High-tech

High-tech
Light

Friday, January 17, 2014

Juniper lights up Firefly for virtual-machine security

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jan 16, 2014 3:03 PM
Subject: Juniper lights up Firefly for virtual-machine security
To: <aquarianm@gmail.com>
Cc:

The weirdest, wackiest and coolest sci/tech stories of 2013

This Raspberry Pi Tablet is absolutely gorgeous

Network World Daily News PM
January 16, 2014
Share this email

Juniper lights up Firefly for virtual-machine security

Juniper today announced its Firefly Suite for virtual-machine security, a set of software-based products for VMware and KVM that contain the security and switching capabilities found in Juniper's SRX Series Services Gateway, as well as Junos Space Virtual Director.

READ MORE
 

Issue highlights

1. The weirdest, wackiest and coolest sci/tech stories of 2013

2. This Raspberry Pi Tablet is absolutely gorgeous

3. INSIDER How IT found savings by tackling (instead of cringing at) photocopiers

4. Celebrate Mac@30: For $110-$140

5. Prediction: Windows 9 will hit the market in 2014

6. Why even ISPs will regret the end of net neutrality

7. New Fujitsu Labs tech can do batch searches of encrypted data

8. 50GB of free cloud storage when you download the new Box iOS app

9. Relive the 1990s with these ancient, still-functioning websites

10. Microsoft's Build 2014 dev conference sells out

11. How to Bring Shadow IT Under Control

12. An OpenStack Primer for IT Executives

13. Cisco fixes remote access vulnerabilities in Cisco Secure Access Control System

14. A year after Swartz suicide, reform of anti-hacking law remains elusive

15. Samsung Galaxy S5 rumor roundup

16. 11 great places for a coding vacation

WHITE PAPER: SAP

Get Started with SAP HANA ebook

This ebook introduces the SAP HANA in-memory computing platform and describes how it can transform your business. SAP HANA provides standard offerings to help with a range of business issues and can be incorporated into your current infrastructure, with preconfigured software, content and business-user enablement. Learn more

The weirdest, wackiest and coolest sci/tech stories of 2013

From bathroom malware and the mystery Google barge to Chinese Moon landings and humanoid robots it has been one wacky high-tech year READ MORE

This Raspberry Pi Tablet is absolutely gorgeous

The PiPad has everything you could want in a tablet, and it was made by hand with a Raspberry Pi. READ MORE

INSIDER

How IT found savings by tackling (instead of cringing at) photocopiers

Say the word 'photocopier,' and most IT leaders have visions of skilled workers wasting time undoing paper jams. But for Karl Collins, vice president of technical services and infrastructure at SavaSeniorCare, IT's newfound ownership of enterprise-wide photocopiers has yielded $739,000 annual savings and increased visibility among executives. READ MORE

Celebrate Mac@30: For $110-$140

A celebration of the 30th anniversary of the launch of the original Apple Macintosh computer is set for Saturday, Jan. 25 in Cupertino, not far from Apple's campus (the Mac actually launced on Jan. 24 1984, but close enough for 30th anniversary...). READ MORE

Prediction: Windows 9 will hit the market in 2014

Most are expecting Windows 9 to drop in 2015. That may be what Microsoft wants us to think, but it might not be the reality. READ MORE

WHITE PAPER: Limelight Networks

7 Principles to Improve Web Site Availability

Users hate to wait so when your web site doesn't respond the way visitors expect, your business suffers. This guide offers strategies for scaling your web infrastructure to meet web availability and performance SLAs, enhancing both speed and performance (there is a difference), and delivering superior user experience on any device, in any location. Learn More

Why even ISPs will regret the end of net neutrality

A U.S. appeals court struck down the FCC's net neutrality rules. Here's why we're all going to pay the price. READ MORE

New Fujitsu Labs tech can do batch searches of encrypted data

If snooping by the U.S. National Security Agency isn't enough to make you worry about your privacy, Japan's Fujitsu Laboratories has developed a fast method to perform secret searches of data that is encrypted. READ MORE

50GB of free cloud storage when you download the new Box iOS app

The new Box iOS app is intuitive and clean. Did we mention the 50 free GBs? READ MORE

Relive the 1990s with these ancient, still-functioning websites

READ MORE

Microsoft's Build 2014 dev conference sells out

Microsoft sold out its April Build developers conference yesterday, running through the $2,095 tickets in about 31 hours. READ MORE

RESOURCE COMPLIMENTS OF: CIO Perspectives Atlanta Conference

Invite to CIO Perspectives Atlanta Conference - March 12

Agenda highlights include: Innovative Approaches to Digital Disruption & Business Model Change; Transforming the IT-Business Partnership; Finding and Keeping Great IT Talent; Strategies for C-Suite Leadership & Success; Innovative Approaches to Digital Disruption & Business Model Change. Visit our website and register today!

How to Bring Shadow IT Under Control

Most business units these days are leveraging cloud services, and a majority of them are bypassing IT to do it, according to a new study. While many IT departments want to take charge of provisioning cloud services, it may make more sense to get your arms around compliance and governance first. READ MORE

An OpenStack Primer for IT Executives

OpenStack, the open source cloud computing platform, has garnered the support of more than 200 IT vendors. Enterprises embrace the platform for its flexible, hardware-agnostic architecture -- but they should realize that this modularity can come at a cost. READ MORE

Cisco fixes remote access vulnerabilities in Cisco Secure Access Control System

Cisco Systems has released software updates for its Cisco Secure Access Control System (ACS) in order to patch three vulnerabilities that could give remote attackers administrative access to the platform and allow them to execute OS-level commands without authorization. READ MORE

A year after Swartz suicide, reform of anti-hacking law remains elusive

Internet activist Aaron Swartz's suicide last January galvanized calls for an overhaul of the Computer Fraud and Abuse Act, used widely by the government to prosecute misdeeds that critics say the law was never intended to address. Yet, one year after Swartz's death, efforts to reform the law have made little headway. READ MORE

Samsung Galaxy S5 rumor roundup

Like a frog in a cooking pot, I didn't notice that rumors about the Samsung Galaxy S5 had really hit the boil until it was too late. But now, with steaming clouds of hearsay and a distinct aroma of scuttlebutt in the air, all that's left is to hope that the results will at least prove savory for the consumer. (Side note – can any readers tell me whether frog legs are any good? I'm curious, but also a little scared.) READ MORE

11 great places for a coding vacation

If you're planning a getaway to focus on doing some serious coding, you could do a lot worse than these locations READ MORE

WEBCAST: Egnyte

Consider Hybrid Approach to File-Sharing

Security. Scalability. Control. These are just some of the many benefits of enterprise cloud file-sharing that you'll discover in this KnowledgeVault, packed with short videos, white papers and demos. View Now!

SLIDESHOWS

The worst data breach incidents of 2013

These businesses and government agencies lost the most personal and financial records due to hackers or security mishaps last year.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. How to make 96,000 pounds of WWII machinery into high-tech research platform

2. Microsoft Hyper-V bangs away at VMware's popularity

3. Cisco offers advice on Target breach

4. Relive the 1990s with these ancient, still-functioning websites

5. The mixed fate of Sun tech under Oracle

6. SDN will never happen, says VMware exec

7. Juniper should reevaluate switching, security products investor says

8. 18 great uses for an old Android device

9. Chrome 32: First look

10. Massive denial-of-service attacks pick up steam, new nefarious techniques

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment