Thursday, September 03, 2009

Businesses need to assure their cloud data is transferrable

Why you need vendors to adopt OVF before you move to the cloud; Why a two hour Gmail outage doesn't mean the cloud stinks for the enterprise
Network World logo

Cloud Security

NetworkWorld.com | Update Your Profile


Sponsored by Sybase
rule

Gaining the Performance Edge Using a Column-Oriented Database Management System
Many organizations are increasingly recognizing the potential benefits of how analytic databases can support reporting, strategic analysis, and other business intelligence activities. Explore the data explosion phenomenon and why column-oriented database systems are able to provide the boost that is needed to gain the performance edge.

Learn More

rule

Spotlight Story
Businesses need to assure their cloud data is transferrable

News that VMware's cloud efforts are supported only by VMware products is troubling for the security of cloud services. Read full story

Related News:

Why you need vendors to adopt OVF before you move to the cloud
If you are entertaining the idea of cloud computing then here's a standard you need to watch: the open virtualization format, a method to transport virtual machines from one virtualization appliance to another.

Why a two hour Gmail outage doesn't mean the cloud stinks for the enterprise
The recent Gmail outage was caused by overloaded servers and a misconfiguration of networking gear has been used as an indicator that the cloud is nowhere near ready as a prime-time production environment. But I beg to differ.

Red Hat takes aim at Microsoft, VMware with virtualization, cloud strategy
Red Hat has lined up against VMware and Microsoft in its bid to become a top-tier provider of virtualization and cloud computing infrastructure software for both the enterprise and service providers.

Google's Gmail Fail Casts Dark Cloud on 'Cloud Computing'
The recent Gmail outage was not only an inconvenience; it calls into question yet again the feasibility of present-day cloud computing.

Take Your Work Into the Cloud With a Web OS
If you travel, use more than one computer for work, or depend on a smartphone for business, you might find it difficult to keep all your files in sync and up-to-date. But with a Web-based virtual computer, you can ensure that your data remains synced and organized across all your devices while using a single, consistent interface on every computer you work from.

EMC expands services, training for private cloud
As users gathered at VMworld in San Francisco this week to learn about virtualization and cloud computing, EMC was stepping up its efforts to help enterprises that adopt private clouds do it right.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Five Steps to Successful IT Consolidation
Mapping out a 5 step consolidation process can ensure that the goals of IT consolidation are achieved. Read this white paper to learn how to reduce IT management overhead, ease revision control, guarantee data security, scale systems more quickly and reduce server and software costs.
Click to continue.


Dell's SMART Approach to Workload Automation
Read a compelling case study by EMA, Inc. to learn how Dell uses BMC CONTROL-M to cut cost and increase productivity with workload automation.
Learn More Today

 

September 03, 2009

TOP STORIES | MOST DUGG STORIES

  1. Raytheon snaps up Internet pioneer BBN Technologies
  2. The 11 most influential microprocessors of all time
  3. Developer denies software to beat Chinese censors is malicious
  4. Cisco, EMC starting new joint venture company?
  5. Wi-Fi encryption cracked in 60 seconds
  6. Half of new servers are virtualized, survey finds
  7. 12 cool ways to donate your PC's spare processing power
  8. Still trying to crack Nazi Enigma messages
  9. Snow Leopard vs. Windows 7
  10. 12 words you can never say in the office

Perfecting your Disaster Recovery Strategy
How fast can you recover data in the event of a disaster? Optimize your backup and disaster recover strategy with this Executive Guide. Get expert tips and recommendations in this collection of in-depth articles from Network World and its sister publications.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment