Search This Blog

Tuesday, June 21, 2011

12 ways the cloud changes everything

Most IT pros don't fear losing their jobs to the cloud | 10 Must-Have Mobile Apps and Web Services for a Successful Summer Vacation

Network World Daily News AM

Forward this to a Friend >>>


12 ways the cloud changes everything
Despite fears over reliability and security, enterprises are slowly but steadily moving their applications to the cloud, and the migration is going to change those companies in profound ways. Read More


WHITE PAPER: BMC

Moving to a Cloud-based Delivery Model
Help Desk software as a service is attractive to many IT departments. It offers the same benefits of traditional IT help desk solutions, in addition to reducing capital expenses, accelerating implementation, and providing easier upgrades. This paper explores considerations for implementing IT service management in-house or as a service. Read Now!

WEBCAST: IBM

"Free" Open Source Portals: Myth, Hype, or Reality?
Go beyond software license fees when evaluating a portal solution. Learn more about Key trends in the portal market, what's driving demand for portals, cost drivers for portal projects and what to consider when evaluating commercial vs. open source portal solutions from experts in the industry. View Now

Most IT pros don't fear losing their jobs to the cloud
Most people in the IT industry are sure that enterprise cloud computing usage will double in the next two years. But they also feel that IT professionals will not be displaced from their enterprise jobs because of the cloud. Read More

10 Must-Have Mobile Apps and Web Services for a Successful Summer Vacation
With these essential apps, you can avoid road rage, bedbug-infested cabin fever, and other travel maladies while maximizing your relaxation time. Read More

Innovation Final: Vint Cerf vs. Steve Jobs
In what will be a two-day open voting, it is the Father of the Internet vs. the person who has brought consumerization into the enterprise. Vint Cerf and Steve Jobs have steamrolled their way through the field to get to the finals. It is now a chicken-and-egg situation: without the Internet would Apple's products be as popular today? Or did Apple's products push the Internet to new heights? Vote now! Read More


WHITE PAPER: Raritan

Best Practices: KVM Smart Card Authentication Systems
Selecting a smart card-enabled KVM system? Choose one that supports PKI authentication to multiple servers from a single location and makes the necessary KVM feature adjustments to enable seamless use of the reader. This White Paper examines best practices when evaluating a Smart Card solution. Learn More

IBM expands cloud disaster recovery services
IBM on Monday announced two cloud-based disaster recovery services for businesses: the IBM SmartCloud Virtualized Server Recovery and the IBM SmartCloud Archive. Read More

NSA wants bulletproof smartphone, tablet security
The National Security Agency, America's high-tech spy agency which also plays a key role in approving hardware and software for use by the Department of Defense, wants to be able to outfit military personnel with commercial smartphones and tablets -- but based on a NSA security design. Read More

Huawei unveils 7-inch tablet running Android 3.2
Chinese telecommunications equipment manufacturer Huawei unveiled a 7-inch tablet running version 3.2 of Google's Android mobile OS on Monday. It plans to sell the device in the Americas, Asia-Pacific and some European countries in the third quarter. Read More


WHITE PAPER: CA Technologies

CIOs Feel the Pressure to Optimize the Online Experience
In this exclusive survey, CIOs weigh in on the business impact of application performance. This white paper presents the survey results and offers guidance on building a business case to optimize the customer experience with consistently excellent application performance. Learn More

Vulnerability analysis tools add compliance features
Compliance is a natural extension of a vulnerability analysis tool. Normal vulnerability scanning includes searching for unpatched systems, unprotected directories, and other errors in configuration. Read More

Pilots spar over wisdom of relying on iPads in the cockpit
We left off last week with an item about American Airlines moving toward issuing iPads to its pilots so that they don't have to lug 35 pounds of paperwork and charts onto every flight. Read More

15 Ways iPad Goes to Work
Apple's iconic iPad reports for work in all sorts of strange places, from archaeological digs in Pompei to movie sets in Hollywood to cockpits in the sky. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

10 SaaS companies to watch
These days, companies are applying the software-as-a-service (SaaS) model to just about everything, from core business functions, including IT, to industry-specific processes. This list, compiled with the help of SaaS trend watchers and users, provides a representative look at what types of software you'll find offered in the cloud.

MOST-READ STORIES

  1. Gartner: IT should be planning, moving to private clouds
  2. Wi-Fi client surge forcing fresh wireless LAN thinking
  3. How RIM is getting left behind
  4. Debate goes on whether HTML5 is "Holy Grail"
  5. The funniest sites on the Web
  6. Many disappointed in virtualization, cloud computing
  7. Attackers exploit latest Flash bug on large scale
  8. 17 super-specific social networks
  9. Do you know where your security holes are?
  10. Cisco distracted by reorg

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: