Search This Blog

Tuesday, January 17, 2012

OpenFlow start-up aiming at Cisco's dominance

How a Baptist pastor in Florida became the go-to IT guy | Internet group seeks wider input for BIND 10

Network World Network Optimization

Forward this to a Friend >>>


OpenFlow start-up aiming at Cisco's dominance
OpenFlow start-up Big Switch Networks is submitting its controller software to the open-source community in order to catalyze an ecosystem of application developers, according to GigaOm. Read More


RESOURCE COMPLIMENTS OF: CIO Perspective

CIO Perspectives Dallas
CIO Perspectives is returning to Dallas on February 16th! Join the top IT senior executives from the Dallas area to discuss all the hottest technology trends and strategies. Start the new year off right with the best networking opportunities and gain important insight on your most pressing IT and business issues. Register today!

WHITE PAPER: Akamai Technologies, Inc.

Taming the Cloud
This whitepaper explores the components of the cloud computing ecosystem, demonstrates how Akamai is delivering services for cloud optimization, and looks forward into the evolution of this dynamic and growing market. Read now

How a Baptist pastor in Florida became the go-to IT guy
As a Baptist pastor, Terrill Gilley says his work calls for him to help worshippers and provide support to the senior pastor at his Florida church located in a rural area outside Orlando. And oh, he's also the network administrator for the church and the school it established. Read More

Internet group seeks wider input for BIND 10
The Internet Systems Consortium is looking for a few more good programmers to bring the next generation of its open source BIND DNS server software to fruition. Read More

Cisco sending enterprises to the cloud
In an effort to accommodate enterprise users looking to implement private and hybrid clouds, Cisco in the coming months will unveil an "integrated" WAN routing system of existing, but enhanced, products. Read More


WHITE PAPER: Riverbed

Five Steps to Successful IT Consolidation
Download this paper by Riverbed and discover a clear 5-step approach to making sure every consolidation project is successful. Read Now.

Survey: Tell us how you're handling the BYOD trend
Do you allow personal devices to access the corporate network, and if so, under what circumstances? Are you worried about security breaches and the possible loss of enterprise data via employee-owned devices? Please take our confidential survey and let us know. Read More

Unbiased info about IPv6 available here
Looking for practical, non-biased advice about how to deploy IPv6? The Internet Society is launching a new Web portal that will be a central resource for standards documents, best practices, case studies and other useful information for network engineers planning to adopt IPv6, the next-generation Internet Protocol. Read More

Managing information security during an innovation void
Although predictions for the coming year are a staple of the season, I will do more than offer an educated guess. I am going on the record with a guarantee: In 2012 we will see an increase in network intrusions from disparate parties trying to create IT infrastructure chaos for a variety of reasons primarily political, financial and economic. An easy prediction perhaps given the trend, and yet while I fully trust CSOs and CISOs and security teams are doing all they can to prevent breaches, I am deeply concerned that they still lack the technology to adequately protect IT infrastructure from malicious attacks. Read More


WEBCAST: VMware & NetApp

Disaster Recovery at Green Mountain Power
Paula Fortin of Green Mountain Power explains how disaster recovery of their IT environment, based on VMware and NetApp technology solutions, was rapidly recoverable during Hurricane Irene. View Now!

IBM software eases role-based security operations
IBM this week announced an identity-management analytics tool that eases what can be a tedious job for information-technology managers -- defining roles for employees in order to establish policy-based access to a network and application resources. Read More

A new audit standard validates IT-specific controls for cloud service providers
Risk mitigation is one thing when you own all the resources, but when you start moving data and applications into the cloud, it's doubly important to understand what the service provider is doing to protect your assets. Now there is a new audit standard and certification for reporting on controls for data centers and service providers in the cloud. Read More



SLIDESHOWS

CES 2012 ultrabooks and tablets
Ultrabooks! Ultrabooks! That's the official biggest buzzword for this year's Consumer Electronics Show in Las Vegas. Ultrabooks! In honor of these purportedly magical super-thin laptops, we've decided to make a compilation of some of the ultrabooks you'll see at CES next week. And for good measure, we've thrown in a tablet that will garner a lot of attention as well. Enjoy!

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. IPad 3 rumor rollup for the week ending Jan. 11
  2. IBM smashes Moore's Law, cuts bit size to 12 atoms
  3. Google Science Fair back for second year
  4. The best of CES 2012
  5. New era for Web site names begins Thursday
  6. Cisco sending enterprises to the cloud
  7. IPhone 5 rumor rollup for the week ending Dec. 31
  8. LTE explodes at CES
  9. IBM wins most patents for 19th straight year
  10. Google pleads for more unlicensed spectrum instead of more auctions

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: