High-tech

High-tech
Light

Saturday, September 13, 2014

Will NSX snub hurt Cisco's integrated infrastructures?

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Sep 11, 2014 9:00 PM
Subject: Will NSX snub hurt Cisco's integrated infrastructures?
To: <aquarianm@gmail.com>
Cc:

  13 Things to Do on a Conference Call | Funny videos about the iPhone 6 and Apple Watch...

 
  Network World After Dark  

Will NSX snub hurt Cisco's integrated infrastructures?
Did Cisco and NetApp shoot themselves in the foot by rejecting VMware's NSX on FlexPod? Read More
 


WHITE PAPER: Red Hat

Modernize Your IT Infrastructure & Streamline Operations
Increasing line of business demands? Shrinking IT budget? See how Red Hat can help you meet growing. Read Now

WHITE PAPER: IBM

Magic Quadrant for Data Masking Technology
IBM is a leader in Gartner Inc's Magic Quadrant for Data Masking Technology. Gartner reports that data masking should be mandatory for enterprises using copies of sensitive production data for application development, analytics or training. Read the full report to learn about IBM. Learn more!

13 Things to Do on a Conference Call
"Image by ShutterstockJumping on a conference call has become so common in today's blended work-life-mobile lifestyle that it has become a cliche. We've become experts at dialing in remotely and being sneaky about our whereabouts and activities. In a recent InterCall survey, four out of five respondents admitted to working on unrelated items while on a conference call. Of course, we're all claiming to be the one out of five doing it right.To read this article in full or to leave a comment, please click here Read More
 

Funny videos about the iPhone 6 and Apple Watch...
Going through withdrawal over the sudden drop-off in Apple iPhone 6 and iWatch (now formally Apple Watch) scuttlebutt that has sustained us over the past year? Laugh it off with these mostly safe for work parody and comedy videos. Apple Apple And don't worry, iPhone 7 rumors won't be long.The Conan treatmentTo read this article in full or to leave a comment, please click here Read More
 

Former White House spokesman 'live tweeting' his recollections of 9/11
He's chosen an odd format for the task, but former White House spokesman Ari Fleischer's ongoing string of tweets today about his recollections of being at the side of President Bush on 9/11 makes for compelling reading nonetheless.Most of the anecdotes he is sharing -- from memory and six pages of extemporaneous notes he took that day – will be familiar to anyone steeped in the details of that horrible day. The tweets are timed to coincide with events as they unfolded, so if you'd like to read them in chronological order you'll have to scroll down to the first one.To read this article in full or to leave a comment, please click here Read More
 

SAP spices up its predictive analytics and visualization apps
SAP has made a series of updates to its InfiniteInsight predictive modeling software and Lumira data-visualization tool in a bid to shore up its foothold in the analytics market.InfiniteInsight 7.0 adds the ability to use geospatial dimensions such as latitude and longitude within predictive models, according to Thursday's announcement. "This allows you to make the most of geographic data and provides you with much more information than simply using ZIP codes," SAP said in a recent blog post on the release.Many companies use predictive modeling to take informed stabs at how customers will behave in the future, based on data sets that describe actions they took in the past. Support for geospatial data means an analyst could examine sequences of places customers visited, as well as segment customers based on their location, SAP said.To read this article in full or to leave a comment, please click here Read More
 

Senators ask Apple, Home Depot for information on breaches
Two lawmakers ask the companies to explain the cause of recent data breaches Read More
 

New survey raises questions about net neutrality regulation, advocacy group says
  More than two-thirds of U.S. respondents in a new survey say that decades-old telephone regulations should not apply to the Internet, which suggests that the U.S. Federal Communications Commission should stay away from reclassifying broadband as a regulated public utility, an advocacy group said.Many groups calling for the FCC to pass strong net neutrality rules have called on the agency to reclassify broadband as a regulated common carrier, similar to long-standing regulations governing the telephone system, but California-based tech advocacy CALinnovates pointed to a survey the group commissioned that it said suggests many U.S. residents are wary of heavy-handed regulations for the Internet.To read this article in full or to leave a comment, please click here Read More
 

The many looks of the Apple Watch
"Image by REUTERS/Stephen LamOne of the many things Apple got right with its new Watch is that it plans to give consumers the option to choose between varying styles and multiple bands. A watch is in many ways a personal fashion statement, and releasing a one-style-fits-all device a la the Moto 360 is arguably a bad strategy. The Apple Watch thankfully comes in assortment of styles, from sporty to chic. There are about 21 different looks users can choose from once the device goes on sale in early 2015. Here's what they all look like.To read this article in full or to leave a comment, please click here Read More
 

Enterprise Annexation of Endpoint Security
When it comes to strong cybersecurity endpoints and servers have often been second-class citizens when compared to the network.  I described this situation in a March 2013 blog.  According to ESG research, 58% of security professionals working at enterprise organizations (i.e. more than 1,000 employees) said that network security processes, skills, and technical controls were "much more thorough" or "somewhat more thorough" than server security processes, skills, and technical controls. Why the discrepancy?  Network security includes mature technologies like firewalls, IDS/IPS, and Web Application Firewalls (WAFs).  Furthermore, network security often involves a lot of network design and engineering for segmentation, access control, and traffic management.  Alternatively, endpoint and server security is typically based on nothing more than AV software and its associated signature downloads and occasional scans.To read this article in full or to leave a comment, please click here Read More
 

The Hybrid WAN requires a new approach to network optimization
It's been well documented that the current wide area network (WAN) and data center interconnect (DCI) architecture has been in place now for well over 20 years. That architecture – the legacy one we've all become familiar with – was designed for the days when no one expected much from the network. Slow, fast, whatever. It was the Internet and it was expected to be flaky. Not so anymore, though. We rely on the cloud and mobility to drive our lives. Businesses are network-centric, and that's driving the evolution towards a new WAN model.Now that the WAN is finally evolving, I think it's time to take a look at the infrastructure that's used to optimize it. The majority of equipment used to optimize the WAN is designed to solve a specific problem on a private, controlled network. The mismatch between legacy infrastructure and the demands of today's WANs have led to the following problems:To read this article in full or to leave a comment, please click here Read More
 

9 nightmare sci-fi virtual realities that are closer than you think
Emerging technologies in virtual and artificial reality blur the line between science and fiction Read More
 

 

SLIDESHOWS

7 sexy smartphone technologies coming your way

A slew of new technological features are (or could be) coming to future smartphones. Here are seven that have been in the news over the last few years.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Windows 9 to users: I'm listening

2. Five million Gmail addresses and passwords dumped online

3. Internet of Overwhelming Things

4. What online news looked like on 9/11

5. Man arrested on drug charges after butt-dialing 911

6. The Linux desktop-a-week review: ratpoison

7. iPhone 6, Apple Watch features: Android's been there, done that

8. 5 questions to ask before you take a tech job

9. Last-minute iPhone 6 rumors: Release date, water proof, shatter proof and more

10. First Look: iPhone 6 and iPhone 6 Plus


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment