High-tech

High-tech
Light

Wednesday, July 30, 2014

A breakdown of Cisco ACI pricing

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jul 30, 2014 8:11 AM
Subject: A breakdown of Cisco ACI pricing
To: <aquarianm@gmail.com>
Cc:

Zero-day flaws found in Symantec's Endpoint Protection

BlackBerry buying German firm for voice encryption

Network World Daily News AM
July 30, 2014
Share this email

A breakdown of Cisco ACI pricing

Software licensing, hardware costs, and bundles for starters and Catalyst 6500 upgrades

READ MORE
 

Issue highlights

1. Zero-day flaws found in Symantec's Endpoint Protection

2. BlackBerry buying German firm for voice encryption

3. Abuse of Larry Ellison continues unabated

4. Guns, vandals and thieves: Data shows US networks under attack

5. Amazon says $9.99 e-books will boost revenue, including for Hachette

6. Sight: Web content indexing the hard, user-unfriendly way

7. NASA breakthrough improves 3D printing in space

8. iPhone gets first free app for encrypting voice calls

9. Samsung, Apple still dominate smartphones, but their shares slip

10. Twitter more than doubles its sales, stock soars

11. The copper telephone line over time

WEBCAST: Cisco Systems

Evaluating Leading Breach Detection Systems

Today's constantly evolving advanced malware and Advanced Persistent Threats (APTs) can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to confront these advanced threats before, during and after attacks. Learn more >>

Zero-day flaws found in Symantec's Endpoint Protection

Offensive Security said the flaws could be used to gain full system access READ MORE

BlackBerry buying German firm for voice encryption

BlackBerry has always touted its mobile devices as secure. But now it plans to make them "more secure" by acquiring a German company that specializes in voice encryption. BlackBerry will acquire Secusmart GmbH, which offers encryption systems to scramble voice calls, and also data communications. The company was silent about the details of the transaction, except to say it hinges on regulatory approvals. + ALSO ON NETWORK WORLD Top tech mergers in 2014 + The company also announced a plan to automatically scan Android apps selected for download by BlackBerry smartphone users. BlackBerry Guardian already combines automated and manual app analysis with Trend Micro's Mobile App Reputation Service, and continuously monitors apps in the BlackBerry World online store. Starting with the release later this year of the square-shaped BlackBerry Passport "phablet," Guardian will autoscan any Android app that the device downloads from any source. Suspicious apps are flagged, and the user can cancel the installation or go forward with it. [CrackBerry has a pre-release hands-on with the Passport.]To read this article in full or to leave a comment, please click here READ MORE

Abuse of Larry Ellison continues unabated

How much of this abuse does the Oracle board of directors expect its rock star CEO Larry Ellison to endure?How much of this could any CEO endure?First, Ellison saw his total compensation slashed 18% in 2013 over 2012.And now on top of that humiliation comes word in a regulatory filing that Oracle will be awarding Ellison fewer than half the stock options he has received in previous years.Oh, sure, the heartless and the hate-mongers will harp on the fact that the 18% reduction still left Ellison with a total compensation package worth $78.4 million, highest in the tech industry. They'll note that the 3 million stock options he's in line to receive, while no 7 million, remain nothing to sneeze at. And that his net worth of $42 billion makes him the third richest American.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: BitSight Technologies

Utilizing Security Ratings for Enterprise IT Risk Mitigation

Businesses need actionable, objective and continuous intelligence in order to effectively address cyber threats. In this white paper, learn how BitSight Security Ratings help businesses streamline security operations, remediate threats and engage business executives in cyber security strategy. View now

Guns, vandals and thieves: Data shows US networks under attack

Early one morning in April last year, someone accessed an underground vault just south of San Jose, California, and cut through fiber-optic cables there. The incident blacked out phone, Internet and 911 service for thousands of people in Silicon Valley.Such incidents, often caused by vandals, seem fairly common, but exactly how often do they occur? Since 2007, the U.S. telecom infrastructure has been targeted by more than a thousand malicious acts that resulted in severe outages, according to data obtained by IDG from the Federal Communications Commission (FCC) under the Freedom of Information Act.The FCC requires carriers to submit reports when an outage affects at least 900,000 minutes of user calls, or when it impacts 911 service, major military installations, key government facilities, nuclear power plants or major airports.To read this article in full or to leave a comment, please click here READ MORE

Amazon says $9.99 e-books will boost revenue, including for Hachette

Amazon.com believes that pricing ebooks at US$9.99 will boost sales by over 74 percent as the books are highly price-elastic.If customers would buy 100,000 copies of a particular ebook at $14.99, then they would buy 174,000 copies of the same ebook at $9.99, boosting total revenue to $1.7 million from about $1.5 million if the book is sold at $14.99, Amazon said in a post Tuesday.The company said its estimates of the price-elasticity of ebooks were based on repeated measurements across many titles.To read this article in full or to leave a comment, please click here READ MORE

Sight: Web content indexing the hard, user-unfriendly way

I just got off the phone with startup called Landscape Mobile, that publishes an app called Sight, and which claims: Sight [is] an app that takes an image — a screenshot — and finds the article behind the image, retrieves the content, and then formats it for a better reading experience. Let me clarify that for you … when there's content displayed on your iOS screen that exists on the Web and you take a screenshot, the Sight app searches the Internet for that content and, if found, adds the page to a list that Sight keeps on your iDevice. Selecting  an item on the list displays the page content reformatted to be more readable with a link at the top that will take you to the target page.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Citrix Systems

Tolly Test Report - How NetScaler outperforms F5

Measurable performance is a key factor when selecting an Application Delivery Controller(ADC) solution for modern data centers. In this report, Tolly evaluates the performance of several Citrix NetScaler ADC models vs. that of comparable products. Learn how NetScaler fared and provided up to 480% the performance of F5. Learn more

NASA breakthrough improves 3D printing in space

NASA's new technique allows 3D printers to create one object composed of multiple types of materials. READ MORE

iPhone gets first free app for encrypting voice calls

An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers.Signal comes from Open Whisper Systems, which developed RedPhone and TextSecure, both Android applications that encrypt calls and text messages.The application is compatible with RedPhone and eventually RedPhone and TextSecure will be combined in a single Android application and called Signal as well, according to a blog post.To read this article in full or to leave a comment, please click here READ MORE

Samsung, Apple still dominate smartphones, but their shares slip

Vendors mainly from China are offering low-cost, high-quality alternatives, IDC says READ MORE

Twitter more than doubles its sales, stock soars

Shares were trading at around $52 in after-market hours, up more than 30 percent READ MORE

The copper telephone line over time

My daughter, Emma, soon to be 13, is in the office with me today and I had some fun sharing with her a couple of facts from this Alcatel-Lucent infographic about the history of the copper telephone line. Two examples: In 1918 it took an average of 15 minutes just to set up a call and it wasn't until 1940 that telephone numbers allowed for direct customer dialing.I'm glad she didn't ask if I remembered these milestones. To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: BMC Software

IT Friction and Your Organization

This report outlines key issues that cause friction between business users and IT. Learn More

SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Windows 9 in November? Don't believe it

2. 10 amazing (and bizarre) drone discoveries

3. About those alleged backdoors in Microsoft products...

4. 17 obscure Windows tools and tricks too powerful to overlook

5. BYOA: Bring Your Own Authentication

6. Top 25 free tools for every Windows desktop

7. Cisco ready to ship ACI controller

8. Say goodbye to desktop phones

9. New products of the week 07.28.2014

10. Malwarebytes questions poor showing in anti-malware protection-evaluation lab testing

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment