Monday, August 30, 2010

The 13 things you should know before going cloud

Microsoft: Looking For Love In All The Wrong Places | Gizmodo editor Brian Lam loses his cell phone in restaurant. And it's returned. Free!

Network World Voices of Networking

Forward this to a Friend >>>


The 13 things you should know before going cloud
There's a lot of hype about cloud computing but not as much clarity into exactly how to adopt cloud computing for your particular environment or specifically to address all the security "what ifs" the technology raises. A group called the Cloud Security Alliance (CSA) is trying to provide that insight. Read More


WHITE PAPER: Brocade

Best Practices for Virtual Infrastructure Management
Ensure you get the most out of your virtualization investments. Download this whitepaper today and examine the 3 best practices for infrastructure management. Understand the unique management challenges of virtualized environments and what you need to solve them in order to deliver all the benefits the technology promises. Read now!

WHITE PAPER: Emerson Network Power

Avoiding Trap Doors Associated with Purchasing a UPS System
The UPS is the centerpiece of most power protection systems. This eBook identifies four important factors IT professionals should consider to optimize protection and minimize costs with their power backup system. Read Now

Microsoft: Looking For Love In All The Wrong Places
Headlines and bylines all over the web have trumpeted the fact that Microsoft loves open source. Regular readers of my blog (OK you two, you can sit back down) know that I have been saying this for a long time. Yes it is a gentler and kinder Microsoft when it comes to open source and even Linux interoperability. But the real question is will the open source community ever love Microsoft back? Read More

Gizmodo editor Brian Lam loses his cell phone in restaurant. And it's returned. Free!
How exquisite. Gizmodo's Brian Lam tweeted last week that he left his unnamed cell phone behind in a restaurant. But another patron, a woman to whom he'd given up a seat, turned it in. Lam added the hashtag #karma, apparently indicating he thought that his good deed had been returned. Read More

I Can Stalk U: Geotagged Pics Worth More Than 1,000 Words
Have stalkers found paradise at the "I Can Stalk U" site which reveals exact geotagged locations when people tweet their photos? Read More


WHITE PAPER: Emerson Network Power

Aperture Integrated Resource Manager
Effectively manage energy, capital resources and process efficiency in the data center with Aperture Integrated Resource Manager. Organizations can now strategically deploy resources to achieve an optimal balance between costs and service, extend data center life, reduce capital expenditure, and increase resource efficiency and use. Read Now

Gartner's Magic Quadrant – Where's the Magic?
First of all, I want to say that I have tremendous respect for Gartner, the $1+ billion IT analyst firm that has been described as the most important technology advisor to the Fortune 500. Read More

Full-Body X-Ray Scanners Driving Down A Street Near You?
If you thought full-body airport scanners were intrusive, how do you like the idea of X-ray scans happening while you drive or walk along the sidewalk? Read More

Microsoft can only do so much to fight cyber threats
That headline was not written to make me sound like an apologist for Microsoft. Read More


WHITE PAPER: Iron Mountain

Top 10 Reasons for Using Server Online Backup and Recovery
Data protection solutions that combine the latest advancements in disk-based backup with secure, integrated online technologies offer the fast, assured data recovery. Read now

ACLU Report: Spying on Free Speech Nearly At Cold War Level
The American Civil Liberties Union (ACLU) released numerous reports of increased government spying on American citizens. Once upon an unhappy time, U.S. law enforcement agencies, from the FBI to local police, had a history of political spying during the Cold War. Read More

Congress Needs to Step In for Net Neutrality...Really? Seriously?
If you caught my blog back in March on "Net Neutrality for Dummies" you'll probably understand quickly I am of the belief that Net Neutrality is a solution in search of a problem. Read More

IPv6 is being deployed but not in the expected places
IPv6 exists for more than 15 years and it is rumored to be deployed extensively in Asia and especially in Japan and China with Africa being the last continent to deploy IPv6. Another place where there should be a lot of deployments is of course in the USA with the US Government IPv6 mandates. Read More

Time to take another look at Open Source?
Despite the promise of cost savings and extensibility, open source VOIP and UC platforms have thus far failed to catch on in the enterprise market. A new entrant aims to change that. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Cloud storage lives up to the hype
We tested five cloud-based storage services under real-world conditions. We set up accounts, connected with the vendor storage network, uploaded and downloaded files, measured performance and analyzed cost structures. Our conclusions are that cloud-based storage can save you money. And cloud-based storage can be fast. However, there are still security concerns that you need to be aware of.

Wireless networks and mobility quiz
iPhones and other handhelds bought for home use are infiltrating corporate networks, but there's a host of other wireless technologies that comprise a wave of mobile computing that is creating sweeping changes in business infrastructure. How well versed are you in the technical and not-so- technical details?

MOST-READ STORIES

  1. Air Force uses real birds of prey to protect its own predators
  2. Pentagon official details U.S military net hack
  3. Microsoft: 'We love open source'
  4. Apple in talks to bring $0.99 TV rentals to iTunes
  5. Social Security Administration to award massive network deal
  6. Windows and Linux servers grow at Unix's expense
  7. Security chiefs at home: No such thing as 'off duty'
  8. Report: Sun, Microsoft and Mozilla leave the most vulnerabilities unpatched
  9. Technology's Biggest Myths
  10. Geezer Quiz 2010

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment