Monday, August 31, 2009

BMC's CTO gives advice on cloud management

Six steps to optimize IT governance; How to Manage Layoff Survivor Syndrome
Network World logo

IT Best Practices

NetworkWorld.com | Update Your Profile


Sponsored by Sybase
rule

Gaining the Performance Edge Using a Column-Oriented Database Management System
Many organizations are increasingly recognizing the potential benefits of how analytic databases can support reporting, strategic analysis, and other business intelligence activities. Explore the data explosion phenomenon and why column-oriented database systems are able to provide the boost that is needed to gain the performance edge.

Learn More

rule

Spotlight Story
BMC's CTO gives advice on cloud management

Everyone's talking about putting their application "in the cloud" these days. Cloud computing might be the next evolution for enterprise applications, but BMC Software's CTO advises IT organizations to consider how their application can be managed once in the cloud. Read full story

Related News:

Six steps to optimize IT governance
When it comes to IT governance, the benefits are obvious: IT is aligned with the business and everyone is happier. But good governance is harder than herding cats. These six steps for success are written by a guest blogger from ISACA, the organization that offers COBIT. But they'll work no matter what governance framework you choose.

How to Manage Layoff Survivor Syndrome
Chances are, if you've survived a round of layoffs in your career, you've probably experienced a pang of longing for lost colleagues, a lack of motivation and a decrease in productivity. According to a report by The Conference Board, an independent membership organization, such reactions can be described as "survivor's syndrome."

How to minimize the risk of illicit credit card capturing
Illegally capturing customer payment card numbers, or skimming, is a huge threat to merchants, according to an upcoming report on the criminal activity.

How to run your IT department into the ground
There seems to be some nasty goings-on in the IT department of the Veterans Administration.  The VA's inspector general is charging high-ranking officials in the agency's information technology office abused their authority, influenced the hiring of a contractor, engaged in nepotism,  oh, and engaged some unadvised hanky-panky.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

ESG: Why SharePoint Needs WAN Optimization
According to recent research from the Enterprise Strategy Group (ESG), implementing SharePoint is a Top 5 initiative for CIOs. But a hidden challenge in SharePoint is to ensure that end users are able to quickly access and edit files when connected via the WAN. Learn about the key benefits organizations have realized as a result of Wide Area File Services Technology.
Click here to continue.


How to Improve NOC Efficiencies
Network managers are grappling with data center consolidation, expanding networks and shrinking change windows, network compliance and security issues, VoIP, and flat headcounts. Managing the network is getting more and more challenging. What's needed is a lifecycle approach based on an integrated tool set. This video shows a solution to those complexity challenges.
View Now

 

August 31, 2009

TOP STORIES | MOST DUGG STORIES

  1. High-tech blimps earning their wings
  2. The opposite of Twitter
  3. 5 techs that could reinvent cell phones
  4. 12 words you can never say in the office
  5. Wi-Fi encryption cracked in 60 seconds
  6. Cisco's fastest router just got faster
  7. Marines want lots of robots to throw
  8. Group attacks Windows 7's 'sins'
  9. Microsoft, Citrix no longer sponsoring VMworld
  10. Judge overturns 2007 Unix copyright decision

The New Security Reality
Gain the required knowledge to successfully fight social engineering attacks, comply with federal regulations, and discover the latest trends in data protection in this Executive Guide. Hear directly from your peers who have been through serious data breaches and have come out the other side stronger and more secure.
Click here.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment