High-tech

High-tech
Light

Friday, October 24, 2014

Cisco slashes stake in VCE joint venture with EMC/VMware

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Oct 22, 2014 8:22 AM
Subject: Cisco slashes stake in VCE joint venture with EMC/VMware
To: <aquarianm@gmail.com>
Cc:

11 ways to re-energize your IT career

Why EMC acquired VCE from Cisco

Network World Daily News AM
October 22, 2014

Cisco slashes stake in VCE joint venture with EMC/VMware

EMC confirmed on Wednesday that its VCE converged infrastructure joint venture with Cisco and VMware is heading into a new phase, with EMC taking control of the business and Cisco drastically cutting its stake in it.

READ MORE
 

Issue highlights

1. 11 ways to re-energize your IT career

2. Why EMC acquired VCE from Cisco

3. Microsoft discloses zero-day flaw, publishes quick fix

4. Arista VP Gourlay leaves company

5. INSIDER Free and Cheap Ways to Learn About Network Administration

6. Get More Network World Newsletters!

7. Symantec sees rise in high-traffic DDoS attacks

8. Industry can head off IoT privacy rules, former US official says

9. Ford wants to keep drivers alert on the long road to autonomous cars

10. US Justice Dept. focuses new squad on cybercrime combat

11. Top Mac-o-lanterns from around the Web

WHITE PAPER: Tintri Inc.

Backup and Recovery Best Practices with Tintri VMstore

This Tintri Best Practice Guide for Backup and Recovery will assist individuals who are responsible for the design, deployment, and DR of VMs deployed on Tintri VMstore systems. View now

11 ways to re-energize your IT career

Mid-career blues, begone. Here are 11 actionable items tech pros can tackle to keep moving on up in IT. READ MORE

Why EMC acquired VCE from Cisco

What motivated EMC to take over VCE, and why Cisco saw it as a good move. READ MORE

Microsoft discloses zero-day flaw, publishes quick fix

Microsoft has published a temporary fix for a new zero-day flaw that affects nearly all versions of Windows and is currently being exploited via PowerPoint.The flaw affects all Windows releases except Windows Server 2003, the company wrote in an advisory Tuesday. It can be exploited if a user is coaxed into opening a malicious Office file containing an OLE (object linking and embedding) object. OLE can allow a user to edit a PowerPoint file from within a Word document, for example."At this time, we are aware of limited, targeted attacks that attempt to exploit the vulnerability through Microsoft PowerPoint," the company said.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: VeriSign

Turn to the Cloud for Website Availability & Protection

Domain name system (DNS) protection is a key component to a comprehensive security plan. One of the most efficient ways to bolster DNS security is to deploy a cloud-based DNS infrastructure. This DNS Security eGuide, will review top cyber threats to DNS and identify five top reasons, along with guidance, on selecting a managed DNS service provider. Learn More>>

Arista VP Gourlay leaves company

Doug Gourlay has left Arista Networks. The vice president of systems engineering is said by Arista PR to be exploring "life beyond Arista" but will be a consultant to the company: Doug is a very talented executive and contributed greatly to Arista's success. We appreciate and thank him for his many contributions and respect his reasons to explore life beyond Arista. He will continue to serve as an executive consultant to the company.To read this article in full or to leave a comment, please click here READ MORE

INSIDER

Free and Cheap Ways to Learn About Network Administration

These nine self-taught labs give you hands-on experience with various networking tasks -- and most don't cost anything. READ MORE

Get More Network World Newsletters!

We have a wide variety of newsletters to satisfy all sorts of IT pros READ MORE

WHITE PAPER: Flexera Software

Achieving Application Readiness Maturity

Is your Application Readiness Process Ready for Change? Learn how to identify where you can make improvements, analyze the steps needed to move up in maturity, and prioritize which steps are most critical, resulting in faster and more reliable application delivery, lower costs and decreased risk. Learn More

Symantec sees rise in high-traffic DDoS attacks

A type of distributed denial-of-service attack, DNS amplification, has risen sharply, according to new research from Symantec.The security vendor said it saw a 183 percent increase in DNS (Domain Name System) amplification attacks from January through August, which abuse recursive DNS resolvers.Recursive DNS resolvers look up a domain name and return an IP address, which can be called into a browser.But these types of servers return a large amount of data. Attackers abuse them by making requests but substituting the IP address of their victims.That directs a large amount of data to the victims, consuming up to 50 times more bandwidth, making it an "amplification" attack.To read this article in full or to leave a comment, please click here READ MORE

Industry can head off IoT privacy rules, former US official says

The Internet of Things is raising a host of concerns over the control of data that could lead to government regulation, but tech companies can rein in those worries on their own if they act fast, according to a former White House technology official.The kinds of information that connected devices can collect, such as health and fitness data, are more intimate than what consumers are used to sharing on the Web, said Nicole Wong, former U.S. Deputy CTO. In addition, it's harder to make users comfortable with the use of that data, she said.Any company that gathers data from consumers has to be transparent about what it collects and how it's used, in order to build trust, Wong said during a panel at the GigaOm Structure Connect conference in San Francisco. Web and mobile products have ways of communicating that message and giving users choices, but many IoT devices don't, she said. As examples, she cited the lights in a consumer's home and future monitoring devices that are injected in the bloodstream.To read this article in full or to leave a comment, please click here READ MORE

Ford wants to keep drivers alert on the long road to autonomous cars

Self-driving vehicles will make the driver redundant, but long before that, smarter cars may leave the driver thinking about other things.Ford is already studying that problem, anticipating an evolution toward autonomous cars that will take a lot longer than projects by the likes of Google may suggest. For now, the motorist is still in charge—with some help."We still have a driver-centric model. We still think the driver needs to be engaged," said Don Butler, Ford's executive vice president of connected vehicle and services. Drivers and passengers are "more comfortable" when they have some control over the vehicle, he said during a session at GigaOm Structure Connect in San Francisco.To read this article in full or to leave a comment, please click here READ MORE

US Justice Dept. focuses new squad on cybercrime combat

The threat and consequences of cybersecurity attacks today lead the US Department of Justice to reorganize in an effort to better battle the scourge.The changes announced by John Carlin, the Assistant Attorney General for National Security included the appointment of a new Principal Deputy Assistant Attorney General and a new Chief of Staff and Counselor, as well as the creation of a new Deputy Assistant Attorney General position to oversee DOJ's National Security Division's efforts to protect national assets, including its efforts to combat economic espionage, proliferation, and cyber-based national security threats.  This position will oversee the work of the National Security Cyber Specialists (NSCS) Network, consisting of prosecutors in each of the U.S. Attorney's Offices who focus on cyber threats to the national security. To read this article in full or to leave a comment, please click here READ MORE

Top Mac-o-lanterns from around the Web

Apple devotionA snapshot of Apple devotion expressed via carved vegetation.Not a fanboy, really?Poqua on Flickr says: I'm not an Apple fanboy, although I do have a Mac mini. I just like logos.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: ForgeRock

Why Organizations Must Take a Strategic Approach to IRM

Forrester finds that to achieve this securely, companies need identity and access management (IAM) platforms that are adaptable, scalable, responsive, and high velocity. View now>>

SLIDESHOWS

How giant companies see the cloud

16 large enterprises talk about their use of the cloud, their plans, challenges they've run into and how they're approaching the skills issues.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Microsoft goes all-in on hybrid cloud with Azure-in-a-box

2. Mitel takes aim at Avaya with ShoreTel

3. 15 Must-Have Android, iOS apps for business travelers

4. Is your Ethernet fast enough? Four new speeds are in the works

5. Conspiracy Theory With Teeth: Government Allegedly Forced TruTV To Yank FEMA Camps Episode

6. Reorg fallout downplayed by Cisco engineering

7. Ubuntu turns 10: A look back at desktop Linux standard bearer

8. Windows 10: A guided tour

9. 100G Ethernet bringing Large Hadron Collider closer than ever to U.S. researchers

10. Dropbox used for convincing phishing attack

Follow Network World

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment