Tuesday, January 29, 2013

Cisco Catalyst marries wired, wireless and SDN in one switch

  Software-defined networking is more than just programmability | Why you need (a lot) more Internet bandwidth on your Enterprise WAN
 
  Network World Network Architecture

Forward this to a Friend >>>


Cisco Catalyst marries wired, wireless and SDN in one switch
Cisco this week unveiled a new Catalyst switch and WLAN controller designed to converge wired and wireless networks and centralize management of both environments. Read More


WHITE PAPER: McAfee

New Gateway Anti-Malware Technology Sets
The McAfee Gateway Anti-Malware engine is a powerful, next-generation technology designed to protect against contemporary threats delivered via HTTP and HTTPS channels. Read Now

In this Issue


WHITE PAPER: Shoretel

Sophisticated Simplicity
The key is to build simplicity and ease of use into these solutions from Day 1. This white paper will demonstrate a clear path to UC simplicity, and to overall success of UC deployments. Learn more.

Software-defined networking is more than just programmability
With the hype around software-defined networks (SDNs) having grown as high as it has, almost every vendor is looking for an angle to capitalize on the opportunity. I've noticed recently that many of the vendors, particularly the big-box vendors, are focused on the concept of "network programmability." While I agree that programmability is a component of SDN, it shouldn't be the sole focus of the... Read More

Why you need (a lot) more Internet bandwidth on your Enterprise WAN
Last time we covered the reasons I believe the time is now ripe for a Next-generation Enterprise WAN (NEW) architecture. Read More

DARPA wants electronics that can dissolve or burst apart after use
The Mission: Impossible TV show famously started most episodes with a tape recorded mission message that ended with: "This tape will self-destruct in 5 seconds, good luck Jim." Then it melted down in a burst of smoke and flame. Read More

Cybersecurity Hacktivism = Cybersecurity Escalation
I was changing the channels this weekend and landed on the local news. Before moving on, I happened to catch two "local" stories: 1. Citizen's Bank, a fairly large regional bank based here in New England was experiencing a Distributed Denial of Service (DDOS) attack. A group of Iranian hackers called the Martyr Izz ad-Din al-Qassam Cyber Fighters claimed responsibility. 2. The hacktivist... Read More


WEBCAST: Exinda

Expert Insights on Building a User Experience Network
Join guest speaker, Forrester Research, Inc. Principal Analyst Andre Kindness and First State Bank IT leader Tristan Smith as they discuss the importance of putting end-users at the forefront of your network design. Learn More.

Cisco Catalyst marries wired, wireless and SDN in one switch
Cisco this week unveiled a new Catalyst switch and WLAN controller designed to converge wired and wireless networks and centralize management of both environments. Read More

Fluke rolls application performance and network monitoring into 1 box
Fluke Networks is announcing an appliance called Visual TruView at Cisco Live today that combines network and application performance management into a single rack-mounted unit. Read More

Fluke rolls application performance and network monitoring into 1 box
Fluke Networks is announcing an appliance called Visual TruView at Cisco Live today that combines network and application performance management into a single rack-mounted unit. Read More

Printers join fray in network vulnerability landscape
Printers are not the typical paths cybercriminals take into corporate networks. Nevertheless, the devices have become a concern among experts who see them as an ignored weakness in network defenses. Read More


WHITE PAPER: Ixia Anue

The Evolving Visibility Challenge
Network monitoring has become more complex over the last few years, due in large part to virtualization and convergence. Learn how a state-of-the-art monitoring system that maximizes your existing monitoring tool investment can help you attain greater visibility into your network without adding complexity. Say goodbye to virtual blind spots. Learn More

Printers join fray in network vulnerability landscape
Printers are not the typical paths cybercriminals take into corporate networks. Nevertheless, the devices have become a concern among experts who see them as an ignored weakness in network defenses. Read More

DARPA wants electronics that can dissolve or burst apart after use
The Mission: Impossible TV show famously started most episodes with a tape recorded mission message that ended with: "This tape will self-destruct in 5 seconds, good luck Jim." Then it melted down in a burst of smoke and flame. Read More

Big goals for Big Data
A year ago--perhaps a bit more--big data was just starting to take its place among the industry's most-used buzz terms. Today everyone talks about it as a potentially powerful piece of enterprise security. But there are still plenty of practitioners struggling to get the concept, much as they struggled to figure out cloud security a few years ago. Read More

INSIDER
What IT needs to know about near-field communications
The rise of near-field communications (NFC) has been part of the discussion in the mobile industry for years. Unfortunately, the technology hasn't generated much more than discussion to this point. Read More

INSIDER
What IT needs to know about near-field communications
The rise of near-field communications (NFC) has been part of the discussion in the mobile industry for years. Unfortunately, the technology hasn't generated much more than discussion to this point. Read More

IBM to beef up content management, analytics in Connections enterprise social product
IBM will launch before mid-year several new and improved collaboration and communication products, including a new suite for human resources tasks and a major upgrade of its Connections enterprise social networking product. Read More

 
 
 

SLIDESHOWS

13 markets you might not associate with Cisco
Cisco's "Internet of Everything" initiative takes it into unchartered territory.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Press, bloggers fall for iPhone cup holder 'joke'
  2. New server can be parachuted into extreme environments
  3. Weird and wonderful high-tech inventions of the world
  4. Samsung Galaxy S 4 buzz still white-hot
  5. A coffee-drinking iPhone owner's pipe dream
  6. Backdoor accounts found in networking and security appliances from Barracuda Networks
  7. Ex-Cisco engineers tackle Layer 4-7 SDNs
  8. Microsoft can 'start printing money' as soon as it launches Office for iOS
  9. Anonymous hits U.S. government site, threatens release of secrets
  10. Symantec CEO on reorg: "our system is just broken"
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_architecture_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: