Thursday, May 07, 2009

The siloed vendor offerings

The impact of silos that surround vendor offerings
Network World logo

Wide Area Networking Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by Citrix
rule

Citrix Handling Today's Network Traffic
Learn how you can replace your aging load balancer with a true web application delivery appliance that not only provides 100% availability but also delivers web apps with the highest performance and security possible.

rule

Spotlight Story
The siloed vendor offerings

Steve Taylor By Steve Taylor and Jim Metzler
In past newsletters we commented on the fact that IT organizations are typically organized around silos of technology. We recently received some e-mail from our readers who acknowledged the fact that IT organizations are siloed, but also drew our attention to the impact of the silos that surround vendor offerings. We will use the next few newsletters to talk about those siloed vendor products and services and to begin a discussion of cloud computing. Read full story

Steve Taylor is president of Distributed Networking Associates and publisher/editor-in-chief of Webtorials. Jim Metzler is vice president of Ashton, Metzler & Associates.

Related News:

Proactively managing IT services There's a growing desire among IT professionals to manage their diverse technologies according to the services they deliver, to have a predictive view of those services and a cross-silo view of the components that ...

Siloed reputation management vs. small town reputation management Recently, I was talking about the relatively new identity management area of online reputation management. Some siloed reputation management systems were mentioned (e.g., eBay, Yelp, Trip Advisor), which are the ones ...

A framework for a WAN architecture The last couple of newsletters looked at some of the risks associated with architecture. In this newsletter we will discuss the fact that in spite of those risks we believe that this is a very important time for IT organizations to develop a WAN architecture. To put that last comment in context, we believe that the need for an architecture increases when there is a lot of change in the environment and we are currently seeing a lot of change underway in the WAN environment.

What belongs in a WAN architecture? In the last newsletter, we began the discussion of what topics need to be included in a WAN architecture. We discussed the fact that Cisco's Application eXtension Platform (AXP) allows IT organization to embed applications into their Integrated Services Router. This is an option that has not been available previously and IT organizations need to make a decision as to whether or not they want to make use of this new capability.

May Giveaways
Cisco Subnet
, Microsoft Subnet and Google Subnet are collectively giving away books on Google Apps Deciphered, the CCNA Security exam, an awesome SQL Server 2005/2008 training video and the grand prize, a Microsoft training course from New Horizons worth up to $2,500. Deadline for entries May 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Citrix
rule

Citrix Handling Today's Network Traffic
Learn how you can replace your aging load balancer with a true web application delivery appliance that not only provides 100% availability but also delivers web apps with the highest performance and security possible.

rule

Compare Identity Management Products

Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's newly enhanced Identity Management Product Guide.

Click here to visit now.


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.

 

05/07/09

Today's most-read stories:

  1. Domain name company cries croc tears over 'censorship'
  2. Why BlackBerry still beats iPhone for some
  3. Death of the mouse
  4. Leaked copies of Windows 7 RC contain Trojan
  5. RIM to bind BlackBerry to Cisco phones
  6. Top 7 reasons people quit Linux
  7. Citrix embraces Apple with iPhone virtualization
  8. Give users passwords they don't have to remember
  9. Cisco cool to Obama's tax loophole plan
  10. Use the Cisco restroom at your own risk
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: