Search This Blog

Wednesday, March 30, 2011

Cisco among most acquisitive in 2010

Cisco acquisition targets corporate cloud services | More on a Switch's Layer 2 Interface Status

Network World Cisco

Forward this to a Friend >>>


Cisco among most acquisitive in 2010
M&A activity in IT made a strong recovery in 2010, with more 1,900 deals totaling over $200 billion, according to market research firm IDC. Coming off the 2008-2009 recession, the majority of deals were concentrated in application-related areas, including enterprise applications -- 586 deals -- and Internet applications, with 421 deals. There were also 219 deals in the infrastructure segment, with... Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: Palo Alto Networks

IPS by Palo Alto Networks: Best-of-Breed Threat Block Rate
Read now! Read now.

Cisco acquisition targets corporate cloud services
Cisco this week announced its intent to acquire privately-held newScale, a provider of software that delivers a self-service portal for IT organizations to select and deploy cloud services within their businesses. Read More

More on a Switch's Layer 2 Interface Status
Most people learn new technology by learning topics one at a time, and for each new topic, learning how it relates to the topics already learned. However, to pass the final at the end of a course, or to pass most Cisco cert exams at the end of your study, you need think from the opposite direction. For instance, you might have to think about all the things that might cause a certain status code, a... Read More


WHITE PAPER: Aerohive

Schools Graduate to Enterprise Class Wi-Fi
Online multimedia and interactive educational applications are invading the classroom and prompting schools to take a fresh look at what's possible with the latest in wireless LAN technology. Read now!

FBI wants public help solving encrypted notes from murder mystery
The FBI is seeking the public's help in breaking the encrypted code found in two notes discovered on the body of a murdered man in 1999. Read More

Virtual WLAN Controllers - Yes, the Benefits are Real
I posted a blog entry last October on what I think is the start of an important trend in WLAN architecture - virtualizing the controller. By this, I mean implementing the controller as software running in a virtual machine. I covered all of this in detail in a White Paper available through the link above, but I've been dying to speak with an IT manager actually using the technique to verify that my... Read More


WHITE PAPER: Aruba Networks

Bring Your Own iPad to Work
This paper discusses how an Aruba WLAN can securely scale to support a high density of iPads & other mobile devices. Learn how to optimize your WLAN in anticipation of the mobile device explosion. Read now!

Get in the ring: US, Europe vow to bash out Internet personal privacy protection
When it comes to protecting personal privacy on the Internet the United States and European Union have often clashed. And it's likely the future won't be much better. But officials from both sides of the ocean say they are now committed to fixing the problems that have kept the two worlds - which some say includes over 700 million users - apart. Read More

Unified Presence - Let's eat some alaphabet soup!
In the previous post, I used the term presence, and while I'm sure most readers are familiar with the word, and possibly the application in a Unified Communications environment, I wanted to explore the term here in more depth. The concept of presence is generally simple, with the basis being the ability to see a person's or resource's status and availability at any time. Read More

Microsoft Hyper-V Is Ready For Tier-1 Application Workloads
Large and small organization have embraced server virtualization technology as a way to consolidate workloads like web applications and file/print services but what about Tier-1 application workloads? You know, transactional applications that depend upon high performance and multi-tier application communications? Virtualizing these types of applications is just beginning, even at organizations with... Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Tech's youngest billionaires
The nine youngest billionaires in technology run the gamut from a social networking entrepreneur to the creator of the online coupon company, groupon.com. Think you know them all? Let's find out.

No joy for would-be baby shakers and drunk drivers
In this slideshow we'll take a look at some of the most notorious applications that were banned or removed from the big-name app stores.

MOST-READ STORIES

  1. FBI wants public help solving encrypted notes for murder mystery
  2. Samsung installs keylogger on its laptop computers
  3. Cisco data center revamp cuts across switches, servers, storage
  4. Health provider wants algorithm that can predict illness
  5. 'Apple doesn't break,' declares healthcare CIO
  6. FBI: How to be an expert at the black art of cryptography
  7. How to quit your job the right way
  8. McAfee's Web site full of security holes, researcher says
  9. BP employee loses laptop containing data on 13,000 oil spill claimants
  10. No conspiracy theory needed: Tor created for U.S. gov't spying

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: