High-tech

High-tech
Light

Saturday, December 6, 2014

Remember when Cisco sued Apple over the iPhone name?

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Dec 5, 2014 2:33 PM
Subject: Remember when Cisco sued Apple over the iPhone name?
To: <aquarianm@gmail.com>
Cc:

Cisco slaps Arista Networks with patent infringement suit

Cool Yule Tools: Best techie gifts for 2014

Network World Daily News PM
December 05, 2014

Remember when Cisco sued Apple over the iPhone name?

Cisco's blockbuster lawsuits vs. rival Arista Networks aren't the routing and switching company's first high profile court action

READ MORE
 

Issue highlights

1. Cisco slaps Arista Networks with patent infringement suit

2. Cool Yule Tools: Best techie gifts for 2014

3. Why January could be a big month for Windows 10

4. INSIDER IT resume makeover: Top 11 tips from 2014

5. IDG Contributor Network: Bluetooth is about to connect straight to the Internet

6. Wozniak calls Apple garage origin 'a myth'

7. How Docker built a whale from a single container

8. Saisei brings visibility and control to software defined networks

9. Top 10 Tech stories 2014: Backlash! Disrupting the disruptors

10. Bebe Stores says credit card data hacked

11. Intel plunks down billions to expand in mobile market

12. CISOs Should Become Proactive and Influential in SDN Planning, Deployment, and Strategy

13. 7 commonly overlooked ways to tighten cybersecurity

WHITE PAPER: BMC Software

Five Levers to Lower Mainframe MLC Costs

This paper discusses five levers you can use to lower your mainframe MLC costs by up to 20 percent or more. Explore best practices and real-world examples of dramatic savings through a mainframe MLC optimization strategy based on higher visibility, predictability, and automation. Learn More

Cisco slaps Arista Networks with patent infringement suit

Cisco today filed two lawsuits against data center switch competitor Arista Networks for allegedly violating its intellectual property.One suit is for patent infringement, which charges Arista with violating 14 Cisco patents for 12 features in the Arista EOS operating system. The second suit is for extensive copying of Cisco's user manuals and command line structures, right down to the grammatical errors within them."This is not an accident but a strategy," says a source familiar with the matter. "It was a deliberate, brazen and blatant intellectual property violation in order to gain competitive advantage in the marketplace. Arista's shortcutting to get to market and win share."To read this article in full or to leave a comment, please click here READ MORE

Cool Yule Tools: Best techie gifts for 2014

The National Santa Agency has a handle on what everyone wants. READ MORE

Why January could be a big month for Windows 10

A new build, a consumer version, and Cortana are all planned for the start of the year. READ MORE

INSIDER

IT resume makeover: Top 11 tips from 2014

1. Clear Out the ClutterTo read this article in full or to leave a comment, please click here(Insider Story) READ MORE

WHITE PAPER: OutSystems

Mobile App Backlog

New research conducted by Opinion Matters reveals that 85% of enterprises have a mobile app development backlog because they can't cope with business demands. With the average application taking anywhere between three and 12 months to get out the door, this slow approach to app development is resulting in competitive disadvantage. Learn More

IDG Contributor Network: Bluetooth is about to connect straight to the Internet

A new version of Bluetooth, adopted and about to be ratified, is going to make Bluetooth the go-to choice for IoT connectivity, according to the developers. READ MORE

Wozniak calls Apple garage origin 'a myth'

Apple co-founder Steve Wozniak has done this kind of thing before, debunking, or at least degrading, a slice of Apple lore. READ MORE

How Docker built a whale from a single container

Few tech companies are as hot right now as Docker. READ MORE

Saisei brings visibility and control to software defined networks

Many companies are still reluctant to push SDN into production. Solutions like this could make it easier. READ MORE

WHITE PAPER: Riverbed Technology

Data Center Transformation and Its Impact on the Branch

Despite tighter budgets driven by the fragile economy, IT departments remain under intense pressure to deliver additional and higher-performance computing, network and application services worldwide. Learn more >>

Top 10 Tech stories 2014: Backlash! Disrupting the disruptors

Blowing up entrenched business models and picking up the profits that spill onto the floor is a time-honored tradition in tech, these days known by the cliche of the moment, "disruption." This year everyone was trying to push back against those upstarts, whether by buying them like Facebook did, reorganizing to compete with them like HP and Microsoft have done, or just plain going out against them guns blazing, as it seemed that every city and taxi company did with Uber. European courts fought the disruptive effect Google search has had on our very sense of the historical record. But meanwhile, legions of net neutrality supporters in the US spoke up to save the Internet's core value of disruption against the oligopoly of a handful of communications carriers. Here are our picks for the top stories of a very, well, disruptive year.To read this article in full or to leave a comment, please click here READ MORE

Bebe Stores says credit card data hacked

Women's clothing retailer Bebe Stores has become the latest national retailer to be hit by an attack on its credit card payment system.The company said Friday that the cardholder name, account number, expiration date, and verification code could have been stolen by hackers who apparently had access to the company's payment processing system between Nov. 8 and 26.The incident came to light in late November when Bebe said it noticed suspicious activity on computers that operate the payment processing system. Stores affected were the roughly 200 it operates in the U.S., Puerto Rico and the U.S. Virgin Islands.To read this article in full or to leave a comment, please click here READ MORE

Intel plunks down billions to expand in mobile market

Intel has bought its way into the tablet market, but success seems years away in smartphones, despite billions of dollars spent.The allure of mobile devices has led Intel to take some uncharacteristic moves that defy the company's proud tradition of designing and manufacturing chips in-house. Intel has partnered with Chinese companies to build some smartphone and tablet chips, and is relying on third parties to manufacture those chips.Intel bets the partnerships will accelerate its business in China, where smartphone shipments are booming. But the company wants to regain complete control over manufacturing, and on Thursday said it was investing US$1.6 billion over 15 years in a China plant for mobile chip development and manufacturing.To read this article in full or to leave a comment, please click here READ MORE

CISOs Should Become Proactive and Influential in SDN Planning, Deployment, and Strategy

In 2014, SDN gained a lot of momentum and many organizations are already piloting SDN or planning deployment projects for next year.  Good news for network security as SDN holds a lot of promise for improving the role of the network with incident prevention, detection, and response.So who controls SDN infrastructure decisions and who gets input into these decisions?  ESG looked into this question by surveying organizations already deploying SDN.  According to ESG research (note:  I am an ESG employee): 41% of organizations say that the networking team owns SDN infrastructure decisions with no input from any other functional IT groups including infosec. 35% of organizations say that the networking team owns SDN infrastructure decisions but sought out some input from other functional IT groups including infosec. 17% of organizations say that the networking team owns SDN infrastructure decisions but sought out a lot of input from other functional IT groups including infosec. 7% of organizations say that SDN infrastructure decisions are owned by a cross-functional IT team including networking and infosec.  SDN is an innovative networking technology that will greatly impact core switching and routing functions so it's understandable why networking owns technology decisions.  That said, SDN could have an equally important influence on the future of network security.  Kind of makes you wonder why 41% of organizations consider SDN a networking monopoly -- this makes no sense to me.To read this article in full or to leave a comment, please click here READ MORE

7 commonly overlooked ways to tighten cybersecurity

It's OK to be paranoid about every last detail when it comes to security. READ MORE

WEBCAST: EMC

Redefine Your Mission-Critical Cloud with VMAX3

This webinar examines how EMC's VMAX3 storage solution provides unprecedented reliability, agility, cost-effectiveness and power in today's demanding storage environments. Learn More

SLIDESHOWS

14 go-to tools for Mac sysadmins

Mac pro Gerard Allen shares his must-have sysadmin tools for enterprise Apple deployments.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Woz says Apple's legendary garage beginning is a myth

2. 30 years of Cisco: The networking giant's boldest predictions over the years

3. Full speed ahead for 802.11ac Gigabit Wi-Fi

4. Windows 10 could prompt upgrades of 600 million aging PCs

5. Cool Yule Tools: Best techie gifts for 2014

6. Juniper unbundles switch hardware, software

7. 8 free online courses to grow your tech skills

8. Akamai: Surge in hackers using complex crimeware to drain money from online bank accounts

9. Notable deaths of 2014 from the worlds of technology, science & inventions

10. Intelligence agency wants a superconducting, super cool, supercomputer

Follow Network World

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

...

No comments:

Post a Comment