Tuesday, May 12, 2009

The network is dead, long live the network

The Interop conference has lessened its attention on networking, but networking is far from staid
Network World logo

Wide Area Networking Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by EMC
rule

EMC's CSO Explains the Triple A's of Security Mgmt.
Roland Cloutier, EMC's Chief Security Officer shares his secrets for managing Authentication, Audit, Availability and security of the IT network infrastructure. Join us on Wednesday, June 3 at 2:00 p.m. ET/11:00 a.m. PT to find out how. Register for this Live Webcast now.

rule

Spotlight Story
The network is dead, long live the network

Steve Taylor By Steve Taylor and Jim Metzler
The Las Vegas Interop conference is upon us once again. At one time, Interop was all about networking, and the conference would devote multiple tracks to network technologies such as ATM. At this year's conference, there are tracks on a wide range of topics, including Enterprise 2.0, Green IT, cloud computing and virtualization. Read full story

Steve Taylor is president of Distributed Networking Associates and publisher/editor-in-chief of Webtorials. Jim Metzler is vice president of Ashton, Metzler & Associates.

Related News:

How current WAN firewalls are flawed Last time, we mentioned that the current generation of WAN firewalls has not advanced as rapidly as the security threats that the firewalls are supposed to protect against. Today we'll examine that in greater detail and identify some of the key weaknesses in the current generation of firewalls.

Next-generation WAN firewalls: First, a history lesson Some forms of WAN firewalls have been around for a couple of decades. It is hard to deny that firewalls are helpful. They are. It is also hard to argue that they are very exciting. In fact, since the turn of the century the types of security threats facing IT organizations has changed dramatically while the WAN firewall has not added much new functionality. That situation appears to be changing. As we’ll explain in the next couple of newsletters, a next-generation WAN firewall is being deployed that is intended to combat the security threats of the 21st century.

The impact of VDI The last couple of newsletters looked at some of the challenges associated with implementing virtualized servers. This newsletter will examine some of the challenges associated with implementing a virtualized desktop infrastructure (VDI).

The impact of server virtualization In the last newsletter, we began discussing some of the challenges associated with server virtualization. In this newsletter, we will continue that discussion by talking about some of the specific WAN challenges that are associated with server virtualization.

The challenges of virtualization The recent IT Roadmap conference in Chicago began with Jim and two other analysts on stage being asked questions by John Gallant. Given the current economic conditions, the question and answer session focused on cost savings. One of the questions posed to Jim was, "Should IT organizations be looking to implement virtualization as a means of saving money?" Jim's answer was yes, but only if they realize the impact that virtualization has on the WAN, on management, and on application delivery. The next few newsletters will explain exactly what that impact is.

Interop soldiers on in the face of a bad economy, swine flu Interop Las Vegas faces challenges because of restricted IT budgets nationwide, the poor economy and the unpredictable impact of a swine flu epidemic, but the show is forging ahead with new programs including a segment dedicated to cloud computing.

Interop: 25 random things about Las Vegas
For those who attend Interop this month and think they have some free time, here are 25 quintessentially Vegas things to consider while visiting the city of lights.
Plus:
The Network World Las Vegas Interop 2009 Planning Guide

Interop off to a good start Cisco Subnet blogger Larry Chaffins says that based on the number of vendors contacting him for meetings/briefings at Interop, this year's attendance should be pretty much on par with last's show.

Best of Interop Awards are going well, I am a judge this year. But who will make the biggest bang? The Best of Interop Awards are going well this year, this being my first appearance as a judge. I have had a few people ask me if I was going to judge this year, so I decided it was time to let...

The Best of Interop finalists Cisco Subnet blogger Larry Chaffin unveils the list of Best of Interop finalists -- do any surprise you?

May Giveaways
Cisco Subnet
, Microsoft Subnet and Google Subnet are collectively giving away books on Google Apps Deciphered, the CCNA Security exam, an awesome SQL Server 2005/2008 training video and the grand prize, a Microsoft training course from New Horizons worth up to $2,500. Deadline for entries May 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by EMC
rule

EMC's CSO Explains the Triple A's of Security Mgmt.
Roland Cloutier, EMC's Chief Security Officer shares his secrets for managing Authentication, Audit, Availability and security of the IT network infrastructure. Join us on Wednesday, June 3 at 2:00 p.m. ET/11:00 a.m. PT to find out how. Register for this Live Webcast now.

rule

Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09.
Register now, attend free


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.

 

05/12/09

Today's most-read stories:

  1. Robot Fight Club
  2. The Internet sky really is falling
  3. Death of the mouse
  4. Bill would turn Internet flamers into felons
  5. Ubiquitous GPS coverage could soon get spotty
  6. Extreme, Force10 address growing 10G use in data centers
  7. Data center 10G whets switching companies' appetites
  8. Inside a data leak audit
  9. UC Berkeley says hacker broke into health-services databases
  10. Designing for high-density Wi-Fi coverage


Network World on Twitter: Get our tweets and stay plugged in to networking news


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09.
Register now, attend free



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: