Monday, October 14, 2013

What about Ex-Cisco exec Bates as Juniper's next CEO?

Why I'm excited for Linux Mint 16, even though I don't like Mint | Big data's dirty little secrets

Network World Voices of Networking

Forward this to a Friend >>>


What about Ex-Cisco exec Bates as Juniper's next CEO?
It's Blue Sky Thursday here at Network World, so allow me... Why not Tony Bates as Juniper's next CEO? He has the service provider routing credentials from Cisco; and he's got the Microsoft connection that pervades Juniper's top ranks; and he has CEO experience from his short tenure at Skype. Read More


WEBCAST: Juniper Networks

Converged Access for a More Agile Enterprise
A new convergence trend is making its way through the enterprise: converged user access across wired and wireless networks. Driving this trend is the need to accommodate a dizzying array of devices and data, communicating wirelessly from a variety of locations across and outside of the enterprise. View now >>

WHITE PAPER: Meru Networks

Wireless Networking: The Promise of the 802.11ac Standard
This IDC Technology Spotlight explores the trends driving BYOD (bring your own device) adoption and the associated impact on enterprise-grade WLANs, especially as it relates to the emerging high capacity 802.11ac Wi-Fi standard. Learn more >>

Why I'm excited for Linux Mint 16, even though I don't like Mint
Every six months, my world gets thrown into a state of pure, blissful chaos. New, major versions of the big Linux distributions tend to hit every half year - one batch in the spring, another in the fall. As a person for whom the "Linux Enthusiast" moniker certainly applies, I have grown accustomed to this bi-annual state of unrest. Case in point: Over the next six weeks, we will see big new releases... Read More

Big data's dirty little secrets
Big Data is one of the hottest trends in enterprise IT right now, and for good reason. The ability to collect, store, and analyze unprecedented quantities of all kinds of data promises to remake everything from weather forecasting to consumer marketing. But while that promise is being realized at a few pioneering companies, from Amazon and Macy's to Google and Facebook, many other organizations are... Read More

McAfee Advanced Threat Detection: A Sign of Things to Come
With the glitz and glamour of Las Vegas as a backdrop, McAfee rolled out its Advanced Threat Defense (ADT) strategy last week. Yes, McAfee now offers a sandboxing appliance of its own but it would be foolish to judge this announcement based on its security device alone. McAfee's ATD is actually an integrated architecture that goes beyond detection. McAfee's ATD message is actually, "find,... Read More


WHITE PAPER: Spirent Communications

Challenges for Modern Networks Built Using SDN and OpenFlow
The Testing Challenges of SDN and OpenFlow white paper Covers Emerging network deployment scenarios, Current shifts in traffic type crossing networks and Challenges with Cost, Agility and Design. Read Now

Most costly cybercrime attacks: Denial-of-service, malicious insider and web-based
$11.56 million is the mean average cost of cybercrime per U.S. corporation, ranging between $1.3 million to $58 million, according to the fourth annual Cost of Cyber Crime study conducted by the Ponemon Institute. That is up 78% from four years ago and increased 26% from the average cost reported in 2012. Read More

Cisco's Nexus 9000, ACI strategy
Cisco has four strategic imperatives for its Nexus 9000 data center product and its Application Centric Infrastructure (ACI) focus: attack VMware/Nicira's software-intensive network virtualization technique; combat Read More

Gartner: Top 10 future strategic IT predictions
Gartner opened its Symposium/ITxpo extravaganza with a bit of good news: Worldwide IT spending is forecast to reach $3.8 trillion in 2014, a 3.6% increase from 2013. But with that growth there are big changes afoot and as Gartner will, it took a look at what some of the biggest changes - including the impact of 3D printing, automation and security threats -- will mean for anyone involved in IT. Read... Read More


WEBCAST: HP

HP Software-Defined Networking KnowledgeVault Exchange
Software-defined networking a networking paradigm shift that holds great promise for today and tomorrow's IT operations. In this KnowledgeVault, there are informative videos, tools, white papers and research all designed to help you get the most out of SDN technology. View Now

What market share numbers tell us about Apple's future
I'm usually not one to worry much at all about market share numbers. If a platform has enough of an install base to attract some quality third-party developers, what more is really needed, right? RELATED: 6 easy steps to make the iPhone relevant again Read More

Network Forensics: A Burgeoning Big Data Security Analytics Category
According to ESG research, 49% of enterprise organizations suffered a successful malware attack over the past two years (note: "successful" implies that the malware compromised an IT asset and caused some type of impact such as a system re-imaging, data theft, downtime, etc.). Of these firms, 20% suffered 10 or more successful malware attacks. Read More

Don't tell your insurance company you're a blogger
Read More

It Takes a Village: The Splunk User Conference 2013
When IBM distributed its operating system in the 1950's, it actually sent the source code to its customer base. Many IT shops then actually modified the operating system with their own customized code. Read More


SLIDESHOWS

The 'Bad Boys' of open source

The open source world's most notorious characters.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. In a room with no cell service, Verizon works on the future of mobile

2. Careers that are being automated into oblivion

3. Why I'm excited for Linux Mint 16, even though I don't like Mint

4. Gartner: The top 10 IT altering predictions for 2014

5. 10 ways IT pros can reduce stress at work

6. NSA backdoor fears creating crisis of confidence in U.S. high-tech products, services

7. Your car is about to go open source

8. Three lessons from Netflix on how to live in the cloud

9. Shh ... Cisco's latest switch supports VMware NSX

10. Inside CIO paychecks


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: