Tuesday, January 31, 2017

Has Cisco broken out of the network hardware box?

F5 Networks taps versatile Ciena higher-up to take over as CEO

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Net Optimization Alert

Jan 31, 2017
Featured Image

Has Cisco broken out of the network hardware box?

Cisco has for a few years now touted software over its hardware powers but with this week's AppDynamics buy it may have broken out of its traditional bailiwick for good. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

F5 Networks taps versatile Ciena higher-up to take over as CEO
6 tips to protect your home network
(From our archives) Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial
Fragmentation nixed a Cisco-Android network partnership
LinkedIn pumps water down to its server racks, uses an interesting spine and leaf network fabric
(From our archives) Researchers make low-power Wi-Fi breakthrough
Four lesser-known Wi-Fi security threats and how to defend against them
6 highly useful & entertaining podcasts for IT & network pros
(From our archives) Will containers kill the virtual machine?

Video/Webcast: Riverbed Technology

Achieving End to End UC Visibility

Join Robin Gareiss, president and founder, Nemertes Research and David Roberts, director of product management, Riverbed, as they explore the different approaches to monitoring UC-network probes vs endpoint telemetry-and why taking a combined approach helps you monitor quality of experience and more quickly troubleshoot issues Read More

Thumbnail Image

F5 Networks taps versatile Ciena higher-up to take over as CEO

F5 Networks CEO and President John McAdam, thrust back into that role in late 2015 under unusual circumstances, has announced that Ciena SVP and COO Francois Locoh-Donou will succeed him on April 3. Read More

Thumbnail Image

6 tips to protect your home network

Remote workers who use their home office as their primary office are arguably at even more of a risk since they may be exposing corporate assets as well as personal assets. Untangle recommends the following best practices to secure your home network. Read More

(From our archives) Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial

Read More

Thumbnail Image

Fragmentation nixed a Cisco-Android network partnership

Cisco Systems tried to give Android devices the same kinds of integration it later provided for iPhones and iPads but gave up because the Android ecosystem was too fragmented. Read More

Thumbnail Image

LinkedIn pumps water down to its server racks, uses an interesting spine and leaf network fabric

Just two of the interesting innovations in the human network company's data center strategy Read More

Thumbnail Image

(From our archives) Researchers make low-power Wi-Fi breakthrough

The biggest downside of Wi-Fi for most users might be that it can really drain your smartphone or tablet battery, but a research team at the University of Washington has come up with a way to make using the nearly ubiquitous wireless technology in a less taxing way. Read More

Thumbnail Image

Four lesser-known Wi-Fi security threats and how to defend against them

You've hardened your network against all the common weaknesses, now we'll show you how to take your wireless security to the next level. Read More

Thumbnail Image

6 highly useful & entertaining podcasts for IT & network pros

Here's a short list of podcasts that enterprise IT pros might find useful --and even enjoyable. Read More

Thumbnail Image

(From our archives) Will containers kill the virtual machine?

Container technology is sweeping across the cloud and virtualization industry. What does it mean for existing technology like cloud and virtual machines? Read More

White Paper: Delta Risk

Cybersecurity and the Board of Directors

A spate of high-profile, high-impact cyber breaches at several of the largest financial institutions in the United States has brought attention to a point that cybersecurity professionals have long taken as an article of faith: boards of directors need to take an active role in the management of cyber risk. Yet, there are several factors that tend to prevent effective engagement in cybersecurity risk at the board level. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Top 10 technology colleges and universities

7 (more) security TED Talks you can't miss Read More

Most-Read Stories

1. Hackers could use hidden mal-audio to attack
2. Booted up in 1993, this server still runs -- but not for much longer
3. 0 new UI features coming to Windows 10
4. How to practice cybersecurity (and why it's different from IT security)
5. Avaya: How we arrived at Chapter 11
6. Cisco fosters Blockchain protocol development, IBM shows why technology could relieve security anxiety
7. Game over for Solaris and SPARC?
8. 19 free cloud storage options
9. LinkedIn pumps water down to its server racks, uses an interesting spine and leaf network fabric
10. Russia's FSB arrests Kaspersky's top cybercrime investigator allegedly for treason
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Net Optimization Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 12:04 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive