Thursday, January 1, 2015

Cisco’s greatest hits, 2014 edition

Cisco's greatest hits, 2014 edition | SDN in 2014: A year of non-stop action

ITworld Enterprise Networking

Google Plus LinkedIn Facebook Twitter


Texas Instruments builds an alternative energy for the Internet of Things
The Internet of Things is nothing without batteries and plugs. But it's possible to build a sensor network that uses harvested energy that comes from changes in temperature, vibrations, wind and light, as Texas Instruments will demonstrate at the Consumer Electronics Show in January. Read More


: Venafi

Securing Keys and Certificates to Critical Assets
Today's most devastating cyber attacks—including ShellShock, Heartbleed and Zombie Zero—prey on trust. And that puts your digital certificates at risk. This informative resource center explores how next-generation trust protection can help you combat today's attacks, ensuring trusted access to critical assets. Learn More

WHITE PAPER: NetBrain Technologies

A Fully Dynamic Network Mapping Solution
Accurate network diagrams are the Holy Grail in enterprise network management – most network teams know they should be documenting their networks but haven't found a universally good way of doing it. Learn More

Cisco's greatest hits, 2014 edition
A busy 30th year for the networking kingpin. Read More

SDN in 2014: A year of non-stop action
The past year was a frantic one in the SDN industry as Cisco, Juniper and many others made strategic and tactical moves to either get out ahead of the curve on software-defined networking, or try to offset its momentum. Read More

The hottest wireless technology is now sound!
There's been a surge of innovations that harness sound waves to transmit data and do other creative things. Here's what's going on. Read More

Support for security tech tops iSoc's Africa plan for 2015
It also will continue to help develop traffic exchange and DNS programs Read More


WHITE PAPER: ForgeRock

Identity As a Revenue Generator
Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and repeatable identity strategy. View Now>>

IDG Contributor Network: Why Nest could be your next best investment
I never intended to buy a Nest thermostat. But as I was moving towards networked devices within my home, I had begun to really dislike my old-fashioned thermostat. That was one of the few devices I wished I could control from my phone.This is our second winter in the U.S., and unlike Europe, here we have a less efficient centralized indoor air system that heats or cools the entire house instead of just the room you are in.I also have to admit that I didn't enjoy the cold trek from my bed to the living room to change the temperature. On top of this, our current thermostat was way too limited and I could not schedule it the way I wanted. And worse: if we left home for vacation and forget to turn the system off, there was nothing we could do.To read this article in full or to leave a comment, please click here Read More

INSIDER
6 simple tricks for protecting your passwords
We all know that the current username-and-password system is broken. With Russian hackers reportedly sitting on over a billion passwords, and new breaches hitting the news on a regular basis, it's fair to assume that if hackers don't have your password already, they're about to."Most websites and companies require passwords that are at least eight characters long, contain lower and upper case characters, a number, and one or more special characters," says Vicent Berk, CEO of network security firm FlowTraq.These kinds of password policies have actually reduced security overall, argues Jacob West, CTO at HP Enterprise Security Products. "We need to bring some sanity back to our password policies," he says. "A human will never be able to meet these requirements."To read this article in full or to leave a comment, please click here(Insider Story) Read More

Holiday blues: 49% of network managers, sysadmins expect to work the holidays
Will you be stuck working or on-call as 2014 comes to a close? If so, you're not alone.This year, 49% of IT pros expect to work over the holidays, according to network management vendor Ipswitch. Nearly the same number (48%) will be thinking about work even if they're not called into the office.Ipswitch polled 206 IT pros in the U.S. for its second annual "Happy Holidays?" survey.Past experience shows it's necessary: 33% of IT pros said their company has experienced a major network outage during a holiday.More common for IT pros is the need to deal with employees' offsite IT issues. The most common problems employees experience when the office is closed for the holidays are: inability to access the network remotely (cited by 57%); poor application performance (18%); forgotten passwords (18%); and malfunctioning laptops (7%).To read this article in full or to leave a comment, please click here Read More

Exploits for dangerous network time protocol vulnerabilities can compromise systems
Remote code execution vulnerabilities in the standard implementation of the network time protocol (NTP) can be exploited by attackers to compromise servers, embedded devices and even critical infrastructure systems that run UNIX-like operating systems.The flaws, which can be exploited by sending specially crafted packets to machines running a vulnerable version of the NTP daemon (ntpd), pose a greater threat to systems where the service runs under a highly privileged user account such as root.However, even if the ntpd user has limited privileges, attackers could leverage other privilege escalation flaws to gain root access after exploiting the NTP flaws.To read this article in full or to leave a comment, please click here Read More


BECOME AN ITWORLD INSIDER

Get exclusive access to premium articles, product guides, reviews and more.

- 7 tips for landing a job at a coding competition

- Data analytics scores marketing wins for the Texas Rangers

- Getting started with power-line networking

DECEMBER GIVEAWAYS

We've got 5 copies of each of these books to give to some lucky ITworld readers. Enter now for your chance to win!

Advanced Android Application Development, 4th Edition
This guide provides in-depth explanations of code using key API features and includes downloadable sample apps for nearly every chapter. Together, they provide a solid foundation for any modern app project. Enter now!

Ubuntu Unleashed 2015 Edition: Covering 14.10 and 15.04, 10th Edition
Learn all you need to know about installation, configuration, productivity, multimedia, development, system administration, server operations, networking, virtualization, security, DevOps, and more — including intermediate-to-advanced techniques you won't find in any other book. Enter now!


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_enterprise_networking as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.