Search This Blog

Friday, September 26, 2014

Chambers again dashes EMC speculation

Three new (and a few old) cloud computing challenges stymie government rollouts | The FBI's big, bad identification system

Network World Cisco

Chambers again dashes EMC speculation
As he has done several times before, Cisco CEO John Chambers dismissed speculation that his company may acquire storage giant EMC. Reports surfaced this week that EMC was shopping itself around as a candidate for a “merger of equals,” and had talked to HP and Dell about possible linkups.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Instart Logic

A New, Better Approach for Web Experiences across Devices
For media and entertainment companies intent on delivering high definition web experiences across all devices, web performance can make or break their engagement levels. Learn more>>

WHITE PAPER: NetApp

The Evolving Public Cloud Landscape
ESG research indicates that the corporate usage of public cloud computing in the form of cloud-based infrastructure services (i.e., IaaS), business applications (i.e., SaaS), and/or application development (i.e., PaaS) continues to grow. View now>>

Three new (and a few old) cloud computing challenges stymie government rollouts
In 2012 when the Government Accountability Office reviewed the feds cloud computing effort, it found seven core challenges to moving impeding the administrations’ move toward the cloud.+More on Network World: The FBI’s big, bad identification system+In the two years that have passed, the GAO this week reported that government agency use of cloud computing has grown, but a few new challenges have cropped up that hinder widespread cloud adoption.To read this article in full or to leave a comment, please click here Read More

The FBI's big, bad identification system
"Image by ShutterstockThis month the FBI pronounced its powerful new crime fighting weapon -- the Next Generation Identification -- is at full operational capability. NGI replaced the Integrated Automated Fingerprint Identification System (IAFIS), the Bureau’s longstanding repository for fingerprints. But that’s not all it does. NGI uses a variety of high-tech tools and algorithms to combat all manner of offenses. Here we take a look at some of the tools the FBI will be using.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: EMC Corporation

Countering Threats By Modeling "Normal" Website Behavior
Check out this informative technology dossier to explore the ins and outs of using big data analysis and web-user profiling to protect your company against cyber threats. Read Now

Networking pioneer Bob Metcalfe hails Ethernet-as-a-Service effort
The Metro Ethernet Forum this week announced intentions to define parameters for Ethernet network-as-a-service (NaaS), an effort Ethernet inventor Robert Metcalfe hailed as "a new network paradigm." Read More

Saisei says don't play games with the hybrid WAN
This week, a startup called Saisei unveiled what it calls the first product in a market known as Network Performance Enforcement. Read More


WHITE PAPER: Qualys Inc.

Best Practices for Selecting a VMSolution
Automated Vulnerability Management (VM) solutions help you discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented. Learn More>>

More Alarming Data on the Cybersecurity Skills Shortage
Network security skills and staffing continues to lag at enterprise organizations. Time to sound the alarm? Read More

Why Cisco lost two key officials in data center, cloud
Company too slow to respond or not committed enough to newer networking trends Read More


SLIDESHOWS

The wild world of workplace wearables

Here are some examples of wearables coming to a variety of vertical industries.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Microsoft rolls out free Office 365 for Students, but hits activation snag

2. Apple yanks buggy iOS 8 update

3. Why Cisco lost two key officials in data center, cloud

4. iOS 8 tips and tricks you need to know

5. No, Apple's iPhone 6 Plus isn't too big

6. 10 (mostly) free Exchange admin tools

7. First Look: BlackBerry Passport

8. Networking pioneer Bob Metcalfe hails Ethernet-as-a-Service effort

9. 12 predictions for the future of programming

10. Ex-Cisco employee pleads guilty to second-degree murder in 'Google Maps case'


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: