Wednesday, August 11, 2010

BMC BladeLogic automation software a private cloud cornerstone

  Mainframe sect tackles new roles, old stereotypes | You love your management tool, but does it love you?
 
  Network World Network/Systems Management

Forward this to a Friend >>>


BMC BladeLogic automation software a private cloud cornerstone
Like a growing number of enterprise IT executives, Craig Baughn, vice president of hosting operations at Concur Technologies, is carefully studying how to transition from a virtual environment to a private cloud. Read More


RESOURCE COMPLIMENTS OF: IBM

Keep Your Applications Up & Running
IBM Tivoli® Foundations Application Manager provides entry-level monitoring for the growing medium-sized organization looking for an easy-to-use cost-effective solution. It provides capabilities to implement application management, including IT asset discovery, network monitoring, server monitoring, and monitoring for key IT elements. Click to continue

WEBCAST: 3Com

3 Steps to Transform Your Data Center
Join Robert Whiteley, V.P. and Research Director at Forrester Research, for this Webcast on transforming your data center. Robert will discuss the critical networking trends that will affect the way you build your data center and provide a 3 step transformation formula. View Now.

Mainframe sect tackles new roles, old stereotypes
IBM's new mainframe is on display at this week's SHARE conference in Boston, a testament to the relevancy of the big iron in today's enterprise IT environments. Amid the excitement over IBM's mainframe makeover, however, IT pros are concerned about the availability of skilled professionals who know how to run it. Read More

You love your management tool, but does it love you?
If you love Wireshark, hunting down performance problems at the packet level gives you an endorphin buzz. You crave hard problems and the raw data to solve them in your head. But you can't always parachute in with a Sniffer when a problem pops up. For that you need a tool that loves you back by incorporating some of your gray matter. Read More

Getting VDI right
Desktop virtualization makes it possible to centralize control and simplify management, improve security and compliance, and minimize help desk calls. It isn't perfect for all types of users within the enterprise, but when deployed appropriately, VDI can unlock new capabilities that could never be achieved through traditional physical desktop solutions. Read More


WHITE PAPER: Palo Alto Networks

Forrester: Addressing the Risks of Web 2.0
New research conducted by Forrester provides insights about how IT decision makers from large enterprises view and address the risks of new collaboration and web 2.0 applications. Read now!

Smartphone wave challenges enterprise security
With ever more employees clamoring to use smartphones for both personal and business purposes, IT and security managers are forced to answer tough questions. Read More

Here comes the iBike? Apple files patent for a bicycle
Yes, you read that headline right. Apple has applied for a patent for a bicycle concept. Read More

IBM to accelerate mobile unified communications
Keeping Microsoft and Cisco in its sights, IBM is planning to introduce variety of collaboration tools for mobile platforms where it wants to create full-featured unified communications endpoints and become the mobile collaboration vendor of choice. Read More


WEBCAST: Oracle

Getting Started with Identity Compliance
The Burton Group's, Kevin Kampman, provides an overview of the latest technology for identity management. He'll help you sift through key, mandatory requirements and features and functionality that can wait. Kevin offers guidance on how you can get a 360-degree view of users' access and behavior, best practices and a real-world implementation. View Now.

Google, Verizon net neutrality plan limits FCC
Critics of a network neutrality proposal released Monday by Verizon Communications and Google have complained that it would exempt wireless broadband and managed services from enforcement, but the biggest departure from recent practices may be its proposed major limits on the U.S. Federal Communications Commission's authority. Read More

IBM buys document capture vendor Datacap
IBM made the latest in its long run of acquisitions on Tuesday, announcing the purchase of document capture software vendor Datacap. Terms of the deal were not disclosed. Read More

File-sharing Web site claims to 'buy' desolate Russian town
You can call it a sort of Robin Hood situation. One of the most popular file-sharing sites is in apparent negotiations to name a rural Russian town in Siberia after its website, with money generated from its advertising. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Supersize your WAN
Dual-WAN routers have come a long way. WAN connections are easier to establish, and all units we tested have configurable load balancing. The performance increase, not to mention the redundant Internet connections that all but guarantee uptime, should put these dual-WAN routers at the top of the shopping list for every small business that needs a router.

The recent history of governments vs. the Internet
Since the Web makes it far easier to access information than ever before, governments have had a harder time keeping the lid on information they don't want the public to consume and have often found themselves butting heads with tech companies who deliver Internet services or content. Here are some doozies.

MOST-READ STORIES

  1. Google CEO Schmidt: No anonymity is the future of the Web
  2. Investment in open source software will only go up from here
  3. Who has the better virtualization platform - VMware or Microsoft?
  4. HP researcher claims to crack compsci complexity conundrum
  5. FTC busts domain name scammers
  6. Tech's most notorious CEO scandals
  7. Is there a patch for stupid?
  8. Verizon LTE plans leaked
  9. Are new IETF switching, routing specs needed?
  10. Google-Verizon net neutrality plan raises questions

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment