Search This Blog

Monday, May 18, 2009

IT spending set to increase among Interop attendees?

Network World logo

Network/Systems Management Alert

NetworkWorld.com | Network Management Research Center | Update Your Profile


Sponsored by EMC
rule

EMC's CSO Explains the Triple A's of Security Mgmt.
Roland Cloutier, EMC's Chief Security Officer shares his secrets for managing Authentication, Audit, Availability and security of the IT network infrastructure. Join us on Wednesday, June 3 at 2:00 p.m. ET/11:00 a.m. PT to find out how. Register for this Live Webcast now.

rule

Spotlight Story
IT spending set to increase among Interop attendees?

Denise Dubie By Denise Dubie
A majority of Interop Las Vegas attendees polled say IT bugets in 2009 will exceed those of 2008 as planners prepare to spotlight new technologies at the show. Read full story

Denise Dubie is senior editor with Network World.

Related News:

In tight times, IT managers more likely to postpone than cancel a project IT managers have canceled outright fewer client computing projects during the recession than expected, preferring instead to postpone or scale them back, according to a Gartner survey of 475 IT administrators at large companies in nine countries.

Signs of IT spending recovery emerge in surveys IT buyers say they plan to increase their investments in technology before the end of 2009, recent survey results show, as a noteworthy number of high-tech decision makers revealed they expect in the next six months to put more budget dollars into IT.

Interop soldiers on in the face of a bad economy, swine flu Interop Las Vegas faces challenges because of restricted IT budgets nationwide, the poor economy and the unpredictable impact of a swine flu epidemic, but the show is forging ahead with new programs including a segment dedicated to cloud computing.

Gearing up for Interop The spring Interop event kicks off in Las Vegas next week, and WAN optimization and application acceleration technologies promise to be well represented at the venerable networking trade show.

IT budget crisis? Invest in free tools IT managers don't need the recession as an excuse to use freeware and open source applications, but the current economic climate shines a spotlight on just how much free tools can help slash costs and sustain IT services.

Using computer log data to support a forensic investigation When you think of forensic investigations, you probably think of TV shows like CSI and NCIS which glamorize the scientific analysis of crime scene evidence. In reality, forensic investigations involve time-consuming and tedious tasks that require know-how and equipment to perform properly.

Q&A: Resumes that stand out from the crowd shine in both style and substance David F. Noble, the author of Gallery of Best Resumes, talks about what it takes for an IT professional's résumé to stand out from the crowd.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by EMC
rule

EMC's CSO Explains the Triple A's of Security Mgmt.
Roland Cloutier, EMC's Chief Security Officer shares his secrets for managing Authentication, Audit, Availability and security of the IT network infrastructure. Join us on Wednesday, June 3 at 2:00 p.m. ET/11:00 a.m. PT to find out how. Register for this Live Webcast now.

rule

Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

05/18/09

Today's most-read stories:

  1. Verizon shows off new rolling command center
  2. Microsoft's software pipeline set to burst
  3. Google ran out of bandwidth?
  4. Web-hosting firms defy recession
  5. Where the IT jobs are: 10 American cities
  6. Microsoft IT goes live with its Geneva identity platform
  7. Google suffers major failure
  8. Nortel is certainly taking its time
  9. Rackable Systems becomes SGI, closes deal
  10. Poster on Chinese forum leaks next-gen iPhone specs


Network World on Twitter: Get our tweets and stay plugged in to networking news


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: