Thursday, August 13, 2009

Anti-social networking; State of VoIP/Video Management

State of VoIP/Video Management; Asian undersea cable disruption slows Internet access
Network World logo

Wide Area Networking Alert

NetworkWorld.com | Update Your Profile


Sponsored by HP - NWW
rule

IDC: Realizing the Benefits of Deduplication
Many organizations are grappling with rapidly growing storage requirements. IDC has found that those organizations are experiencing 50% growth in data, adding as much as 4TB of data each year.

rule

Spotlight Story
Anti-social networking

As an extension of our discussion of social networking, I feel compelled to mention the antisocial aspects that sometime accompany networking communications. In social networks, in which there is some degree of personal relationship, albeit perhaps not face-to-face, there is a relatively high level of civility. In fact, there is a level of appropriate discourse that tends to rather polite, just as there would be in person because people are naturally nice to each other and/or they fear being punched in the face. Read full story

Related News:

State of VoIP/Video Management
EMA recently conducted a survey of IT practitioners, looking to understand current practices for managing real-time IP communications like VoIP and IP Video Conferencing technologies such as telepresence. Remember why these are so interesting – they require protected/prioritized bandwidth and are latency-intolerant, and thus often drive changes in your network architecture plus your planning and...

Asian undersea cable disruption slows Internet access
A segment of the Asia-Pacific Cable Network 2 (APCN2) undersea cable network between China and Taiwan suffered a serious cable fault on Wednesday, causing Internet traffic to be rerouted onto other undersea cables and slowing Internet access for some users in Southeast Asia.

Berkeley lab gets $62M to build blazing Ethernet network
Berkeley lab will build Energy Sciences Network (ESnet) a prototype 100Gbps Ethernet network to connect Department of Energy supercomputer centers at speeds 10 times faster than current ESnet

Riverbed retools management console for MSPs
As more providers add WAN optimization to their managed service portfolios, it makes sense for equipment makers to tailor their WAN optimization gear to the needs of those carriers.

Staffing: IT Professionals Want Job Security, Not High Fives
A survey conducted by IT research firm Gartner earlier this year pinpointed the staffing conundrum facing CIOs today: It's hard to reward and retain key IT staff who weren't laid off from their organizations when there's no money in the IT budget for raises.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


Cool BlackBerry games
Black HatBlackBerries are known for e-mail, but they are also getting better at mobile games. Here are 10 of the best.

Google facts
IT quizTake this quiz to see how well you know the company – and no fair googling the answers.

Masters of Enterprise Storage
Visit this site to learn of newest storage advancements, issues and product announcements - issues such as Fibre Channel over Ethernet and whether vendors' plans for the technology make sense. The site includes a weekly blog, briefs on storage technologies and products, and links to stories on IDG's sites about storage.
Learn more.


Controlling Access to Privileged Accounts
This white paper explores insider attacks and insider risk, and shows how to control them by controlling and monitoring access. The paper describes the more common vulnerabilities exploited by insider attacks and a method for assessing insider risk.
Controlling Access to Privileged Accounts

 

August 13, 2009

TOP STORIES | MOST DUGG STORIES

  1. Should your credit report disqualify you for a job?
  2. Top 10 must-have iPhone business apps
  3. How famous OS logos got started
  4. 10 worst video game systems of all time
  5. Why Microsoft is sabotaging desktop virtualization
  6. Do HP, 3Com value claims trump Cisco?
  7. Who says the router can't be sexy?
  8. Microsoft, Apple, Mozilla patches
  9. Patch Tuesday: What the experts are saying
  10. Windows 7: How low can you go?

Choosing the Best WLA Vendor for your Environment
Which vendor is leading the job scheduling pack? Learn which company has the best vision for today and tomorrow and which vendor displays the strongest ability to execute on that vision. Get critical tips on finding the best workload automation platform for your organization.
Choosing the Best WLA Vendor for your Environment



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: