Search This Blog

Tuesday, June 01, 2010

In search of IT service assurance

Enterprise risk management: All systems go | Dell shows off first fruits of system management buy

Network World Network/Systems Management

Forward this to a Friend >>>


In search of IT service assurance
IT managers abandon the separate worlds of their past and embrace managing network, system and application elements as one cohesive service. Read More


E-GUIDE: Compuware

Perfecting Application Performance
The enterprise application scene has become increasingly complicated over the years. Things have changed with the rise of Web services, SOA, Virtualization and cloud computing. In this Executive Guide explore how to get the best performance out of today's application environments. Read Now.

WHITE PAPER: Emerson Network Power

The Four Trends Driving the Data Center Future
Does efficiency have to come at the expense of availability? Not according to this paper, which outlines the four data center infrastructure trends that are reducing design, operating and management costs while improving data center performance. Those trends are Infrastructure Management, Eco Availability, Flex Capacity and High Density. Learn more.

Enterprise risk management: All systems go
When Bill Badertscher arrived at Georgetown University three years ago, campuswide security was handled in several departments with little coordination among teams. It was time for a change. Badertscher is Georgetown's senior engineer for facility and safety control systems and leader of a new IT team that focuses on the same areas. The goal is to address enterprise risk management (ERM) by redefining it to include nontraditional systems. Understanding that security is mission-critical has led the University Safety and Information Services departments to work together in unprecedented ways. Read More

Dell shows off first fruits of system management buy
Systems management company Dell KACE has launched a new appliance. Read More

How to prepare the iPad for enterprise usage
After two months and 1 million-plus iPads sold, it's clear the Apple tablet is here to stay, not just for home use, but for the enterprise as well (48% of iPad users plan on bringing their tablet to work). For IT, this means preparing for additional network access, bandwidth management and security controls. Andrew Rubin, CEO of Cymtek Systems, chats with Keith Shaw about ways IT can get ready for and also benefit from the iPad. (20:05) Read More


WHITE PAPER: Adobe

Close the Web 2.0 Communications Gap
Web 2.0 tools have yet to reach critical mass and broad user adoption. This Forrester report identifies the key Web 2.0 gaps and offers advice to: Build a framework that extends email, Upgrade document-based data collection, and Improve email and document exchange security. Read More

Cisco issues advisory for building management systems
Cisco has issued a security advisory for its Network Building Mediator (NBM) and legacy Richards-Zeta Mediator products. The products allow different building systems to communicate with each other for facilities management. Cisco acquired Richards-Zeta last year. Read More

Dell adds document management features to printers
Dell is embedding document management features in multifunction printers as it tries to establish a foothold in the managed print services market, the company said last week. Read More

Chronicling the open source movement - one person at a time
Whether open source is a license, a community or more is debatable, but what's not is that none of it would be possible without the people behind it. Read More


WHITE PAPER: Fluke Networks

Troubleshooting Application Problems
This comprehensive 94 page guide is a how-to resource handbook for network engineers. Learn the fundamentals of how applications work, how they flow, where applications fail and best practices and methodologies for troubleshooting network and application problems. Click here!

Score one for the good guys
There's been much discussion on this blog about cyber crime and how it can be thwarted. Cyber crooks bounce around different servers around the world, surreptitiously hijack computers, steal money or identities and disappear without a trace. But every once in a while, the good guys catch a break. Read More

Task management made gamer-friendly
What's the difference, really, between shuffling off to the Xerox machine to make 50 copies of the TPS reports, and shuffling down to Un'Goro Crater to get 15 pieces of dinosaur meat for your Venomhide Ravasaur? Not much, except there's a more tangible reward for the latter. Gamer-friendly PIM QuestTracker (free/donationware) manages them both the same way. Read More

Office Tab makes it easier to manage open office docs
Office Tab ($25, 30-day free trial) solves one of Microsoft Office's shortcomings: How to handle multiple documents open in different windows. Unlike Web browsers, Office doesn't use tabs, so you can't see at a glance all the documents you're working on, and it's not easy to switch between them. Office Tab solves the problem by putting tabs on Office, Excel, and PowerPoint. Read More

Google Wi-Fi snooping should serve as security wakeup call
The continuing saga of Google's wireless snooping and the maelstrom it's generated won't end anytime soon. Peeved government officials in both Europe and the U.S. are pressing Google for more details on how the search company's Street View cars managed to cull personal data from Wi-Fi networks that weren't password-protected. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

40 days of summer (gadgets)
Summer's here and the time is right for looking at gadgets to make the summer days and nights go by easier or more fun at least. If you're going outside to enjoy the sun, hitting the road for a long road trip to a vacation destination, or just staying at home for the perfect "staycation", here are 40 devices or apps we think you'll like.

What if tech companies owned the Wonders of the World?
In this slideshow, we'll take a look into a future where broke governments are forced to sell their most treasured landmarks to the world's richest nerds.

MOST-READ STORIES

  1. Verizon's tiered LTE plans fuel 'bill shock' debate
  2. How to foil Web browser 'tabnapping'
  3. Google is no competitor for Skype - yet
  4. 10 essential BlackBerry apps for travel
  5. New undersea cable feeds African botnets
  6. 10 most controversial technology stories of 2010 - so far
  7. Treasured toys, early technology: Worth more than memories?
  8. Alleged $100M scareware sellers facing charges
  9. Ballmer: 'I'm not going to WWDC'
  10. SQL Server 2010? ... I don't think so ...

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: