Search This Blog

Monday, April 01, 2013

Fixing process exceptions. And music on hold

Cisco sees big plans for Big Data | Extreme Slaloms its way toward an end-to-end SDN solution

Network World Voices of Networking

Forward this to a Friend >>>


Fixing process exceptions. And music on hold
Gibbs wrestles with a lost medical insurance payment ... for five hours Read More


WHITE PAPER: Cisco Systems

Mobilize: A unified IT approach to the mobile workspace
Why does unification matter for today's enterprise? The answer can be found by looking to today's defining trends. The consumerization of IT, BYOD, mobility-based business models--they're all transforming how employees work and customers engage. Read Now

WHITE PAPER: ReadSoft

Large-scale BPO automation market trends and solutions
Increasing competition and financial concerns are putting pressure on Business Process Outsourcing (BPO) to deliver increased service and automation rates. Download this whitepaper to discover technology solutions that allow you to provide customers tailor-made service and added value at a competitive price. Learn More

Cisco sees big plans for Big Data
Two-thirds of IT managers recently surveyed by Cisco believe Big Data will be a strategic priority for their companies over the next five years. Sixty percent said they believe Big Data can help improve decision making and global competitiveness. Read More

Extreme Slaloms its way toward an end-to-end SDN solution
Big Switch stole many of the networking headlines this week when it announced its Switch Light software release. Switch Light, based on the open source technology Indigo, can be used on commodity white box switches to create an OpenFlow-based switch than can be used as part of a software defined network implementation. One of the elements of the press release that I felt flew under the radar, was that... Read More


WHITE PAPER: Netscout Systems Inc.

Good APM Practices Get Results
According to NetForecast's survey, enterprises with application performance management (APM) best practices benchmark scores above six on a ten-point scale experience 75% better results in critical areas. This research paper reveals the survey results as well as discusses the best practices for APM. Learn More.

Brocade evolves the storage network
Normally, when a vendor is the undisputed king of a market, there's a risk of the company taking their eye off the ball and letting markets slip away. BlackBerry in the smartphone market, 3Com with NIC cards and switches, and Nortel with almost everything they made are some examples of this. However, every once in a while vendors do surprise by trying to change the very market they dominate. Sure,... Read More

Three reasons you shouldn't neglect your application security
With so much emphasis on all forms of security these days, business applications remain one of the most vulnerable and most frequently exploited IT components. Investment in application monitoring should be a part of a comprehensive defense strategy. Keith Brogan of managed security provider Vigilant provides his thoughts on the importance of application security. Read More


WHITE PAPER: HP, Microsoft & Intel

Big Data Requires a Remodeling of the Data Warehouse
Take a few moments to learn about a data warehouse appliance that is a massively parallel server optimized to run Microsoft's SQL Server that delivers enterprise scalability, ease of maintenance, and a single version of the truth, all for a low cost. Read Now!

White Hat Security: Top 10 most insidious web-based attacks & hacking techniques
As you probably know, Grossman has been listing the Top Ten Hacks since 2006, focusing on new and creative web attacks. The number of attacks and the creative methods to create web chaos increase every year. Read More

CIA Chief advises you to ask: What are your rights? Who owns your data?
The cloud is old news, it's "so three years ago," and Big Data "was so last year," but according to the CIA's Chief Technology Officer, Ira "Gus" Hunt, this year is about "how to get value" from Big Data. At the GigaOM Structure Data conference, Hunt presented, "The CIA's 'Grand Challenges" with Big Data" and I highly recommend that you take about 30 minutes to personally listen to it. Read More



SLIDESHOWS

Best tools for social media analytics

How to tell if your Facebook, Twitter and LinkedIn efforts are paying off.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Google's famous follies

2. The night Steve Jobs returned to Apple

3. China slams U.S. for discriminating against nation's tech vendors

9. Windows 8: How to solve the Start Button dilemma

5. Critical denial-of-service flaw in BIND software puts DNS servers at risk

6. Avaya willing to share customers with Cisco, Microsoft

7. iPhone 6 rumor rollup for the week ending March 29

8. Geekiest/techiest Easter Eggs

10. 10 geeky and foolish ways to celebrate April Fools' day

4. Cisco lays off 500 of workforce


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: