Canadian airline company WestJet is one of the earliest customers of VMware's NSX network virtualization tools, which initially reached for the tech to address a security issue. Network World Editor in Chief John Dix recently sat down with WestJet technologist Richard Sillito to learn what the company is learning about network virtualization and its broader NSX plans.
By John Dix | 26 June, 2014 04:09
Catbird Networks Director of Product Management, Malcolm Reike, talks about how virtualization changes the security game with Network World Editor in Chief John Dix.
By John Dix | 26 June, 2014 03:36
Jeff Schilling, who joined cloud hosting startup FireHost this week as chief security officer, knows a thing or two about cybersecurity.
By Stephen Lawson | 31 May, 2014 04:56
Cloud computing gives organisations the opportunity to rethink many traditional IT practices, but it may be a particularly good fit for disaster recovery and business continuity.
By John Dix | 31 July, 2013 00:42
Name: Patrick Harding
Name: Scott Morrison
Name: Mark Partin
Name: Allison Aden
Intel completed its multibillion-dollar acquisition of McAfee almost a year and a half ago, and this week McAfee co-President Mike DeCesare spoke with Network World senior editor Ellen Messmer about what the merger of Intel's chip-making capabilities and McAfee's security expertise is expected to bring down the road.
Name: Michael Lin
Name: Eric Baldeschwieler
Red Hat CEO Jim Whitehurst is coming up on his five-year anniversary at the helm, following his arrival in December 2007. Under Whitehurst's leadership, Red Hat's revenue has grown from US$523 million in its fiscal 2008 to more than $1.1 billion in its fiscal 2012, without deviating from its core strategy of open-source infrastructure software.
Name: Rick Gilbody
Name: Dan Curtis
Name: Michael Milligan
Name: Harry Sverdlove
Name: Catherine Goodison
Name: Amichai Shulman
Originally from Melbourne, Australia but now living in the US, Gavin Andresen is the technical lead of the Bitcoin virtual currency system. Started by Satoshi Nakamoto in 2009, Bitcoin is a digital currency system consisting of an open source client and P2P network. The aim of the Bitcoin project is a decentralised, secure peer-to-peer currency system that does not rely on banks or central transaction processing authorities. To generate “Bitcoins” people on the network use a cross-platform, open source client developed in C++. In addition to the open source aspect of Bitcoin, there is now an emerging market in services around the cryptocurrency such as exchange portals and virtual clearing houses. Previously, the Open Source Identity series has featured interviews with Ruby on Rails creator David Heinemeier Hansson, Linux’s Linus Torvalds, Jan Schneider of Horde, Mark Spencer of Asterisk fame, Spine CMS creator Hendrick van Belleghem, Free Telephony Project founder David Rowe, and PulseAudio creator Lennart Poettering. This time we talk to Gavin Andresen about the new, decentralised approach to money – Bitcoin.
By Rodney Gedda | 21 March, 2011 14:29
More than anyone else, Jaak Aaviksoo has first-hand knowledge of what a cyberwar might feel like. In April 2007, Estonia's banking, media and government presence online was disrupted by several waves of distributed denial of service attacks that knocked services offline. The country is heavily wired -- 90 percent of all financial transactions are conducted over the Internet and 70 percent of the population files their tax returns electronically -- so the incident was widely felt by the country's 1.3 million citizens.
By Robert McMillan | 08 April, 2010 06:49
BIG-IQ Security makes it easy to manage the entire firewall policy life cycle. Read about the key benefits and download the policy auditing and security compliance report today
This whitepaper discusses the challenge of BYOD and how best-practice deployments help deliver on the business promise of mobility with integrated protection throughout the workplace. • Flexible, end-to-end security enables enterprises to speed adoption of transformative technologies for a competitive edge • If employees feel that security policies impede productivity or encroach on personal data, they look for work-arounds • Integrated solutions that avoid overlapping functionality and streamline management can help organizations maintain tight security and ensure compliance
- IEEE standards group wants to bring order to IoT
- InfiniDB going out of business, but its database will live on as open source
- FCC questions how to enforce net neutrality rules
- iPhone 6 review roundup -- the raves come quietly
- Alibaba shares open at a high $92.70
- New organization sets out to make secure communication tools more user-friendly
- Tim Cook launches iPhone 6 sales in Palo Alto
- HP leapfrogs Red Hat to become top contributor to OpenStack
- New iPhone 6 and 6 Plus are easier to repair
- Shut out on iPhone 6 Plus, buyers settle for smaller version
- Screen size matters to Apple fans in line for the iPhone 6
- Half-baked mergers
- Ping Identity picks up $35 million more in venture funding
- Apple's iOS 8 fixes enterprise Wi-Fi authentication hijacking issue
- Watch video of the first iPhone 6...being dropped