Search This Blog

Tuesday, July 05, 2011

Ubuntu breaks from the Linux pack

First look at Windows Azure | Do you know where your security holes are?

Network World Product Test

Forward this to a Friend >>>


Ubuntu breaks from the Linux pack
Ubuntu 11.04 (nicknamed Natty Narwhal) marks a decided change in direction for the Linux-based operating system. The biggest change is that Canonical, the organizer of Ubuntu, is replacing the Gnome/KDE desktop environment with a new user interface called Unity. Read More


WHITE PAPER: Riverbed

Adding Visibility to WAN Optimization
Too often network professionals find themselves stuck in reaction mode, which can prevent them for strategically planning for positive, long-term benefits. Read this report to learn some best practices for understanding and improving the visibility and performance of mission-critical, networked applications. Read now!

WHITE PAPER: IBM

A new way of working: Insights from global leaders
Learn how high-performing organizations are using dynamic, collaborative and connected way of working to be more effective and competitive in today's quickly shifting markets. published by the IBM Business Value Institute. Read Now

First look at Windows Azure
There's "the cloud" and then there's Windows Azure. We tested the available production-level features in Microsoft's platform-as-a-service (PaaS) offering, and found that Azure is similar in many ways to what already exists in the cloud sky. Read More

Do you know where your security holes are?
We all worry that there's some lurking security problem in our servers. We do what we can, patching, following best practices, keeping up-to-date with training and news. But wouldn't it be great to have an automated tool to check our work? That's the promise of vulnerability analyzers: products that detect problems in configuration, applications, and patches. Read More


WHITE PAPER: Dell

Take the Guesswork Out of Virtualization
Take the guesswork out of the typically complicated task of designing, setting up, and configuring a virtual infrastructure. This reference configuration is comprised of three servers, two switches, and one storage array. Complemented with the right virtualization software, you can support your users. Read now.

Vulnerability analysis tools add compliance features
Compliance is a natural extension of a vulnerability analysis tool. Normal vulnerability scanning includes searching for unpatched systems, unprotected directories, and other errors in configuration. Read More

Vulnerability analyzers offer Web scanning as an option
Web scanning is different from vulnerability scanning because it looks for bugs in the Web apps themselves, rather than the software installed on the Web server. Read More


WHITE PAPER: EMC

The Changing Role of Network Management
Read how new challenges in IT like virtualization and cloud computing are changing the role of Network Managers, who are now required to leverage automation and integrated solutions even further to adapt to these changes. Learn how EMC Ionix Network Solutions help Network Managers overcome these challenges. Read now

Review: A Tale of Three Tablets
As the popularity of Apple's iPad continues to grow, we're seeing more competitors jumping into the space with their versions, all with the hopes of duplicating or getting close to the tablet experience offered by the iPad. Read More

Office 365 vs. Google Apps: The InfoWorld review
With Office 365 now available in final form, here's what you need to know to decide if Office 365 or Google Apps (or neither) is right for your organization. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

Five potential Facebook killers
The social networking scene is constantly in flux. Facebook is at the top of the heap right now, but challengers are springing up all the time, hoping to leverage the next big wave into a lucrative IPO. Here are five social media sites that are creating a buzz.

MOST-READ STORIES

  1. 5 hot social networking sites
  2. New York Times has a lot of angry iPad subscribers after latest gaffe
  3. Cisco Cius is not a tablet
  4. Is the operating system dead?
  5. A few suggestions for destroying the 'indestructible' botnet
  6. What's so cool about SIP?
  7. HP plans major enterprise push for TouchPad
  8. IBM takes dim view of EU claims
  9. NYC mayor demands $600M refund on software project
  10. Google Chrome hits 20% global share as Microsoft continues browser slide

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_product_test_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: