Monday, June 15, 2015

Cisco SDN controller still not ready for prime time

Don't call it Linux! And other things that tick off Richard Stallman | Reality check for Hadoop

Network World Voices of Networking

No GA yet for Cisco's enterprise SDN
Cisco's enterprise SDN controller is still in controlled release a year after it was first supposed to be generally available and months after an updated GA date. The APIC Enterprise Module shipped in February in controlled release to multiple customers who are using it in production, Cisco says, including IBM, which is using it on behalf of German airliner Lufthansa.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Webroot Software

Why Your Next Generation Firewall Protection Isn't Enough
The attack vectors have changed from a user on a PC within the network to any user on any device, operating inside and outside of the organization. To combat these threats, you need real-time predictive threat intelligence that can be easily integrated with your NGFW to protect at the network layer, or on the endpoint itself. Learn more >>

: Cloudera

Enterprise Data Hub in Financial Services: 3 Case Studies
Learn how 3 financial services companies quickly took advantage of more of their data and enabled new information-driven insights, cost savings and business agility. View more

Don't call it Linux! And other things that tick off Richard Stallman
Recently, Richard Stallman, the creator of Emacs, the GNU project, and founder of the free software movement, said that OS X and Windows were malware. Of course, aside from being known as one of the greatest living programmers, Stallman is also known for not being shy about sharing his opinion on things he feels strongly about. While his criticisms may lack the sting (and brevity) of those that Linus Torvalds will regularly launch at things he doesn't like, there's no denying that Stallman's stances are heartfelt, well thought-out, and consistent with his stated philosophies. Use the arrows above to read about 10 things that have drawn Richard Stallman's ire over the years - and still do.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Dell Inc.

Old PCs put your business at risk
Read this paper to learn what your organization can do to overcome security challenges. View now

Reality check for Hadoop
There's been a lot of buzz about Hadoop for a long time. But it's important to keep the technology in perspective as the big data industry gathers for Hadoop Summit in San Jose this week.Hadoop is an important and growing technology, but it's still very early days, says Gartner Research Vice President Merv Adrian in a blog post. Market adoption of Hadoop tools are graduating from early adopter status to early majority in the marketplace. That's a good thing. But, Hadoop's still got a long way to go. Read More


: New Relic

Survey Report: Data Culture in Software Development
New insight into how companies are using data to drive customer experience. View now

Locked-down version of Windows 10 will not come with a browser
Gartner analysts revealed this week that Microsoft's new Edge browser will not be available on the Long Term Servicing Branch (LTSB) of Windows 10 Enterprise, and this has been confirmed by Microsoft's representatives elsewhere. LTSB is a highly specialized version of Windows 10 that will only be sold direct to enterprise customers. The concept of LTSB is that it is used in locked down scenarios where the client wants as little change or disruption as possible.LTSB PCs only receive security patches and urgent hot-fixes but no new features for 10 years. This is to minimize the potential for disruption. Microsoft has confirmed this finding.To read this article in full or to leave a comment, please click here Read More

IDG Contributor Network: IoT to cause major security headaches, says report
Workers bringing Internet of Things (IoT) devices to work could add to future enterprise vulnerabilities, a new report says. RAND Corporation's latest study on cybersecurity delves into how a growing number of connected devices will add to an enterprise's attack surface. Read More

INSIDER
How to use enterprise Wi-Fi security in SMBs
It's become de rigeur to protect wireless networks with Wi-Fi Protected Access II (WPA2) security, but many small and even midsize businesses default to using the personal or pre-shared key (PSK) mode of WPA2, rather than its enterprise mode. Despite its name, however, the enterprise mode isn't only for large networks; it has a place in all businesses. Though you might think the simple personal mode is easier to use, the exact opposite can be true if you factor in the ongoing effort required to properly secure the business's network.Connecting devices that support enterprise modeTo read this article in full or to leave a comment, please click here(Insider Story) Read More


SLIDESHOWS

11 pointless but awesome Linux terminal tricks

Here are some great Linux terminal tips and tricks, each one as pointless as it is awesome.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Don't call it Linux! And other things that tick off Richard Stallman

2. 9 hot enterprise storage companies to watch

3. Attacking IT security firm was 'silly thing to do,' says Kaspersky

4. 19 free cloud storage options

5. How to use enterprise Wi-Fi security in SMBs

6. No GA yet for Cisco's enterprise SDN

7. Outgoing Cisco CEO Chambers fesses up to mistakes, touts company's grit

8. Cisco Live!: In pictures

9. Top techie Father's Day gifts

10. Peeping into 73,000 unsecured security cameras thanks to default passwords

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: