTE. READ MORE |
The cloud is old news, it's "so three years ago," and Big Data "was so last year," but according to the CIA's Chief Technology Officer, Ira "Gus" Hunt, this year is about "how to get value" from Big Data. At the GigaOM Structure Data conference, Hunt presented, "The CIA's 'Grand Challenges" with Big Data" and I highly recommend that you take about 30 minutes to personally listen to it. READ MORE |
WHITE PAPER: Netscout Systems Inc. This white paper is to help IT organizations adopt a management methodology that enables them to improve the user experience by focusing on service delivery management. Learn More. |
|
No comments:
Post a Comment