Thursday, March 30, 2017

Extreme swallows Brocade's data center networking business for $55M

IBM on the state of network security: Abysmal

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Net Optimization Alert

Mar 30, 2017
Featured Image

Extreme swallows Brocade's data center networking business for $55M

Extreme Networks continued to amass a nice nest of data center technology saying today it would buy Brocade's data center networking business will be sold to Extreme for $55 million in cash from its current owner Broadcom Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

IBM on the state of network security: Abysmal
FAQ: What is 802.11ay wireless technology?
802.11ay Wi-Fi: "It's going to be a very scalable spec"
Hyperconverged storage: Are your network and team up to the task?
Dutch researchers pull almost 43Gbit per second over a ray of light
(2015) Right back at you tech vendors: OUR independent study of YOUR independent research
Juniper extends data center interconnect options
SDN solves a lot of network problems, but security isn't one of them
(2008) 'Synergy-related headcount restructuring' and other euphemisms for 'you're fired'

White Paper: Lookout Mobile Security

Are You Prepared? The Future of Enterprise Mobile Security

As threats to enterprise mobility continue to intensify, the mobile security industry is evolving quickly. In this report, Lookout co-founders John Hering and Kevin Mahaffey share their predictions for what important new changes are coming and how you can best prepare your organization for success. Read More

Thumbnail Image

IBM on the state of network security: Abysmal

IBM says cybercriminals are starting to grab unstructured data, spam has rebloomed 400% and ransomware has just gone nuts Read More

Thumbnail Image

FAQ: What is 802.11ay wireless technology?

Products based on the IEEE 802.11ad (WiGig) standard have really only begun rolling out over the past year, but an effort to deliver an enhancement dubbed 802.11ay in the unlicensed 60 GHz spectrum band that promises to deliver faster and longer range W-Fi networks is gaining steam. Read More

Thumbnail Image

802.11ay Wi-Fi: "It's going to be a very scalable spec"

The lowdown on the emerging IEEE 802.11ay gigabit wireless technology standard, an enhancement to 802.11ad that promises higher speed and longer range to support a slew of new applications. Read More

Thumbnail Image

Hyperconverged storage: Are your network and team up to the task?

The success of your hyperconverged infrastructure depends on whether your network can handle the traffic and if your storage and network experts work together. Read More

Thumbnail Image

Dutch researchers pull almost 43Gbit per second over a ray of light

An experiment by scholars at the Eindhoven University of Technology in the Netherlands has demonstrated a wireless network based on infrared rays that can move data at speeds of 42.8Gbit/second. Read More

Thumbnail Image

(2015) Right back at you tech vendors: OUR independent study of YOUR independent research

While not as useless as PR pitches about technology companies cracking some other publication's Top 10 list, "independent" research reports commissioned by vendors are right up there. Read More

Thumbnail Image

Juniper extends data center interconnect options

Large data center interconnect users needing high-speed connectivity and bandwidth for access to massive cloud resources have a new option to handle these demands. Juniper today rolled out its Open Cloud Interconnect package. Read More

Thumbnail Image

SDN solves a lot of network problems, but security isn't one of them

As the digital enterprise struggles to find the best security solutions to defend their ever-expanding networks, many are looking to next generation tools that offer interoperability capabilities. Read More

(2008) 'Synergy-related headcount restructuring' and other euphemisms for 'you're fired'

Read More

White Paper: Lookout Mobile Security

Enterprise Mobile Security 101: Understanding the Basics

Read the eBook to learn the difference between securing mobility and mobile security, why Enterprise Mobility Management/ Mobile Device Management (EMM/ MDM) solutions alone are not security, and the kinds of attacks your mobile fleet might be facing. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

First Look: New Apple iPad, red iPhone and iWatch gear

How to stop insider threats Read More

Most-Read Stories

1. Being a Linux user isn't weird anymore
2. Extreme swallows Brocade's data center networking business for $55M
3. Cord cutting is happening. No it's not. Yes it is.
4. IBM on the state of network security: Abysmal
5. Hadoop fails to live up to the promise and the hype
6. Cisco expands wireless reach with access points, management software
7. 18 free cloud storage options
8. F5 to buy Brocade's virtual ADC business?
9. FAQ: What is 802.11ay wireless technology?
10. Review: PocketCHIP—Super cheap Linux terminal that fits in your pocket
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Net Optimization Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 11:03 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive