Cisco fires back at VMware decision to whack third party virtual switches

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Virtualization Alert

May 08, 2017
Featured Image

Containers and virtual machines: Which is best for you?

Containers and virtual machines make installing and configuring cloud applications easier. The challenge is deciding which is best for you. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Cisco fires back at VMware decision to whack third party virtual switches
25 geek-inspired gifts for Mother's Day
Verizon sells its cloud and managed hosting services to IBM
Red Hat nicely positioned for the turn to cloud
Are next-generation firewalls legacy technology?
NSA suggests using virtualization to secure smartphones
Hot jobs of the future
Xen hypervisor faces third highly critical VM escape bug in 10 months
Oracle plans ‘startup organization’ focused on cloud computing, AI and VR

White Paper: GlobalSCAPE

5 Rings of Data Integration Hell

Dante's "9 Circles of Hell" depicts a journey characterized by increasing levels of an individual's depravity, and presumably, increased levels of punishment. There are corollaries when it comes to addressing data integration issues in your environment that, when not properly addressed, create severe levels of "anguish" on a daily basis. Compounded, these issues can affect company efficiency, profitability, and tenure in your current position. Read More

Thumbnail Image

Cisco fires back at VMware decision to whack third party virtual switches

Cisco today said it would offer its virtual switch users technology to get around VMware’s recent elimination of support for third party virtual switches. Read More

Thumbnail Image

25 geek-inspired gifts for Mother's Day

Mother's Day gift ideas with a hint of tech, science and math Read More

Thumbnail Image

Verizon sells its cloud and managed hosting services to IBM

Verizon shut down its public cloud service in early 2016, and now it's unloading its virtual private cloud and managed hosting services to IBM. Read More

Thumbnail Image

Red Hat nicely positioned for the turn to cloud

Red Hat CEO James Whitehurst kicked off the company’s Summit meeting in Boston this week, which attracted more than 6,000 people, up 20% from last year. Network World Editor in Chief John Dix caught up with Whitehurst at the show for an update on the company’s position and prospects. Read More

Are next-generation firewalls legacy technology?

While network firewalls continue to anchor security, requirements are changing and next-generation firewall (NGFW) functionality is migrating elsewhere. Read More

Thumbnail Image

NSA suggests using virtualization to secure smartphones

The U.S. National Security Agency is now suggesting government departments and businesses should buy smartphones secured using virtualization, a technology it currently requires only on tablets and laptops Read More

Thumbnail Image
INSIDER

Hot jobs of the future

It is clear that new technologies like robotics, self-driving cars, 3D printing, drones, artificial intelligence and virtual reality will create major upheavals in all sorts of labor markets, not just technology. (Think self-driving cars and taxi drivers.) So what are the jobs of the future? And how can you prepare for them? Read More

Thumbnail Image

Xen hypervisor faces third highly critical VM escape bug in 10 months

The Xen Project has fixed three vulnerabilities in its widely used hypervisor that could allow operating systems running inside virtual machines to access the memory of the host systems, breaking the critical security layer between them. Read More

Thumbnail Image

Oracle plans ‘startup organization’ focused on cloud computing, AI and VR

Oracle is hiring people for a "new startup organization" inside its North America operation that will focus on key technology trends, including cloud computing, internet of things, artificial Intelligence, and augmented and virtual reality. Read More

White Paper: GlobalSCAPE

Be Afraid of Your Shadow: What is 'Shadow IT' and How to Reduce It

Are you making it too easy for hackers to infiltrate your system? If your employees are using unsanctioned devices and applications, then the answer is yes! Unsanctioned devices and applications can leave your IT infrastructure and data far more vulnerable to being exploited by cybercriminals. Unfortunately, it's become easier than ever for employees to access rogue applications, much to the chagrin of busy IT staff. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

9 tips to turn your data center green

Top techies giving 2017 college commencement speeches Read More

Most-Read Stories

1. Cisco fires back at VMware decision to whack third-party virtual switches
2. Verizon.net email addresses are going away
3. I'm excited for a new Ubuntu release—for the first time in a long time
4. Why Cisco needs SD-WAN v vendor Viptela
5. Cisco drops critical security warning on VPN router 3 high priority caveats
6. 18 free cloud storage options
7. Sneaky Gmail phishing attack fools with fake Google Docs app
8. Extreme offers glimpse of integrated Avaya, Brocade technology future
9. Peeping into 73,000 unsecured security cameras thanks to default passwords
10. 7 free tools every network needs
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Virtualization Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.