Search This Blog

Wednesday, August 15, 2012

HP aims three-part effort at network virtualization

Gartner: Cloud computing's most over-hyped terms | Kaspersky pleads for crypto help to probe Gauss malware

Network World Network/Systems Management

Forward this to a Friend >>>


HP aims three-part effort at network virtualization
Hewlett-Packard is readying three new software capabilities that are designed to help enterprises pool their computing and storage resources across a network. Read More


RESOURCE COMPLIMENTS OF: APC by Schneider Electric

Simple. Adaptable. Manageable.
Protect your IT system uptime easily wherever your IT is deployed with APC by Schneider Electric InfraStruxure™ solutions. Our simple, adaptable, and manageable all-in-one physical infrastructure is designed as an easy-to-deploy system to allow for flexible management and physical IT deployment and, by extension, system uptime. Make the most of your IT space! Download our Top 3 solution design guides today and enter to win an iPad® 2

RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant remote support with LogMeIn Rescue
With LogMeIn Rescue, you can start a support session in just 60 seconds. Connect 24/7 to PCs, Macs, smartphones and tablets. You'll get in, solve the problem and save the day without ever leaving your desk. Try it free today.

Gartner: Cloud computing's most over-hyped terms
Cloud computing is a hyped-up term, a recent report from Gartner found. But behind the hype there are significant benefits to some technologies in the cloud industry and some of the terms being floated around in the cloud are bigger buzzwords than others. Read More

Kaspersky pleads for crypto help to probe Gauss malware
Kaspersky Lab today appealed for help from top-notch cryptographers to help it break the encryption of a still-mysterious warhead delivered by the Gauss cyber-surveillance malware. Read More

Top tablets for back to work and back to school
As the days of summer wane, thoughts turn to getting things done. Here are the tablets that get things done. Read More


WHITE PAPER: F5

Capitalize on the Cloud with a Sound Network Strategy
New research underscores cloud computing's challenging effects on corporate networks, but solutions are available. Learn More!

Do you know where your used Cisco is coming from?
You might have seen the recent news about Ubiquiti Networks, Inc. and their struggle with counterfeit wireless gear. The company saw their stock plummet on Friday as a result, and they're currently doing damage control. Network admins have reason to be concerned – clearly, the production, sale and distribution of counterfeit IT equipment isn't slowing down. And while IT budgets continue to be downsized and companies are pressured to "do more with less," you can easily expose your organization to counterfeit gear when searching for the cheaper prices. Read More

LittlePrinter is well-named, oddly intriguing and pricey
A tiny, cloud-connected printer that can be used for offline news, puzzles and even social media content is now available for pre-order. Read More

United Airlines 'loses' 10-year-old girl, torments parents
As a father of three 10-year-old children, I read this account of United Airlines "losing" a 10-year-old girl (and then her baggage; a "crazier" story in and of itself) with an extra measure of astonishment. But you don't need to be a parent to imagine the fear experienced by young Phoebe Klebahn - traveling for the first time as an "unaccompanied minor" -- and her parents, Annie and Perry Klebahn. Read More


WHITE PAPER: Cisco

Cisco Bring Your Own Device
This paper explores the challenges mobile devices create for IT, offers key considerations before adopting a BYOD strategy and highlights a comprehensive architecture from Cisco that enables freedom of choice for users while affording IT security and control. Learn more.

Gartner: Hype could hurt cloud adoption
The hype around cloud computing and misuse of the term by some providers creates confusion in the market and if that continues, research firm Gartner says, it could detract from the technology's many benefits. Read More

IT careers: Do you need an executive coach?
As companies demand soft skills from their tech team, some IT pros are turning to executive coaches for guidance. Read More

The fascinating world of the ubiquitous antenna
The antenna -- it has been around so long and is mounted and used so routinely it is rarely even noticed. But such antenna technology has changed a lot over the years and has gone into space, war, water and just about anywhere else you can imagine. Here we take a look the world of the ubiquitous antenna. Read More

5 grand challenges that will boost future optic, photonic technology
Scientists with the National Research Council say that the development of photonic and optic technologies is key to the future of the United States and as such the government should create a "National Photonics Initiative" to more quickly advance the equipment, applications and tools for greater research and development. Read More

Yammer seeks to simplify enterprise social network usage with upgrade
Yammer has upgraded its cloud-based enterprise social networking software with new and improved features designed to make it easier for end users to manage their content. Read More



SLIDESHOWS

9 ex-Googlers on the move
Former Google employees continue to make their mark on the tech world.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 9 'everything-as-a-service' (XaaS) companies to watch
  2. RTM builds of Windows 8 reveal Microsoft blocked any bypassing of the Metro desktop
  3. 25 essential business apps for Android
  4. Is EVERYTHING made in China?
  5. Swiss scientists develop algorithm to sniff out the source of malware and spam attacks
  6. iPhone 5 to come with much smaller 8-pin dock connector
  7. 10 trends driving big data in financial services
  8. WikiLeaks dumps Stratfor email dirt on TrapWire, a CIA-connected global spying system
  9. RTM builds of Windows 8 reveal Microsoft blocked any bypassing of the Metro desktop
  10. Cisco readying a new Nexus switch

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: