Wednesday, February 29, 2012

Miami Dolphins dive into cloud analytics

10 most powerful PaaS companies | Cisco takes first step in delivering on SecureX vision

Network World Network/Systems Management

Forward this to a Friend >>>


Miami Dolphins dive into cloud analytics
The Miami Dolphins teamed with IBM to deploy a cloud-based analytics system that helps stadium staff to be proactive about potentially disruptive events, such as parking bottlenecks, concession stand inventory shortages, and inclement weather. Read More


RESOURCE COMPLIMENTS OF: Ipswitch WhatsUp Gold

WhatsUp Gold - IT Management Made Simple
Wish you had a powerful, proactive monitoring and management solution to easily manage your network? WhatsUp Gold is at work on over 100,00 networks and is the most intuitive, comprehensive, and cost-effective network management solution available today. WhatsUp Gold is IT Management Made Simple. Try it free for 30 days!

WHITE PAPER: PC Mall

Networking and Cloud: An Era of Change
As you deploy cloud infrastructure and operating models in your organization, the role that networking plays and the impact of these models on your networks may not always be clear. This document discusses the importance of the network to cloud computing, why the network must change, and what Cisco is doing to lead these changes. Learn More!

10 most powerful PaaS companies
Platform-as-a-service is the least mature of the major cloud services categories. There are multiple types of PaaS, and vendors are playing in more than one sub-category, so it's not easy to tell the players without a scorecard. Here are 10 companies that have emerged as leaders in the PaaS market. Read More

Cisco takes first step in delivering on SecureX vision
A year Cisco put forward its vision called SecureX about how it would devise ways that its network products, first its firewalls, would be able to capture information related to user devices, especially tablets and smartphones, to exert context-based security control. Today, Cisco took the first step to deliver on that vision while acknowledging more needs to be done. Read More

Microsoft, Hortonworks to link Excel and Hadoop
Microsoft is developing a connector that will allow Excel users to download and analyze output from Hadoop, potentially opening the open-source data processing platform to a much wider audience. Read More


WHITE PAPER: BMC

Looking Ahead: A Cloud Report from 2015
BMC CIO, Mark Settle, looks to the future and describes how he envisions cloud computing will evolve by 2015. The world of underutilized servers, security concerns, long provisioning cycles and spending 60% of the IT budget on application maintenance, data center operations, and facility expenses are history. Read More

Kansas City businesses dream big with Google Fiber, despite uncertain availability
Businesses in Kansas City have some big ideas for Google's new fiber network, although they still don't know if they'll be able to use it once it goes online. Read More

What's hot at RSA 2012
See the cool new products being unveiled at RSA 2012. Read More

Wireless network demands push carriers to innovate
Executives from three wireless carriers offered testimony Tuesday showing how an explosion of wireless users and devices are forcing them to expand their networks without necessarily the promise of revenue growth to keep up. Read More


WEBCAST: NetIQ

Disaster Recovery Planning and the Cloud
Find out how virtualization is the stepping stone to the cloud and how to leverage virtualization technologies today to reduce the cost and improve the performance of your disaster recovery plan. Learn More!

Quick look: Silicon Valley's wicked young CEOs
Silicon Valley youngsters get lots of money for new, innovative Internet companies. Read More

IT execs must shift security approaches
IT security executives must secure what they cannot directly control to properly protect enterprise data in the coming years. Read More

Using forensics to deeply understand the security impact of iOS and Android in the enterprise
When smartphones first emerged many IT organizations didn't recognize the risk they posed. That changed rapidly, of course, and today these devices are changing the risk profile for organizations because they introduce threats to sensitive company information. Read More



SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Steve Jobs ignored Warren Buffet's advice for a stock buyback
  2. Windows 8 most burning questions
  3. Cisco bounces back
  4. 6 things you need to know about Google's new privacy policy
  5. IBM scientists discuss quantum computing breakthrough
  6. Make way for iPad 3: Best Buy slashes iPad 2 prices
  7. What's hot at RSA 2012
  8. Windows 8 quiz
  9. IBM's molecular images may help nanoscale circuits
  10. Cisco: "We've never been more relevant"

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment