Search This Blog

Tuesday, May 31, 2011

BMC touts success with self-service workload automation tool

5 top social media security threats | Getting a handle on chaos and complexity

Network World Network/Systems Management

Forward this to a Friend >>>


BMC touts success with self-service workload automation tool
At Morneu Sheppell, a Toronto-based firm providing human resource consulting and outsourcing services, the ability to automate workloads has been critical to the company's ability to support continued growth. Read More


WHITE PAPER: HP

Technology Fueling the Next Phase of Storage Optimization
ESG examines trends influencing the adoption of deduplication and the limitations of existing solutions and details how HP is best positioned to deliver highly efficient deduplication solutions based on its new HP StoreOnce deplication technology Read now

WHITE PAPER: Oracle

A Technical Overview of the Oracle Exadata Database Machine
Discover how to accelerate database performance, handle change and growth in scalable, incremental steps, and deliver mission-critical data availability and protection with this unique commercial solution. Learn more.

5 top social media security threats
Social media platforms such as Twitter, Facebook and LinkedIn increasingly are being used by enterprises to engage with customers, build their brands and communicate information to the rest of the world. Read More

Getting a handle on chaos and complexity
There's a lot of interest these days in the notion of "controlling complexity," particularly when it comes to networks. It's obvious why: Complexity can translate directly to increased operational costs and decreased reliability. This perspective is summed up perfectly by some of the IT professionals I work with, who say things like, "I have no idea what's actually in my network anymore." Read More

The hubris of years: IT prowess can't be measured only by time on the job
I've been doing quite a bit of interviewing lately (again) and there's one thing that really smacks me in the face whenever I do this. And that is how much everyone seems to prize how long they've been doing something over how well they do it.  And in fact, when I'm giving my tech screenings, the number of times I ask someone a fairly easy question that they can't answer is staggering. Read More


WHITE PAPER: BMC

Managing Cloud Services from Request to Retirement
This lifecycle is tailored to the needs of the business, with both the flexibility to deliver the full required software stacks and the management rigor to ensure the operational integrity of the cloud. Read More Today!

Worst hackers ever?
We always hear about the big data breaches, the most devastating viruses, and the most denying of the denial-of-service attacks. But for every hacker with that level of deviousness, there are a thousand wannabes out there. Some get ridiculed, some get arrested. Read More

10 things we like and don't like about Check Point's R80 endpoint security product
Check Point's Unified Endpoint Security Management tool offers powerful single client for comprehensive endpoint security. Read More

Preparing for World IPv6 Day
World IPv6 Day (June 8, 2011) is approaching in about a week. This will be a landmark day for IPv6 Internet connectivity and IPv6-capable content providers. You will want to be prepared for this historic day in networking. This article will give you the background on what is happening on that day and how to help your organization be ready for the fun. Read More


WHITE PAPER: Diskeeper Corporation

Best Practices for Data Performance on Storage Area Networks
Because SANs work at a storage layer underneath the operating system's file system, SAN is unaware of file fragmentation and uable to solve this issue. Performance suffers. This white paper details in clear terms how, where and why Diskeeper data performance technology should be used to ensure maximum SAN performance and optimum data response time. Read more.

To be breached is human
Recent surveys hint at why it is so hard to protect networks and IT systems from attack: Our IT systems are designed, built, managed and used by us. Read More

New malware scanner finds 5% of Windows PCs infected
One in every 20 Windows PCs whose users turned to Microsoft for cleanup help were infected with malware, Microsoft says. Read More

Cloud CIO: The two biggest lies about cloud security
Survey after survey note that security is the biggest concern potential users have with respect to public cloud computing. Here, for example, is a survey from April 2010, indicating that 45% of respondents felt the risks of cloud computing outweigh its benefits. CA and the Ponemon Institute conducted a survey and found similar concerns. But they also found that deployment had occurred despite these worries. Read More

Can you have too much security?
Is there such a thing as too much security? Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Cisco Subnet: 15 copies of IPv6 for Enterprise Networks. Enter here.

SLIDESHOWS

7 things we love about Drupal 7
Drupal. the open source Content Management System (CMS) used to power everything from personal sites to the White House's Web site, is legendary for its flexibility and power. Here are the best things about it.

MOST-READ STORIES

  1. Windows 1.0: Still playing Reversi after all these years
  2. IE flaw could allow hackers access to accounts
  3. Apple sues teenager who sold white iPhone 4 conversion kits
  4. RSA tokens may be behind network security problems at Lockheed Martin
  5. Skype voice service crashes; users offered fix instructions
  6. Google Wallet: Five things you need to know
  7. Cisco is a top 3 server vendor
  8. Microsoft not to blame for Skype rejecting open source company
  9. Two convicted in U.S. over counterfeit Cisco gear
  10. Insider data theft costs Bank of America $10 million

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: