Monday, July 12, 2010

Carlyle taps MindTree for IT infrastructure management

5 tips for managing Microsoft licensing costs | Java supplants IT security as most sought-after tech skill set, survey finds

Network World Network/Systems Management

Forward this to a Friend >>>


Carlyle taps MindTree for IT infrastructure management and support
Sometimes, a little too much personality can creep into a managed services provider relationship. Just ask David Roth, managing director, IT, at The Carlyle Group, a private global investment firm in Washington, D.C. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: IBM

Manage enterprise data with Integrated Data Management
Adopting an Integrated Data Management strategy can be a highly effective way to help IT support business growth, facilitate data governance and manage costs. It is also key to helping ensure that the enterprise derives maximum competitive advantage from its data. Read More!

5 tips for managing Microsoft licensing costs
If you're running a business of any size, chances are you're a Microsoft customer. But unless you're an expert negotiator, there's a good chance you're paying too much for Microsoft licenses. Read More

Java supplants IT security as most sought-after tech skill set, survey finds
Java development has supplanted IT security as the most difficult skill set for hiring managers to locate, a Dice.com survey finds. Read More

The virtual blind spot
Malicious hypervisors. Subversive virtual machines. Live migration impersonators. Welcome to the world of server virtualization, where the threats are new and the traditional security tools like firewalls and intrusion-prevention systems don't cut it anymore. Unfortunately, at many enterprises, security strategies haven't kept pace with the shift to x.86 server virtualization http://www.networkworld.com/supp/2010/ndc2/032210-ndc-tools-trends.html?source=nww_rss . "Many companies that have virtualized environments haven't contemplated the security ramifications of what they're doing yet," says Forrester analyst John Kindervag. Read More


WHITE PAPER: Novell

Efficiently Delivering Enterprise-Class File-Based Storage
IDC: Read about the exponential growth in file-based storage. Learn how having intelligence on data stored can help storage managers make smarter decisions about data storage, protection, archiving, retention, and disposition. Read Now.

Review: Firewall operations management
Anyone running multiple firewalls in a complex, enterprise environment knows how difficult it can be to catch misconfigurations, avoid conflicting rules, identify vulnerabilities and meet auditing and compliance mandates. Read More

Las Vegas data center is low on glitz
An ordinary-looking data center must do some extraordinary work to keep a casino's gambling operations running smoothly. Read More

Feds pull the plug on funding for IT projects
President Obama's approach to IT spending showed its teeth in a decision to end new spending on about 30 financial systems that cost about $3 billion in annual development. Read More


WHITE PAPER: MessageLabs

Employee Web Use and Misuse:
This white paper examines a Web security solution that gives companies the ability to monitor and enforce their Internet usage policies, bringing site monitoring and URL filtering together while insuring security with anti-virus and anti-spyware protection. Read Now

Five trends shaping data center designs
In the past, companies built data centers like parents buy clothes for their children: Buy big and wait for the kids to grow into them. Read More

Intel lab to focus on human side of IT
A new Intel R&D lab will focus on studying human-computer interaction 'to create the next generation of user experiences.' Read More

ROI on network management solutions
One of the most difficult tasks in today's economic environment is to calculate the ROI on investments in network management tools. And this gets even more difficult as we try to differentiate between "hard" and "soft" ROI. Read More

Offshore outsourcing picking up after recession: Everest
The outsourcing market is witnessing an increase in activity as the global economy recovers from the recession of 2009, according to a report by Everest Research Institute. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

Quiz: Do you know IT security?
Here is a quiz that draws questions from the vast spectrum of security options, including authentication, cryptograpy, firewalls, VPNs and more.

Your Next Laptop: Concept Designs Point the Way
Tomorrow's models may roll up, sport multiple screens or be repositionable, Transformer-style.

MOST-READ STORIES

  1. Military wants Holy Grail of secure encryption technology
  2. Cisco warns attendees that the Cisco Live database was hacked
  3. The best Windows 7 downloads
  4. Cisco Live 2010 attendees list hacked
  5. Cisco considers IOS for cert self study
  6. iPad invades corporate America
  7. Hackers edge toward unlocking iPhone 4 OS and network
  8. Movie 'Despicable Me' finds hero in behind-the-scenes technology
  9. VMware: no 'timeline' for release of delay-ridden hypervisor
  10. Poor SSL set-up can kill e-commerce

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment