Search This Blog

Wednesday, July 14, 2010

BSM for every need

Network World's Products of the Week slideshow | Holders of jobs outsourced abroad have their beefs, too

Network World Network/Systems Management

Forward this to a Friend >>>


BSM for every need
With the alignment of IT service performance and business impact a perennial enterprise IT challenge, business service management remains a sweet spot for vendors of every ilk, from the largest platform providers to emerging innovators. That makes sorting through the myriad offerings a challenge indeed. Read More


RESOURCE COMPLIMENTS OF: IBM

IBM Rational DOORS Day
IBM Rational DOORS has been the leading Requirements Management solution for over a decade. Attend our semianr and you will learn how to: - Further improve your requirements management processes - Develop new ways to access, understand, visualize & collaborate on requirements - Improve requirements quality Learn More & Register today!

WHITE PAPER: Qwest

Infrastructures for Innovation
Nearly nine out of ten senior IT and business executives say that data, voice and network services can be leveraged to drive innovation, facilitating remote access to critical applications and speeding up customer service. They can generate immediate cost savings by eliminating the cost of maintaining separate voice lines. Read more!

Network World's Products of the Week slideshow
Our round-up of intriguing new products from Sophos, EMC, Firetide, among others. Read More

Holders of jobs outsourced abroad have their beefs, too
You say you're not happy about seeing so many tech-related jobs outsourced overseas? And that it's stressful dealing with foreign call-center employees who may lack a grasp of their product sets and/or English? Turns out the holders of these jobs are not always happy with the situation either. Read More

Wireless helps dairy with milk, ice cream deliveries
A California dairy has begun a rollout of more than 200 of Motorola's MC 9500 rugged handhelds to delivery drivers. Read More


WHITE PAPER: Radware

Fighting Cybercrime
Hacker motivation has changed from gaining fame to financial gain. Cyber crime activities now employ a new level of network attacks, which go undetected by standard network-security tools. This paper discusses the changing threat landscape and how you can protect your business from emerging threats. Read More

Stupidest excuse for slow app performance? The Magic Threshold.
As a production DBA I see different problem scenarios all the time. And in every one of these scenarios there's always this blame game going on. The apps people think it's the database; the database people think it's the disk; the disk guys folks think it's the server; the server guys think it's the network; and the network peeps have no idea what it is, but they just know it's not the network. Read More

Juniper making enterprise inroads vs. Cisco
Juniper's enterprise business rebounded in Q2 after a soft Q1 but the service provider side of the house may be challenged heading to Q3. That's the conclusions of two analysts who have checked in with the Juniper channel before the company reports its Q2 results next week. Read More

White House cybersecurity chief calls meeting to discuss President's agenda
White House cybersecurity coordinator Howard Schmidt will host a meeting Wednesday to discuss progress and ways to move forward on the cybersecurity agenda outlined by President Barack Obama in May 2009. Read More


WHITE PAPER: Novell

Efficiently Delivering Enterprise-Class File-Based Storage
IDC: Read about the exponential growth in file-based storage. Learn how having intelligence on data stored can help storage managers make smarter decisions about data storage, protection, archiving, retention, and disposition. Read Now.

Microsoft punches Cisco, VMware in the eye with Windows Azure Appliance
The Windows Azure Appliance that Microsoft announced on Monday combines cloud services and virtualization with an on-premises flexible server, networking, storage. Partners for the device include Dell, HP, Fujitsu. Sound familiar? It should. Read More

Oracle releases 59 patches for security flaws, three critical
Oracle released 59 patches on Tuesday to fix security vulnerabilities across its entire range of database, application and middleware products. Read More

With fix now out, Microsoft sees jump in XP attacks
Microsoft urged Windows users to update their software Tuesday, saying it's now seen more than 25,000 attacks leveraging one of the critical bugs fixed in July's monthly security patches. Read More

SIP Forum shares latest projects
We recently spoke with Marc Robins, president and managing director of the SIP Forum, to catch up on the latest news about Session Initiation Protocol. In its latest efforts, the SIP Forum has worked to enhance security features for SIP trunking; suggested ways to more easily configure SIP endpoints; added Fax-over-IP to the list of SIP-controlled services; and started work on SIP-based unified communications, HD video, and smart grid device controls. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Robocop ran DOS
Virtually no sci-fi or action flick these days is complete without a computer scene showing a few screens of mysterious scrolling text and a 3D wire-frame model. But where does this vaguely tech-looking stuff come from? Well, more often than not, it comes from a Website, app, or startup screen from the real world at the time the movie was made. Read on for some of the most unexpected tech cameos in movies.

Top Russian spy ring technology screw-ups
Alleged Russian spies arrested last month in cities around the United States seemed to be lacking in spycraft and in urgent need of some IT expertise, based on some of the gaffes they made. They also used some technologies effectively. Here is a summary of their efforts as revealed in court filings against them.

MOST-READ STORIES

  1. 8 amazing things you'll do with Windows 8
  2. Newest attack on your credit card: ATM shims
  3. Java supplants IT security as most sought-after tech skill set
  4. SIP trunking: A primer
  5. 15 free enterprise collaboration tools
  6. Desktops gone wild
  7. Consumer Reports and the iPhone 4: Not recommended
  8. How to keep Windows XP SP2 safer after Microsoft stops patching
  9. Complaints mar Google Android App Inventor
  10. iPhone 4 "bursts into flames!" Probably the antenna

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: