Search This Blog

Tuesday, August 21, 2012

Silver Peak builds WAN optimization directly into major hypervisors

  SDNs: Love 'em or Leave 'em? | Two services that help protect public Wi-Fi users
 
  Network World Network Optimization

Forward this to a Friend >>>


Silver Peak builds WAN optimization directly into major hypervisors
WAN optimization vendor Silver Peak announced today that it has integrated its virtual open architecture product directly into VMware vSphere, allowing IT staff who aren't directly involved with the network layer to interact with it via the hypervisor console. Read More


WHITE PAPER: Citrix Systems

Join the scale revolution for cloud ready networks
Today's cloud evolution requires a full scale revolution. Citrix TriScale technology transforms enterprise data centers into highly scalable enterprise clouds. Download this whitepaper and learn how to scale your cloud network for more elastic performance, seamless expansion and simple consolidation. Learn More

WHITE PAPER: Silver Peak Systems, Inc.

Send Less Data across the WAN
Because WAN deduplication works on all IP traffic, it plays a key role in a variety of IT initiatives including server consolidation, virtualization, and application delivery. Learn how this proven technology can dramatically improve the performance, reliability, and efficiency of data backup and recovery. Learn more.

SDNs: Love 'em or Leave 'em?
Are Software Defined Networks (SDN) on your short list yet? Two recent surveys suggest it depends on where you work. I say that given our recent experiences with SDN, within five years and everyone will adopt or have definitive plans to adopt SDN technology. Read More

Two services that help protect public Wi-Fi users
If you're using your computer away from your home network -- whether in a coffee shop, at the airport or in a hotel room -- chances are pretty good that your wireless network (even your wired network in a hotel room) is unsecure. Tools like Firesheep and Reaver can easily be used by hackers to find out personal information from Wi-Fi users on the same Wi-Fi network -- you may think that the guy three tables over is just checking his email, but he could be stealing your credit-card information or passwords. Read More

11 ways around using more spectrum for mobile data
Despite widespread calls for more spectrum to carry mobile data, there is a wide range of technologies already being used or explored that could help to speed up networks or put off the day when more frequencies need to be cleared. Read More


WHITE PAPER: Cisco

Cisco Bring Your Own Device
This paper explores the challenges mobile devices create for IT, offers key considerations before adopting a BYOD strategy and highlights a comprehensive architecture from Cisco that enables freedom of choice for users while affording IT security and control. Learn more.

It pays to be CIO: Corporate jets, private security, car allowances and more
A seat on the corporate jet and pricey club memberships are typical perks for big-company CEOs, but such extras aren't limited to the folks in the corner offices. As CIOs ascend the executive ranks, many senior tech leaders are enjoying access to valuable perks and generous benefits. Read More

Cisco, SDNs, and CDNs
Cisco's content delivery networking offering, Cisco Content Delivery System, part of the much larger Next-Generation Network Solutions for Videoscape, has not been met with an enthusiastic response by service providers, with only a few wins, including BT, Telstra, and Telecom Italia. Read More

Verizon Wireless capitalizes on LTE
Verizon Wireless continues to make news with its LTE network, both with progress on building the network and by providing services that take advantage of Verizon's cloud services, wireline IP network and wireless broadband LTE access. Read More


WHITE PAPER: HP

Bring Your Own Mobile Devices to School
In today's educational environments, more and more students, guests, and faculty are bringing in their own Wi-Fi devices into the school's network. This paper discusses the challenges and solutions IT administrators are facing and how to address the security and management of the multiple devices being introduced into the wireless/wired network. Learn more.

Aruba tweaks Wi-Fi software to optimize mobile client links
Aruba Networks has released the latest version of its WLAN system software, with several changes designed to optimize throughput even as the wireless network is flooded with mobile clients. Read More

Yammer seeks to simplify enterprise social network usage with upgrade
Yammer has upgraded its cloud-based enterprise social networking software with new and improved features designed to make it easier for end users to manage their content. Read More

HTC loses $40 million from OnLive restructuring
Taiwanese smartphone maker HTC said on Monday it will have to book a US$40 million loss from its investment in U.S. cloud gaming service OnLive, which is restructuring after nearly going bankrupt. Read More

Quest extends access control to unstructured data
Extending its line of identity management software, Quest Software has released an application to help administrators more easily control who accesses documents on the corporate network. Read More

 
 
 

SLIDESHOWS

9 ex-Googlers on the move
Former Google employees continue to make their mark on the tech world.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Facebook terrorism? Ex-Marine arrested, 9/11 conspiracy posts ruled 'terrorist in nature'
  2. How police tracked down Steve Jobs' stolen iPads
  3. The wild world of wearable computers
  4. The privacy cat is out of the bag
  5. iPhone 5 rumor rollup for the week ending Aug. 17
  6. Malicious Windows malware 'Shamoon' deletes computer contents, prevents reboot
  7. 10 most powerful cloud companies
  8. Pirated mobile Android and Apple apps getting hacked, cracked and smacked
  9. Verizon offers 2 defenses of indefensible $5 fee
  10. Top Back-to-School Laptops
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: