Network World Daily News AM | | L. A. Cicero, via Stanford News Service Following is the text of the address by Bill and Melinda Gates, philanthropists and co-chairs of the Bill & Melinda Gates Foundation, as prepared for delivery at Stanford University's 123rd Commencement on June 15, 2014. Microsoft co-founder Bill Gates recently stepped aside as Microsoft chairman and is now an advisor to the CEO. See a video recap of the Stanford speech here.To read this article in full or to leave a comment, please click here | | Issue highlights 1. 10 amazing features Windows 8 and Windows Phone 8 need to share 2. Why the Tail-F acquisition is a big win for Cisco 3. Open Networking: The Whale that swallowed SDN 4. Microsoft trims Surface Pro 2 prices as sales of successor loom 5. Six ways to prevent a breach like the one at AT&T 6. "H4CKERS WANTED" report: NSA not having trouble filing cybersecurity jobs 7. Report: Neither iOS nor Android inherently more secure than the other 8. NetApp gets serious about all-flash shared storage with FAS8080 EX array 9. Telltale signs of ATM skimming | RESOURCE COMPLIMENTS OF: LeaseWeb Get into the driver's seat and create your own virtualized infrastructure on our Private Cloud. Dedicated cores for every instance. Available for a flat fee. Learn more | Building toward One Microsoft, all the timeAlthough Windows and Windows Phone now have more in common than ever, Microsoft still hasn't quite nailed the "one Microsoft" experience that it's been aiming for. Spend enough time with these two operating systems, and chances are you'll be longing for features that are available on one, but not the other.To read this article in full or to leave a comment, please click here READ MORE | This morning, Cisco announced its intention to purchase Sweden-based Tail-f Systems for about $175 million in cash and retention-based incentives. That seems reasonable for a software company that did about $30 million last year and is well aligned with the emerging SDN/NFV markets. Additionally, being headquartered in Sweden means Cisco can pay for this out of its foreign war chest instead of tapping into domestic cash.While Tail-f does have some enterprise relevance, it's really more of a service provider product. The company is well known for managing and orchestrating multi-vendor environments and has many service providers as customers, including AT&T and Deutsche Telekcom AG. Having AT&T as a customer is of particular interest given all the news around Domain 2.0 and Cisco being left out of the initial six. Now Cisco has a foot in the door of Domain 2.0.To read this article in full or to leave a comment, please click here READ MORE | The year is 2011, the Open Networking Foundation has just been formed by the largest cloud and telecom service providers, software giants and academia – all of whom united at the inaugural Open Networking Summit under the common theme that the networking industry had fallen behind, its closed model stifled innovation and was not keeping up with the rest of the computer science discipline or the needs of emerging application and business requirements.As you can imagine, this message was not warmly received by all of the networking incumbents who were squarely implicated. As a result, many responded by indicating that these SDN cloud and software guys and academics didn't really understand networking, and that whatever technologies the incumbents already had were 'real SDN'. According to early incumbent rhetoric, OpenFlow was essentially a science project driven by idealists who didn't understand the real complexities of networking.To read this article in full or to leave a comment, please click here READ MORE | WEBCAST: Network Instruments This webcast discusses five best practices on how to successfully optimize and manage UC, as well as how to gain clear picture of overall performance and quickly troubleshoot when the inevitable issues arise. Learn More | Discounts 2013's model by 10%-11% READ MORE | A data breach like the one recently reported by AT&T demonstrates that security policies alone are only a paper tiger without the technological teeth to make sure they are enforced, experts say.AT&T reported last week that unauthorized employees of one of its service providers accessed the personal information of AT&T wireless customers. The exposed data included social security numbers and call records.[AT&T Mobility data breach]To read this article in full or to leave a comment, please click here READ MORE | While there's a notion that a dearth of cybersecurity professionals the shortage is most acute at the "high end" where $250,000 salaries are not uncommon for those who combine technical and managerial skills. That's according to the RAND Corp. report today on the topic, which also looked at how well the National Security Agency and other military-focused agencies were recruiting cybersecurity pros. The "H4CKERS WANTED" report from RAND, the non-profit policy think tank funded by the U.S. government and private endowment, looked at whether cybersecurity jobs are going unfilled, especially in the federal government, and if so, why. Co-authored by Martin Libicki, David Sentry and Julia Pollak, the RAND report reaches the conclusion that in the spectrum of the tasks that cybersecurity professionals might do, two types stand out as hard to find and recruit. In addition to the managerial job often thought of as the "chief information security officer" these days, it's also the talented geeky few who can figure out that highly stealthy attacks are occurring or who can find "the hidden vulnerabilities in software and systems that allow advanced persistent threats to take hold of targeted systems."To read this article in full or to leave a comment, please click here READ MORE | WEBCAST: Brocade Communications Are you faced with increasing pressure to deploy technology faster? You're not alone. This year, over half of enterprises will be prioritizing building a private cloud, a concept introduced less than five years ago. View Now>> | Apple's tight vetting of mobile applications gives it a security edge over Android, but there are still several ways for attackers to steal data from iOS devices, a mobile security company warned in a report Tuesday.The report looked at the risk factors facing users of the platforms, concluding that enterprises still face data breach risks regardless of the platform used."Neither iOS nor Android is inherently more secure than the other," according to Marble Security. "The risks to enterprises allowing employees to bring in their own devices, whether iOS or Android-based, are not that dissimilar."To read this article in full or to leave a comment, please click here READ MORE | Growing demand for flash continues to rock enterprise storage, with NetApp becoming the latest big vendor to shape a new product around the high-speed media.On Tuesday, NetApp introduced the FAS8080EX, a shared array that is optimized for use with pure flash. While all-flash arrays are still high-end items for enterprises and service providers with especially high performance requirements, flash is expected to make up a bigger part of data centers over time.NetApp boosted the power of its FAS series in February when it introduced the FAS8000. With Intel Ivy Bridge processors and increased memory, the 8000 series is now optimized for flash, though it had already been configurable for all flash, said Nathan Moffitt, director of storage platforms marketing.To read this article in full or to leave a comment, please click here READ MORE | ATM skimming schemes involve installing fraudulent equipment that criminals use to steal credit and debit card numbers and PINs. Industry estimates calculate that ATM fraud costs banks and consumers billions of dollars annually. Here are a few things to look for the next time you need to hit the ATM. READ MORE | WHITE PAPER: Kemp Technologies What you should know about SDN and Load Balancing/ADC's From Gartner & Kemp Technologies. Enterprises Planning Private Clouds should include Software Defined Networking with major network changes Learn More | | | | | | | |
No comments:
Post a Comment