Search This Blog

Thursday, August 13, 2009

Cloud Security: Verizon joins the Cloud Security Alliance

Nokia deal fuels Microsoft's cloud, collaboration, management strategies; CA Ties Management Suites to Amazon's Cloud
Network World logo

Cloud Security

NetworkWorld.com | Update Your Profile


Sponsored by HP - NWW
rule

IDC: Realizing the Benefits of Deduplication
Many organizations are grappling with rapidly growing storage requirements. IDC has found that those organizations are experiencing 50% growth in data, adding as much as 4TB of data each year.

rule

Spotlight Story
Verizon joins the Cloud Security Alliance

Verizon Business is joining the Cloud Security Alliance, bringing another big corporate name to the group and, presumably, its expertise in actually providing cloud services. Read full story

Related News:

Nokia deal fuels Microsoft's cloud, collaboration, management strategies
Microsoft is using its newly formed alliance with Nokia not to bolster its mobile efforts but to help fuel expansion of its cloud, collaboration, real-time communications and management strategies.

CA Ties Management Suites to Amazon's Cloud
There's no question that cloud-computing infrastructures will become a significant part the IT plans of large corporations, according to analysts. The question, at least right now, is how well those hybrid internal/external infrastructures will be managed.

Open-source, proprietary vendors partner on cloud business intelligence
Four open-source and proprietary vendors have announced a new partnership resulting in a cloud-based business intelligence stack.

Guide to Sorting Hot from Hype
Twitter is out, cloud computing is all hot air and people have finally found a use for wikis, according to an overview of Gartner's Hype Cycle for 2009.

Penguin puts high-performance computing in the cloud
Penguin Computing, which builds high-performance Linux clusters for tasks like weather modelling and product design, is taking its business into the cloud.

Cloud computing, compliance raise questions
A largely unsolved problem for Identity as a Service is compliance. Do I have any way of knowing how my data is stored? Who has access to it? Do I know what country or countries my data resides in and what regulations and civil liabilities I might have?

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


Cool BlackBerry games
Black HatBlackBerries are known for e-mail, but they are also getting better at mobile games. Here are 10 of the best.

Google facts
IT quizTake this quiz to see how well you know the company – and no fair googling the answers.

Gaining the Performance Edge Using a Column-Oriented Database Management System
Many organizations are increasingly recognizing the potential benefits of how analytic databases can support reporting, strategic analysis, and other business intelligence activities. Explore the data explosion phenomenon and why column-oriented database systems are able to provide the boost that is needed to gain the performance edge.
Gaining the Performance Edge Using a Column-Oriented Database Management System


The Top 10 Data Security Threats
Improve security within your small to medium size business with this straightforward look at the top ten most common network and data compromises. Each threat is clearly explained along with practical techniques and defenses to counter them. Don't miss this opportunity to beef-up your security defenses.
http://www.accelacomm.com/jaw/{{track}}/7/50514528/

 

August 13, 2009

TOP STORIES | MOST DUGG STORIES

  1. Should your credit report disqualify you for a job?
  2. Top 10 must-have iPhone business apps
  3. How famous OS logos got started
  4. 10 worst video game systems of all time
  5. Why Microsoft is sabotaging desktop virtualization
  6. Do HP, 3Com value claims trump Cisco?
  7. Who says the router can't be sexy?
  8. Microsoft, Apple, Mozilla patches
  9. Patch Tuesday: What the experts are saying
  10. Windows 7: How low can you go?

Data in Action: Effective data management for smarter outcomes
Date: August 19, 2009 Exhibit Zone 8:00 am PDT / 11:00 am EDT to 12:00 pm PDT / 3:00pm EDT Join us for a special, complimentary Virtual Conference, offering valuable information for lowering IT costs through industry-leading performance, enhanced storage compression and improved automation.
Register Now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: