Search This Blog

Tuesday, March 27, 2012

Cisco challengers should be buoyed by data center network market growth

Arista 10G switch: Fast and flexible | Streaming vs. proxy deep packet inspection

Network World Network Optimization

Forward this to a Friend >>>


Cisco challengers should be buoyed by data center network market growth, researcher says
Continued growth in the data center network equipment market has opened a window of opportunity for vendors looking to cut into industry leader Cisco's share, and, for those with the right products, "the time to strike is now," one analyst says. Read More


RESOURCE COMPLIMENTS OF: Quest Software, Inc.

Free network monitoring? That's centsless!
Foglight® NMS helps increase network performance and availability while improving IT efficiency. It's scalable, installs in 15 minutes and incredibly easy to use. And it's free – forever. Get your copy today.

WHITE PAPER: Raritan

Data Center Transformations
This paper discusses ways to simplify data center transformation and introduces a new process – BOCA – Build Outs, Consolidations and Acquisitions. Learn the five stages of BOCA and see how the right remote access and IT infrastructure management tools, deployed early and continuously monitored, can dramatically improve overall efficiency. Read now!

Arista 10G switch: Fast and flexible
Packing 384 10G Ethernet ports into an 11-rack-unit form factor is only the beginning for Arista Networks' DCS-7508 data center core switch. Read More

Streaming vs. proxy deep packet inspection
The evolving nature and delivery schemes of viruses, malware and spyware have radically changed the scope and best practices of network security. Data inspection at the application-content level is necessary to protect against sophisticated hacking schemes. In the pursuit of application-level protection, "deep packet inspection" (DPI) has become the preferred approach. There are two core DPI approaches: proxy-based and stream-based DPI. Read More

Designing 'iPad WLANs' poses new, renewed challenges
Complications that the influx of Apple iPads and iPhones bring to enterprise Wi-Fi networks and wireless LAN administrators are illustrated vividly at The Ottawa Hospital in Ontario. Read More


WHITE PAPER: BMC

Optimizing Business Processes in Today's Enterprises
What is workload automation, and how does it compare to traditional job scheduling? IDC tackles these questions and more in a new white paper. You'll read about: • Key factors increasing IT complexity – and how to manage them • Building an automation strategy • Definition and components of today's workload automation software Learn More

LTE option poses data dilemma for iPad, smartphone users
The new iPad's LTE option, which allows access to fast 4G networks, has also shocked some customers who found they can eat up an entire month's worth of data watching just a couple hours of streaming video. Read More

Three-stream Wi-Fi hits the mark
The rapid adoption of 802.11n has become a significant milestone in the history of wireless LANs. The MIMO-based technologies used in most 802.11n systems provide enough throughput, reliability, and rate vs. range performance to effectively remove the last major barriers to the broad adoption of WLANs in the enterprise. Read More

Big news for IPv6: Akamai to launch service in April
Akamai will offer IPv6 services to its entire customer base in April -- a long-awaited move that will be a major boon to the adoption rate of the next-generation Internet Protocol. Read More


WHITE PAPER: HP, Microsoft & Intel

Accelerate OLTP database workloads
HP and Microsoft® recognize the need for compelling transactional database solutions that bring together these best of breed technologies, based on open standards and at lower total cost of ownership versus expensive one size fits all alternatives. Learn more

What you need to know about 802.11ac
A question we're hearing with increasing frequency concerns the upcoming 802.11ac standard, which promises to do to 802.11n what .11n did to .11g. While the IEEE 802.11ac standard likely won't be completely finished before the end of 2013, and, while the Wi-Fi Alliance similarly has issued no interoperability criteria for 802.11ac, consumer-grade products claiming compliance with the aforementioned 802.11ac standard could be on store shelves as soon as the middle of 2012. Read More

Tech job seekers less likely to be asked for social-media passwords
There's been a good amount of talk recently about employers asking for the login information of job applicants. So, should those in the tech world expect the question to be asked the next time they're in an interview? Read More

Vidyo sets up program for virtual video network operators
Vidyo is announcing a new program for service providers, enabling cloud-based video services it says could sell for $30 per month. Read More

Qualcomm adds IPv4/IPv6 to embedded Wi-Fi chip
Qualcomm has released a low-power 802.11n radio chip designed for embedded machine-to-machine wireless communications for smart building and smart appliance applications. Read More



SLIDESHOWS

Review: Android-based Wi-Fi stumblers
Four easy-to-use wireless management and security tools that cost under $2.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 20 iPad business apps every CIO should want
  2. Arista 10G switch: Fast and flexible
  3. Facebook warns employees not to ask job applicants for log-in credentials
  4. Designing 'iPad WLANs' poses new, renewed challenges
  5. If it ain't broke, don't fix it: ancient computers in use today
  6. Cisco losing router sales to HP?
  7. Figuring out the data center fabric maze
  8. Tech job seekers less likely to be asked for social-media passwords
  9. What IT managers say to get the CIO's OK
  10. 7 steps for thwarting hactivists

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: