Tuesday, February 28, 2012

NaviSite wants to host your virtual desktops

Tips for a successful PaaS rollout | Network operators get serious about Wi-Fi

Network World Network Optimization

Forward this to a Friend >>>


NaviSite wants to host your virtual desktops
Seeking to capture a slice of market share in the emerging field of virtual desktop services, NaviSite, a Time Warner Cable managed service provider of cloud-based products has announced its next major endeavor: a desktop as a service (DaaS) offering aimed specifically at enterprise customers. Read More


WEBCAST: NetIQ

Disaster Recovery Planning and the Cloud
Find out how virtualization is the stepping stone to the cloud and how to leverage virtualization technologies today to reduce the cost and improve the performance of your disaster recovery plan. Learn More!

WHITE PAPER: NetIQ

First Industy-Wide BSM Maturity Benchmark Study
This first-of-its-kind benchmark study reporting the IT and Business maturity illustrating the business service management imperative today. The survey offers insight into the current and future state of the Business Service Management imperative across global organizations. Learn More

Tips for a successful PaaS rollout
Any corporate application developer hoping to make the journey to the cloud with the help of a Platform as a Service implementation is wise to listen to those who have already ventured down that path. Read More

Network operators get serious about Wi-Fi
At Mobile World Congress, vendors and carriers will lay out a new future for Wi-Fi connectivity and services, one that's disciplined, convenient, reliable...and billable. Read More

Unified communications: Now mobile and in the cloud
Effective communications, many would argue, is the key to business. But finding the appropriate technologies to support effective communications can be challenging for IT professionals. Unified communications is a concept that encompasses a variety of technologies, all capable of working together, and, yes, while communication is a human process, technology can enhance and improve it. Read More


WHITE PAPER: Webroot

How to Protect Your Business from the Coming Malware Storm
This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service. Read More Today!

Study: Enterprise social networks failing to meet expectations
Enterprise social networking (ESN) software can improve communication and collaboration among employees, but most companies aren't implementing and using these products properly, leading to unmet goals, according to a new study. Read More

Dell claims it has network virtualization architecture too
Dell this week is throwing its hat into the virtual networking ring with an architecture that initially is long on vision but short on specifics. Read More

MIT takes aim at secure, self-healing cloud
What if a cloud computing infrastructure could recognize a cyberattack, eliminate it and never stop working while all that is being done? That's what researchers at MIT, with help from the federal government, are investigating the feasibility of. Read More


WHITE PAPER: Tripwire

Protecting Your Data in Today's Threat Landscape
Today's threats to critical systems and valuable data come from more sources than ever—a ticked off employee who seeks revenge, or activists seeking to expose sensitive data. Learn More!

Cisco buys optical company for $271 million
Cisco intends to acquire privately held Lightwire, a developer of optical interconnect technology for high-speed networking applications, for $271 million. Read More

Mobile network operators set guidelines for app privacy
Amid growing concerns over the privacy policies of mobile phone apps, the GSMA has published a set of guidelines that aims to give users more transparency, choice and control over how apps use their personal information. Read More

Trend Micro overhauls threat-detection product, returns it to customer premises
Trend Micro today announced Deep Discovery, a threat-detection tool designed to monitor network traffic in order to detect signs of stealthy attacks aimed at stealing corporate data. Read More



SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. IBM's molecular images may help nanoscale circuits
  2. 6 things you need to know about Google's new privacy policy
  3. The crime of selling used video games
  4. Giving up your iPhone
  5. A 1985 gift to Jobs meets 2012 copyright law
  6. Cisco bounces back
  7. iPhone 5 rumor rollup for the week ending Feb. 24
  8. Network operators get serious about Wi-Fi
  9. Cisco buys optical company for $271 million
  10. Cisco Q4 Ethernet switch revenue up, HP's down

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment