Monday, April 07, 2014

OpFlex: Another example of Cisco being Cisco

The New Cybersecurity Technology Reality, the Whole Is Greater than the Sum of its Parts | Top Initiatives in I.T. Operations for 2014/2015

Network World Voices of Networking

Forward this to a Friend >>>


OpFlex: Another example of Cisco being Cisco
Why do customers pay a premium for Cisco? My research shows that Cisco owns about 75% of switching share but only about 55% of port share, showing Cisco's obvious revenue per port advantage over everyone else. Why does this discrepancy exist? I know some of you will disagree with this, but in general, customers pay up for Cisco infrastructure because it does more stuff faster than competitive products.... Read More


WHITE PAPER: Network Instruments

Are Agents Necessary for Accurate Monitoring?
Being proactive in managing network performance means not only tracking the network and applications, but obtaining a view of the underlying infrastructure health. Selecting the best method for your team requires an understanding of the options and the ability to choose the solution that integrates well with your existing resources. Learn More

WHITE PAPER: CDW

3 Steps for Enterprise Mobility Success
Having a mobile strategy is as essential as having a business plan or mission statement. A mobile strategy communicates to stakeholders, IT and customers the vision of where the organization intends to go and why. View Now

The New Cybersecurity Technology Reality, the Whole Is Greater than the Sum of its Parts
I wrote a blog last week about new integrated anti-malware technology last week in response to Palo Alto Network's acquisition of Cyvera. In fact, this integrated technology model isn't limited to anti-malware but is becoming the new reality across the cybersecurity life cycle of risk management, incident prevention, incident detection, and incident response. Read More

Top Initiatives in I.T. Operations for 2014/2015
Read More

Windows XP: Goodbye and Good Riddance
There has been much written recently about the end of support for Windows XP on April 8, 2014. There are concerns about security vulnerabilities that will be used after Microsoft stops patching the operating system. However, if your organizations is still using Windows XP 13 years after its initial release, you have some more serious issues to address. The hardware XP computers have could not... Read More


WHITE PAPER: ExaGrid

Straight Talk about the Cloud
Are you looking to understand how feasible the cloud really is to meet your specific requirements for backup and disaster recovery? Learn where the cloud is and is not a good fit by downloading Straight Talk About the Cloud for Data Backup & Disaster Recovery. Learn More

The government as whopping UFO skeptic
A newly released response to public UFO sighting only increases the notion that the military - which was often forced into looking into "flying saucer" sightings - was exceptionally skeptical about such reports. Read More

Forget physical access as now remote USB attacks can blue screen Windows servers
NCC Group Research Director Andy Davis likes to test USB host security; over the years, Davis has "identified over 100 bugs covering all the major operating systems." He said most vendors typically respond with "Thank you for the bug, but as you need physical access to plug in your rogue device, the impact is actually quite low." Yet Davis continued researching USB security, giving presentations such... Read More

North Korean leader plays Homefront on Xbox to practice taking over US
When Microsoft created Xbox and later Kinect, do you suppose the company thought its products would be used for war in a context other than gaming? Before we jump to South Korea using Kinect sensors to watch for invading enemies, let's look at how North Korean leader Kim Jong-un is using his Xbox to practice "strategizing all-out nuclear war against the US." Read More


WHITE PAPER: SAS

Sustainable Data Governance
You've hooked them on the idea of data governance. Now, how do you keep them interested? As hard as it is to get started, keeping your data governance program warm over the long term is the greatest challenge. Creating a sustainable governance practice means transcending the pilot phase to become "business as usual." Learn more

FBI: Elaborate $1 million Verizon iPhone, iPad fraud busted
The FBI said a man admitted he ripped off more than $1 million worth of iPhones and iPads from Verizon Wireless using an elaborate scheme that involved misappropriating corporate purchasing accounts and bribing Federal Express drivers. U.S. Attorney Paul J. Fishman said Stephen Gunn of Chicago, 36, pleaded guilty before U.S. District Judge in Newark federal court to an indictment charging him with... Read More

Cisco's Intercloud strategy is no threat to its channel partners
By far, the biggest news last week from Cisco's channel event, Partner Summit, was the Intercloud announcement, where the company outlined its vision for a world of interconnected, federated clouds. Read More

Geek-themed Meme of the Week: Endless 1% Edition
No. 37 in our Geek-Themed Meme of the Week series, collected from your finer Internet sites, grinds my gears, too. Want more? Check out the "Geek-themed Meme of the Week Archive": And if you'd like me to consider one that you've found - or created - please feel free to send it to me at buzz@nww.com. Read More


SLIDESHOWS

Hot products at Interop

These products are on display at the annual tech conference in Vegas.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco reveals OpenFlow SDN killer

2. FireEye, AhnLab score low in lab test of breach detection systems

3. The ultimate Windows XP quiz

4. The (mostly) cool history of the IBM mainframe

5. Juniper to lay off more than 500 and close facilities

6. The 10 computer science programs with the biggest payoff

7. How to respond to a data breach

8. Microsoft gives businesses reason to adopt Windows 8.1

9. China's unsupported XP machines hold the potential to become a massive botnet army

10. IE easily beats Chrome, Firefox, Safari in malware detection


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment