Search This Blog

Friday, October 19, 2012

Virtual desktops: User tips from the trenches

  SDN and virtual networking seen as a key to growing hybrid clouds | IBM makes security push with cloud services, products aimed at mobile and Big Data
 
  Network World Security

Forward this to a Friend >>>


Virtual desktops: User tips from the trenches
The lure of virtual desktop infrastructure - less costs for endpoints, reduced power requirements, lower management costs, better security - is compelling but mastering the environment is tricky, say users that have embraced the technology. Read More


RESOURCE COMPLIMENTS OF: Google

Google Apps for Business
Do more for less with your team using Google Apps. Custom web-based email, calendars, and documents to easily share & work together in the cloud. Start with a free 30-day trial!

WEBCAST: Dell SonicWall

Why First Generation Firewalls Aren't Making the Grade
In this exclusive webinar, learn from Dell-SonicWALL's Patrick Sweeney, how today's Next-Generation Firewalls allow businesses to scale their network security to meet the demands of emerging threats and new technology trends, while ensuring performance to meet key business objectives. Resister Now!

SDN and virtual networking seen as a key to growing hybrid clouds
If the OpenStack Summit held this week is any indication, virtual networking is a hot IT topic. Read More

IBM makes security push with cloud services, products aimed at mobile and Big Data
IBM today widened its security offerings with products and cloud-based services focused broadly on both mobile devices and Big Data, both areas where IBM foresees growth as enterprises sort out their strategies toward both. Read More


WHITE PAPER: Brocade

Scaling Out Data Centers
Organizations of all sizes are facing daunting challenges as they struggle to adapt their data center networks to new technologies and applications. The move toward cloud architectures in particular is demanding a high-performance network interconnect that can host servers potentially numbering in the thousands. Read Now

Twitter uses facility to block account by country in Germany
Twitter said it has blocked an account in Germany following a government order, the first time it has withheld content in a specific country after it announced a new policy in January. Read More

Verizon Wireless raises privacy ire over data collection
Verizon says data-gathering does not violate Wiretap Act because the data cannot be linked to a single customer, but advocates cry foul Read More


WHITE PAPER: Avaya

Delivering game-changing productivity & dependability
By creating one contiguous, end-to-end Fabric, Avaya is empowering businesses to achieve unprecedented levels of infrastructure productivity, service agility, and network dependability, the very essence of the fast, flexible, and secure design aspirations. Read Now

FCC means business when it comes to illegal cellphone jammers
The U.S. Federal Communications Commission issued a warning in three languages against cellphone jammers this week, and just in case that wasn't clear enough, it employed public shaming, too. Read More

10 open source projects that power the cloud
Read More

2012 Tech Industry Graveyard
Apple, Cisco, Microsoft and Google among those bidding farewell to products Read More

MIT's wireless research projects that can 'change our lives'
Read More

 
 
 

SLIDESHOWS

25 essential business apps for iPhone 5
The iPhone 5 is here, so it's time to start loading it up with apps.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Juniper trimming up for a sale?
  2. Pacemaker hack can deliver deadly 830-volt jolt
  3. Google's giant data centers -- an inside look
  4. Deanonymizing you: I know who you are after 1 click
  5. Forensic expert who recovered lurid SMS warns: Phone texts don't die, they hide
  6. VMware, the bell tolls for thee, and Microsoft is ringing it
  7. Top Linux-o-lanterns from around the Web
  8. .xxx to launch porn search engine
  9. Microsoft unveils Surface tablet pricing along with first Surface commercial
  10. Microsoft's Surface tablet already can't compete
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: