Tuesday, April 28, 2009

5 tools to prevent energy waste in the data center; Broadcom bid for Emulex raises data center bar

Products that will make the data center more efficient
Network World logo

Data Center Alert

NetworkWorld.com | Data Center Research Center | Update Your Profile


Sponsored by HP
rule

HP Digging deeper into server virtualization
In Part 2 of our 3-part Video Insider series on server virtualization, Tom Henderson from Extreme Labs explores the concepts and strategies related to implementing this technology into your enterprise.

rule

Spotlight Story

5 tools to prevent energy waste in the data center
Data centers are filled with power-hungry racks of storage and servers, but many products and services are capable of reducing the power usage of existing IT equipment. With Earth Day upon us, here are five tools to help data centers stop wasting energy.View now.

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or
66.186.127.216 to your white-list file. Thank you.

Broadcom bid for Emulex raises data center bar for Cisco Broadcom says the proposed combined company -- the latest example of consolidation in the data center market -- could use its portfolio to provide low-cost, network-converged storage and networking to customers.

Group proposes cloud management standard DMTF creates new group dubbed the Open Cloud Standards Incubator, which will be dedicated to addressing the need for open management standards for cloud computing.

Tips for greener computing There are two really good reasons to practice green computing: It saves you money, and--bit by bit--it helps save the planet. It's a major win-win. Here are just a few of the little things you can do to make a big difference.

Cloud computing is cheaper, greener but not yet enterprise ready This week a panel assembled to discuss cloud computing. There was a lively discussion covering what cloud computing is (not just software-as-a-service), who benefits most from today's offerings, the truth/myth of the old CAPEX vs. OPEX argument and cloud computing's impact on the environment.

Universities get $5 million in grants to use IBM/Google cloud The IBM/Google cloud computing project for universities got a boost Thursday with the National Science Foundation awarding nearly $5 million in grants to 14 universities participating in the initiative.

Cisco's Chambers: Cloud computing a 'security nightmare' Cisco CEO John Chambers painted a less-than-sunny view on cloud computing security at RSA, saying that "it can't be handled in traditional ways."

When the FBI Raids a Data Center: A Rare Danger As part of coordinated raids in early April, FBI agents seized computers from a data center at 2323 Bryan Street in Dallas, Texas, attempting to gather evidence in an ongoing investigation of two men and their various companies accused of defrauding AT&T and Verizon for more than $6 million.

Sun ties identity software to Google Apps Premier, Amazon cloud platform Sun Wednesday tied its identity federation software to Google Apps and added its directory and Web application server to the cloud platform it is building for developers to build and test applications.

Could Oracle/Sun be good for Cisco? An industry analyst counters the prediction that Oracle's acquisition of Sun will raise the stakes for Cisco, pointing out that the Cisco/Oracle partnership could be strengthened by bringing Sun into the fold.

Sun ties identity software to Google Apps Premier, Amazon cloud platform Sun Wednesday tied its identity federation software to Google Apps and added its directory and Web application server to the cloud platform it is building for developers to build and test applications.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber …and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by HP
rule

HP Digging deeper into server virtualization
In Part 2 of our 3-part Video Insider series on server virtualization, Tom Henderson from Extreme Labs explores the concepts and strategies related to implementing this technology into your enterprise.

rule

Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

04/28/09

Today's most-read stories:

  1. Some IT skills see pay hikes during downturn
  2. Seven burning security questions
  3. The downfall of Sun
  4. The legal risks of ethical hacking
  5. Conficker.E to self-destruct on May 5th?
  6. Researchers show how to take control of Windows 7
  7. Einstein systems to inspect U.S. government's Internet traffic
  8. The evolution of Ethernet
  9. The biggest losers in the Oracle, Sun deal
  10. Intel CPU cache poisoning: dangerously easy on Linux
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment