Thursday, July 16, 2009

How Dollar Thrifty geared up for summer

Make sure yours is a WAN with a plan; Invisible IPv6 traffic poses serious network threat
Network World logo

Network Optimization Alert

NetworkWorld.com | Update Your Profile


Sponsored by ArcSight
rule

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved.

rule

Spotlight Story
How Dollar Thrifty geared up for summer

As the busy summer season was approaching, Dollar Thrifty Automotive Group didn't want to take any chances on its Web properties. So the car rental company put its two redesigned Web sites through a host of performance tests, including on-demand load tests from Gomez. Read full story

Related News:

Make sure yours is a WAN with a plan
Now is an excellent time to be reevaluating your WAN strategy. New technologies such as carrier Ethernet and SIP trunking can help cut costs and increase availability. WAN and application optimization technologies can make better use of existing facilities. And many companies are experiencing a pause in the unrelenting expansion of branch offices -- making this the perfect time to take a few steps back and revisit the overall networking strategy.

Invisible IPv6 traffic poses serious network threat
IPv6 — the next-generation Internet protocol — isn't keeping too many U.S. CIOs and network managers up worrying at night. But perhaps it should.

WiMax growth slowing amid recession
WiMax subscriber growth slowed in the first quarter, and the emerging wireless technology will continue to struggle at least through this year, a survey by research company Maravedis indicates.

Microsoft customers face license hurdle to online apps
Microsoft promoted more of its Web-based software offerings at its Worldwide Partner Conference in New Orleans this week, but some analysts say the company's enterprise licensing terms provide little incentive for large customers to move away from its on-premise products.

Cisco, UnitedHealth team up to build a national network for virtual doctor visits
Cisco and health insurer UnitedHealth Group are piloting a network that connects patients and health care providers through videoconferencing technology, which would allow patients to be diagnosed through the use of biomedical imaging technology from remote locations.

IT cost management must: Chargeback
Forrester Research report details why IT chargeback practices and technologies will become mandatory for most IT organizations.

Capacity planning for Exchange
Microsoft Exchange e-mail systems have emerged as the de facto communication and collaboration tool for today's organizations. However, keeping Exchange running smoothly can be a headache, especially when capacity needs and performance requirements conflict.

IBM secures $2.5 million services deal with Delhi Stock Exchange
Delhi Stock Exchange contracts IBM to provide business continuity, disaster recovery, remote hosting and IT infrastructure management services.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Botnet boom
BotnetsThe number of botnets has grown from about 1,500 two years ago to 3,500 today.

Summer of geeks
IT quizSpace camp! They Might Be Giants! Check out these and 9 other vacation options.

Web Application Security without Compromise
Web applications are vulnerable in custom application logic, the underlying software platform as well as Web services. Learn how to protect your network against application-level attacks such as SQL injection, cross-site scripting and worm infections.
Click here to continue.


 

July 16, 2009

TOP STORIES | MOST DUGG STORIES

  1. Best Buy calls Twitter a job qualification
  2. Eight real-life robots that could kill us all
  3. How to use electrical outlets and cheap lasers to steal data
  4. Invisible IPv6 traffic poses serious network threat
  5. Cisco expected to guillotine more employees this Thursday
  6. Test: Best hypervisors for the desktop
  7. 11 security companies to watch
  8. Cisco multimillionaire goes broke, loses $300 million fortune
  9. Google opens attack on Lotus Notes install base
  10. How many Twitter followers does it take to get a job?

Next-Generation Data Centers
IT transformation begins at the data center, as enterprises embrace technologies such as virtualization and cloud computing to build adaptable, flexible and highly efficient infrastructures capable of handling today's business demands.
Read this Guide.



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment