Monday, July 19, 2010

The appeal of a physical, virtual and cloud combo

  15 summer vacation ideas for geeks | Finding gold in your log files
 
  Network World Network/Systems Management

Forward this to a Friend >>>


The appeal of a physical, virtual and cloud combo
Physical and virtual but one view -- this goal continues to be a driving force as IT managers plot their ways toward increased use of virtualization technology across the infrastructure. Such was the case at TTI, a specialized electrical components distributor based in Fort Worth, Texas. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: IBM

The Information Agenda Guide for Financial Markets
CIOs need relevant information to achieve both short-term and long-term strategic goals. Read this guide to find out how an IBM Information Agenda can help financial institutions address a wide variety of business tasks, as well as unlock the value of their information, by using it in entirely new ways. Read Now

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer. Read More

Finding gold in your log files
Considering how much valuable information is available in log files, you'd think more companies would pay attention to them. Workstations, servers, firewalls, appliances, and other computer devices generate reams of event logs every day, and despite mountains of evidence showing their practical, cost-saving uses, logs often go ignored. A good log management system can help significantly with security, application troubleshooting, compliance, and systems management. If that's the case -- and it is -- why do logs and log management sometimes still get a bad rap? Read More

Virtualization no cure-all for data center energy crunch
Virtualization gave data center managers some breathing room in their battle against rising energy use, but more changes are needed to keep pace with the demands of IT departments, speakers at an industry conference said Friday. Read More


WHITE PAPER: Novell

Efficiently Delivering Enterprise-Class File-Based Storage
IDC: Read about the exponential growth in file-based storage. Learn how having intelligence on data stored can help storage managers make smarter decisions about data storage, protection, archiving, retention, and disposition. Read Now.

VA scales back $500 million IT revamp
The Department of Veterans Affairs has dropped a large portion of its work on a four-year, $500 million project to modernize its financial and asset management systems, citing cost concerns. Read More

Intel's success signals a 'refresh' for tech industry
When Intel Corp. posted its best quarter ever this past week, industry watchers noted that the good news extends beyond the chip maker and touches on the high-tech industry and possibly the U.S. economy. Read More

Gain the upper hand on governance and compliance with SaaS-based SecureGRC
Most of the governance, risk and compliance automation tools on the market are aimed at large enterprises with complex environments and deep resources. But smaller companies need governance and must meet compliance mandates, too. Now these companies have the option of a SaaS-based GRC solution that comes with a low subscription rate rather than a high purchase price. Read More


WHITE PAPER: MessageLabs

Employee Web Use and Misuse:
This white paper examines a Web security solution that gives companies the ability to monitor and enforce their Internet usage policies, bringing site monitoring and URL filtering together while insuring security with anti-virus and anti-spyware protection. Read Now

Offshore R&D spending grows, recession or not
Engineering research and development spending increased overall during the recession, but more of this spending is moving offshore, according to a new study by Booz & Co. Read More

Technology wins most US venture capital deals in strong Q2
The amount of money people put into U.S. venture capital investments nearly returned to pre-recession levels in the second quarter, with most deals going to information technology companies, according to Dow Jones VentureSource. Read More

Xiotech announces new array, management software
Xiotech has announced new storage analysis software, along with two new versions of its enterprise-class storage array and storage management software aimed at virtual desktop environments with its ability to expand on the fly. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Robocop ran DOS
Virtually no sci-fi or action flick these days is complete without a computer scene showing a few screens of mysterious scrolling text and a 3D wire-frame model. But where does this vaguely tech-looking stuff come from? Well, more often than not, it comes from a Website, app, or startup screen from the real world at the time the movie was made. Read on for some of the most unexpected tech cameos in movies.

Top Russian spy ring technology screw-ups
Alleged Russian spies arrested last month in cities around the United States seemed to be lacking in spycraft and in urgent need of some IT expertise, based on some of the gaffes they made. They also used some technologies effectively. Here is a summary of their efforts as revealed in court filings against them.

MOST-READ STORIES

  1. Robocop ran DOS
  2. Paper to readers: Comments now cost 99 cents
  3. Droid X vs. Droid
  4. EFF Fights To Allow People To Comment Anonymously Online
  5. Antenna guru: 'Get a bumper and learn the Vulcan iPhone Pinch'
  6. David Letterman piles on Apple's iPhone 4 problems
  7. Apple's antenna guru reportedly warned execs about iPhone 4 design
  8. India's new Rupee symbol won't show soon on computers
  9. Cisco Linksys among millions of hackable routers
  10. World's Weirdest PC Game Controllers

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment