Search This Blog

Tuesday, May 19, 2009

First look at products on display at Interop; Cloud computing: Pros and cons

How to buy cloud computing services; IT Recycling Pitfalls
Network World logo

Daily News AM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by Sun
rule

Big Savings From Sun
Try Sun x64 Systems with Intel Xeon Processors. Get a free 60-day trial then buy at 20% off. Try It Now.

rule

Spotlight Story

Products to be shown at Interop
By Network World Staff
Want a quick peek at what to expect at this week's Interop trade show? Here are some products you'll be able to see on the floor. View slideshow

Related News:

Cloud computing: Pros and cons
Five reasons to embrace an external cloud; five reasons to stay away.

How to buy cloud computing services
If you need more computing or storage capacity in your data center but capital expense is an issue, then a public cloud computing service makes a nice option. You get on-demand IT resources that are infinitely scalable and you pay for what you use.

ICANN: apply public health response model to e-security
The greatest threats to the Internet are not cyber threats, but the threat of inappropriate public policy, says ICANN president and chief executive, Paul Twomey.

IT Recycling Pitfalls
In recent years, recycling has become a high priority for IT departments. Yet as recycling efforts are ramping up, more managers are finding themselves coping with shady recyclers that dispose of IT assets in environmentally irresponsible ways, potentially exposing sensitive enterprise data in the process.

Amazon beefs up EC2 with new enterprise-appealing tools
New auto-scaling, monitoring and load-balancing tools for Amazon's Elastic Compute Cloud are now in public beta, the company said Monday.

Why My Company Uses Amazon's EC2 Cloud
Running an Internet startup remains a tricky business, says link-sharing service ShareThis. During the past two years, more than 110,000 sites have added the ShareThis embedded link, allowing readers to forward articles or videos to their friends. The popularity has made the company's data requirements enormous: it handles up to 12,000 requests a second and 130 million page views every day.

Next HDMI to have Ethernet built in
Several Web sites last week came forward with details of the next version of the HDMI cable specification, one that will have Ethernet capabilities built in - but the group responsible for the spec isn't verifying any of those details.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Sun
rule

Big Savings From Sun
Try Sun x64 Systems with Intel Xeon Processors. Get a free 60-day trial then buy at 20% off. Try It Now.

rule

Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

05/19/09

Today's most-read stories:

  1. Microsoft's software pipeline set to burst
  2. Nortel continues the enterprise fight
  3. NDC: Cloud computing
  4. Where the IT jobs are: 10 American cities
  5. Corporate espionage, e-mail break-in case zaps electronic industry
  6. Google ran out of bandwidth?
  7. VoIP, UC offerings announced
  8. Verizon shows off new rolling command center
  9. Inside a data leak audit
  10. Interop network all about redundancy


Network World on Twitter: Get our tweets and stay plugged in to networking news


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: