Search This Blog

Wednesday, March 09, 2011

Concord Hospital thrives on NetFlow

Perks drive up pay for tech CEOs | Net neutrality, needed or not?

Network World Network/Systems Management

Forward this to a Friend >>>


Concord Hospital thrives on NetFlow
While flow-based management is lately garnering considerable industry attention, the technology has long been a must-have for the IT team at Concord Hospital, a regional health care system in Concord, N.H. Read More


WHITE PAPER: Iron Mountain

Is Online Server Backup Appropriate for Your Business?
Read this white paper to examine the setbacks of traditional backup, gain a better understanding of online backup, and discover why Iron Mountain's LiveVault solution for automated server backup and recovery won the 2006 award for Best Storage Software Solution from the Software and Information Industry Association. Read Now!

WHITE PAPER: CA

Can You Harness Cloud Without Creating Storms?
In addition to extending its portfolio of solutions for cloud computing and virtualization, CA is investing aggressively in game-changing solutions to help you optimize your business value with insight to guide investment and sourcing choices, and ultimately, dynamic controls to orchestrate your service supply chain. Learn More

Perks drive up pay for tech CEOs
Jets! Cars! Home security services! All of these perks add to tech CEOs' pay packages. Read More

Net neutrality, needed or not?
Network neutrality regulation is necessary, proponents say, to ensure that ISPs treat all traffic in a neutral fashion and don't try to enrich themselves by meddling with the bits. Poppycock, naysayers respond. Service providers have always behaved and there is no reason to introduce regulations that could slow down this critical engine of commerce. Read More

Cisco coalition chief says consumers are driving IT
The probability that cloud will be the foundation for all IT in the next 3 to 5 years is 100%, says Michael Capellas, chairman and CEO of Virtual Computing Environment, the company formally known as Acadia. Read More


WHITE PAPER: Quest Software

Collecting Compliance Evidence: The Role of Event Logs
This Quest Software white paper discusses how to maximize the power of event logs. You'll learn about recent regulation changes, how your company can best prepare for an audit and the solution you need to address these issues. Read More

'Food porn' at its best: Ex-Microsoft CTO publishes groundbreaking cookbook
The $625 'Modernist Cuisine' cookbook is laden with spectacular photography that captures cooking techniques and chemical reactions such as the Leidenfrost effect. Read More

IBM CEO's compensation jumps 30% to $31.7 million
IBM CEO Sam Palmisano received compensation worth $31.7 million in 2010, up from $24.3 million in 2009, according to documents filed with the SEC this week. Read More

How to stop overpaying for Microsoft licensing
Microsoft Enterprise Agreements (EA) have long been a favorite for both Microsoft and resellers. If you have over 250 computers in your organization chances are someone has proposed an EA to you at least once! While there are a lot of positives in the EA, there are a lot of drawbacks as well – make certain you understand these drawbacks before buying into the EA philosophy. Read More


WEBCAST: Dell

Webcast: Is Virtualization Right for SMBs?
You've heard that large companies embrace virtualization to consolidate their data centers, reduce costs, and improve operating efficiency and IT service levels. However, your data center only has tens of servers, not hundreds or thousands. Should you consider virtualization as well? View this webcast to learn more. Register now!

Implementing Microsoft Lync: Lessons learned killing PBX
When Marquette University started construction on three campus buildings a year and a half ago, the IT department saw it as a good time to deploy VoIP (Voice over IP) from the ground up. Read More

Microsoft pushes more Kinect-like user interfaces
Microsoft's Kinect for Xbox 360 ditched handheld controllers for gestures and sound, but natural user interfaces don't have to be restricted to video games. Read More

Backups as an anti-plagiarism tool
Over several decades in academia, any professor is likely to encounter at least a few cases of plagiarism from foolish students. One of the most pernicious types of plagiarism involves theft of papers from a roommate's computer. Read More

Big Data mining: Who owns your social network data?
An attractive application of Hadoop and other Big Data technologies is to analyze users' social activities, sometimes without their express knowledge. Read More

VMware aims to give users more control with vCenter Operations
VMware is integrating performance, capacity and configuration management with the launch of vCenter Operations, in an effort to give users more control over growing virtualized IT infrastructures, the company says. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

20 awesome tech products at DEMO
Build-your-own iPhone and Android apps, cloud services, photo tools and more on display at DEMO Spring 2011.

Top 10 Chrome OS extensions
Though Google is pitching it as an operating system for netbooks and lightweight notebooks, Chrome OS is essentially the Chrome Web browser bolted on top of a bare minimum version of Linux. The following extensions can improve the user experience of Chrome (OS or browser) to give you some of the functionality found in a traditional operating system.

MOST-READ STORIES

  1. iPhone 5 to sport aluminum back, redesigned antenna, A5 chip
  2. Wells Fargo says no to personal smartphones and tablets
  3. Go for it on fourth down? Ask Coach Watson
  4. Perks drive up pay for tech CEOs
  5. Google throws 'kill switch' on Android phones
  6. IPv6 on home routers and DSL/cable modems: FAIL
  7. Is your company at risk of an IPv6 brain drain?
  8. The DDoS hall of shame
  9. Verizon: We have plenty of IPv4 addresses
  10. New security tools protect virtual machines

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: