Search This Blog

Monday, August 02, 2010

Root-cause analysis made easier

  Happy SysAdmin Day (despite the pay) | How business is putting the iPad to work
 
  Network World Network/Systems Management

Forward this to a Friend >>>


Root-cause analysis made easier
Within highly siloed organizations, the root cause-analysis process often degenerates into one involving more finger-pointing than problem-solving. Even within IT organizations that have good cross-discipline teamwork for troubleshooting, getting to the root cause of a problem can be a troublesome and time-consuming exercise. Read More


RESOURCE COMPLIMENTS OF: AccelOps

Virtualization & Cloud Blindspots?
Having VM triage and optimization issues? Exploring private/hybrid clouds? How can you assure service quality and performance reliability? AccelOps integrated monitoring delivers end-to-end visibility, proactive control, reduced MTTR and service intelligence. Visit AccelOps and obtain you EMA research's "Pragmatic Guide to IT Service Management"

WHITE PAPER: Novell

Efficiently Delivering Enterprise-Class File-Based Storage
IDC: Read about the exponential growth in file-based storage. Learn how having intelligence on data stored can help storage managers make smarter decisions about data storage, protection, archiving, retention, and disposition. Read Now.

Happy SysAdmin Day (despite the pay)
July 30 was System Administrator Appreciation Day, but the IT workers who keep corporate desktops, servers and networks running didn't have much to celebrate. Read More

How business is putting the iPad to work
When Steve Jobs unveiled the iPad in January, he pitched it mostly as a consumer device -- a relaxation tool people would use to read books, play games, watch video and peruse family photos. But Michael Kanzleiter and his colleagues at Mercedes-Benz Financial saw something else: A better way to sell cars. Read More

Virtualization management: Rush in too fast and you'll crash
You wouldn't race down the motorway the day after you've passed your driving exam. You need to mature: learn the basics, build up your experience, and plan ahead. Virtualization is no different. Almost every organization is rushing headlong to deploy the technology, create the building blocks for cloud computing, and capitalize on the advantages of agility, cost, quality, and risk. Read More


WHITE PAPER: HP

Is your WAN designed with your applications in mind?
WAN sourcing has been based on the cost of bandwith and availability. The focus is increasing on sourcing WAN solutions that can meet business needs for application performance. Read about Gartner's structured methodology to design a WAN that both performs well and is cost effective. Read Now

CA Technologies secures Google Docs, eyes more of the cloud
CA Technologies outlined plans to expand its cloud-computing security strategy, including immediate support for Google Docs by its CA Identity Manager product. Read More

It's time to virtualize Microsoft Exchange (but not with Hyper-V)
Microsoft isn't accustomed to being in second place in any market, but that's the situation it has had to accept as it challenges VMware for supremacy in the x86 virtualization world. Read More

Bare-metal desktop hypervisors: A primer
The bare-metal hypervisor, also known as a Type 1 hypervisor, is desktop virtualization software that is installed directly onto the PC's hardware. But the technology is in its infancy -- even big players like Citrix and VMware are struggling to get bare-metal hypervisors out of the conceptual phase and into production. Read More


WHITE PAPER: HP

ROI of Switched Ethernet Networking Solutions
IDC interviewed several organizations to determine their future networking strategies. Learn how they built a foundation to meet network switch demands with an average 5.7 month payback and zero annual maintenance fees. Read Now

VA set to spend billions on IT
The U.S. Veterans Administration is making upward of $12 billion in IT contracts available to businesses over the next five years, as part of an effort to modernize its operations. Read More

Best practices for cleaning up your firewall rule base
After years of use, the rule bases that drive your network firewalls get unwieldy -- clogged with expired, obsolete, duplicative and conflicting policies. For better performance, stronger security and compliance with regulations, you'll want to clean up those rule bases, either manually or with tools that automate the process. Read More

Data deduplication: Reducing storage bloat
Enterprise data explosion threatens to overwhelm storage systems, particularly the backup tier. Here's how data deduplication can help. Read More

Open source web apps often insecure, new tool discovers
Security company Qualys has released a new open source tool, BlindElephant, which can accurately fingerprint web applications down to version level in order to better manage the security issues which now plague such software. Read More

How are large-scale, dense Wi-Fi networks affecting radio management issues?
One emerging issue for some enterprise Wi-Fi networks is radio management challenges as the number of access points and wireless clients grow. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Mobile deathmatch: Apple iOS 4 vs. Android 2.2
Apple's iOS has been wowing users for four years in the iPhone and now the iPad. Available in smartphones and now tablets from various vendors going on two years, Google's Android has proven itself to be a strong contender that has the only real chance to surpass iOS.

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer.

MOST-READ STORIES

  1. 'Unhackable' Android phone can be hacked
  2. ATM hack gives cash on demand
  3. Black Hat gets its video feed hacked
  4. Happy SysAdmin Day (despite the pay)
  5. FBI rings organizers over Defcon contest
  6. WPA2 vulnerability found
  7. Microsoft's 2010 software 'most complicated lock-in decision in years'
  8. Microsoft: Gmail like a Jaguar with 'vinyl seats'
  9. Bad guys could read RFID passports at 217 feet, maybe more
  10. New Zealand pizza lovers suffer information theft from Hell

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: