Search This Blog

Monday, February 11, 2013

You can’t be too rich, too thin, or have too much Internet bandwidth

  VMware's problems are deeper than just Microsoft | What President Obama CAN Do About Cybersecurity
 
  Network World Voices of Networking

Forward this to a Friend >>>


You can't be too rich, too thin, or have too much Internet bandwidth
As we move into the era of the cloud, and further into the era of BYOD and the explosion of personal/consumer use of the Internet as a fundamental expectation of individual workers and their devices, having much more bandwidth at each enterprise location will be critical to the efficiency of enterprise IT. Yet I also believe that this topic is rarely given the consideration it is due. Read More


WHITE PAPER: Red Hat

The Need for Linux System Management
This IDC whitepaper examines key functions and benefits of system management software in today's business and enterprise environments. Learn More

WHITE PAPER: AccelOps

Unified Infrastructure Management Examined
AccelOps' Unified Infrastructure Management Examined: How network and security administrators can monitor performance, availability and events with just one application. Managing a More Dynamic and Complex World. Read More>>

VMware's problems are deeper than just Microsoft
Remember this blog post? It's my now infamous "Bell tolls for thee" blog that I authored just after VMworld last year. This was the blog for which I was so soundly flogged by the VMware community in the comments section, and even received a few nasty emails. (By the way, I do want to thank all of the people who comment on my blogs. Whether you agree or disagree with me, it's always good to have... Read More

What President Obama CAN Do About Cybersecurity
When it comes to cybersecurity and public policy, I'm as big a cynic as anyone. Why? From a historical perspective, cybersecurity issues were first recognized during the Bush administration (41, not 43). Over the subsequent 20+ years we've experienced misinformed rhetoric, overlapping agendas, and inaction but little meaningful progress. Read More


WHITE PAPER: Raritan, Inc

Deploying High Power to IT Equipment Racks
With average rack power consumption still increasing, the deployment of high power to racks is becoming more of a necessity for data center managers. This white paper will help you learn about high power best practices, trends, common configurations, future industry speculation and more. Learn More

Six tips for the care and training of new users
Got a new user? As a responsible IT organization you have to recognize that this is a big responsibility. Read More

The 10 weirdest, wildest, most shocking security exploits ever
Read More


WHITE PAPER: F5

2012 Magic Quadrant for Application Delivery Controllers
The application delivery controller has evolved into a key component of the data center architecture, and enterprises should evaluate ADCs based on how they integrate with this architecture and support more advanced features, such as user and traffic control and monitoring. This report provides insights into vendors' strengths and weaknesses. Read More.

Learn to fail and avoid the next cloud outage
The total public cloud services market in 2011 was $91 billion and it will grow to $207 billion in 2016, according to Gartner. Despite this tremendous surge, large, very publicized cloud outages have everyone thinking about cloud risks. The reality, however, is that outages with large public cloud providers aren't more common than they are with a business' own private infrastructure. In fact, for many organizations, these cloud providers probably provide better uptime than they could achieve on their own. Read More

Scroogled: Microsoft launched 'privacy' petition to stop Google from scanning emails
"Think Google respects your privacy? Think again," warned Microsoft's 'Don't get Scroogled' campaign. If you don't want your privacy invaded by having Google scan "every word of every email," then Microsoft says to use Outlook.com. Read More

 
 
 

SLIDESHOWS

2013's 25 Geekiest 25th Anniversaries

A look back at the most memorable tech-related happenings of 1988.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 Cisco partners you should get to know

2. Windows 8 update: Winter storm Nemo wipes out Microsoft Surface party

3. If Xbox rumors are true, Microsoft may be making a huge mistake

4. Internet Explorer flaws fixed by Microsoft Patch Tuesday updates

5. Microsoft sells out of 128GB Surface Pro

6. What's up with VMware?

7. Cisco vs. Juniper: How different are their SDN strategies?

8. 25 techie Valentine's Day gift ideas

9. iPhoneys: The iPhone 6 and iPhone 5S edition

10. Cisco loses round in fight against patent troll

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: