Thursday, March 19, 2009

Establishing SLAs for key applications

A process that IT organizations should follow in order to focus on a handful of key applications
Network World logo

Wide Area Networking Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by ASG
rule

How to Populate Your CMDB in Four Steps
Generally, CMDBs populated by discovery tools alone simply aren't usable. They fail because they contain massive amounts of irrelevant information. You avoid this pitfall by correctly populating your CMDB in four simple steps. Learn more today.

rule

Spotlight Story
Establishing SLAs for key applications

Steve Taylor By Steve Taylor and Jim Metzler
The last newsletter highlighted the fact that the dialogue at Network World's recent IT Roadmap conference in Denver emphasized how the challenging economic environment puts pressure on IT organizations to focus even more than they do in normal economic times. With that in mind, this newsletter will begin to outline a process that IT organizations should follow in order to focus on a handful of key applications. Read full story

Steve Taylor is president of Distributed Networking Associates and publisher/editor-in-chief of Webtorials. Jim Metzler is vice president of Ashton, Metzler & Associates.

Related News:

The need to focus Last week in Denver, Network World hosted an event entitled 'IT Roadmap conference.' At that conference Jim moderated two tracks - one track was on Network Management and the other was on Application Delivery. The overall conference was very interactive with a lot of dialogue amongst end users, industry analysts, and vendors. That dialogue highlighted the fact that in 2009 IT organizations need to focus even more than they do in normal economic times. With that in mind, this newsletter and the next two newsletters will discuss the need for IT organizations to focus on a handful of key applications.

Application Delivery Controllers: Build, buy, or both? In a recent newsletter we discussed the 2008 Application Delivery Challenge. Since the challenge contains responses from two equipment providers and a service provider, it's given us the opportunity to revisit the " ...

Blue Coat outlines application delivery vision Blue Coat Systems last week aired its vision for providing infrastructure gear that can optimize and secure business applications, content and communications. Its lineup combines application monitoring, WAN optimization ...

A new era in application delivery The CIO sends out an e-mail to his IT managers saying that due to the economic downturn, networking costs must be reduced.

Company turns bad airflow into good cash flow, green IT For Wade Lowder, paying attention to which way the wind blows has had an enormous effect on his green IT initiative.

Mother Nature speeds school district virtualization project The road to virtualization for Michael Riggs was covered with five feet of snow, which it turns out was a blessing.

How Ball Corporation minimized operational complexity through WAN optimization Network World recently produced its first IT Roadmap conference of 2008 in Denver and there Jim interviewed Jamie Batmanglidj, senior systems architect for Comcast's Media Center, and Curt Hastings, director of ...

Cisco gets serious about application delivery Last week in Dallas, Jim moderated the network and application acceleration track of Network World's IT Roadmap seminar (the next IT Roadmap takes place in San Francisco on Nov. 30). During his presentation, Jim asked ...

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Exchange alternatives: Pros & cons
Clear Choice Test: Microsoft Exchange alternativesTesting shows Microsoft's Exchange still tops for features and management hooks.

App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

Sponsored by ASG
rule

How to Populate Your CMDB in Four Steps
Generally, CMDBs populated by discovery tools alone simply aren't usable. They fail because they contain massive amounts of irrelevant information. You avoid this pitfall by correctly populating your CMDB in four simple steps. Learn more today.

rule

Free Trial: Fluke's AnalyzeAir
Get the insight you need into the RF sources that impact your wireless LAN with a complimentary trial copy of Fluke Networks' AnalyzeAir software. With the right tools you can easily detect, identify and locate interference. Ensure your Wi-Fi network is safe and secure.
Register for your free software now.


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.

 

03/19/09

Today's most-read stories:

  1. Computer science major is cool again
  2. Report: IBM is in talks to buy Sun
  3. Rootkit to exploit Intel chip flaw to be posted 3/19/09
  4. Apple previews Version 3.0 of iPhone OS
  5. Cisco rivals size up UCS with usual reaction: caveat emptor
  6. Google Voice: GrandCentral grows up!
  7. Road signs hacked in NYC
  8. What Cisco's UCS means to management vendors?
  9. Web inventor Berners Lee conned by fake Web site
  10. A 10-piece sampler from Microsoft's patent pipeline
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Get a Clear View of your LAN
Quickly solve network problems with Fluke Networks' EtherScope Analyzer. Monitor network traffic and switch interfaces, discover devices, networks, VLANs and much more with this powerful portable network analyzer. Try it out on your network for free. Learn how today.
Get your free trial device now.



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: