Wednesday, August 05, 2009

How open source management software stacks up

CEOs rake in perks despite pay backlash; Layoffs leading to more self-employment
Network World logo

Network/Systems Management Alert

NetworkWorld.com | Update Your Profile


Sponsored by Perot Systems
rule

Electronic health records are here.
Every American will have an electronic health record by 2014. Perot Systems has been a market leader of healthcare delivery solutions for more than 20 years. The future is here and there is no time to waste. Call us today. 1.888.31.PEROT.

rule

Spotlight Story
How open source management software stacks up

GroundWork Open Source earns kudos for its software offering, which includes commercial support for open source tools, a 24-7 development community and a low price point. Read full story

Related News:

CEOs rake in perks despite pay backlash
Executive compensation is under fire, but CEOs are still enjoying perks such as company jets, personal security, financial planning advice and club memberships.

Layoffs leading to more self-employment
There are signs that an increasing number of people who have been forced out of their jobs are starting their own businesses.

F5 platform takes a la carte approach to application delivery
F5's new Big-IP 3900 lets midsize companies consolidate application acceleration, security and optimization services on a single 1U platform.

Has unified mobile management for business arrived?
Whether IT likes it or not, mobile devices such as the iPhone, BlackBerry, and Windows Mobile families are becoming part of IT's job to manage. But the tools are uneven and scattered.

Is your resume being sold by recruiters to other recruiters or companies?
I was given a tip about the problem of recruiters posting fake jobs; this was just to get a 1,000 or more resumes to sell. I guess I did not know this, but there is a nice business going on now in this area. So to see what would happen we made up three resumes of fake people.

Cloud-based identity services taking on a different look as they grow
Cloud-based identity services are starting to gain a foothold among corporate users, but the evolving architecture looks nothing like the platforms companies have been building internally, according to Bob Blakley, vice president and research director at the Burton Group.

XML flaw threatens apps built with Sun, Apache, Python and GNOME libraries
Security vendor Codenomicon has found flaws in XML parsers that enable denial-of-service attacks, corruption of data, and even delivery of a malicious payload.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


Black Hat's best
Black HatHow well you remember the Black Hat conference's most notorious incidents?

Wireless burning questions
IT quizHow much longer are you going to hang onto that Ethernet cable? And other questions.

Application Performance Solution Center
Review this site on managed application delivery services for your Enterprise. Peruse these whitepapers, and other offers to get up to date on your WAN needs.
Review this site today.


Realize Significant Storage Cost Savings with Automation
Dramatically increase storage utilization with a system that automates storage capacity management. Benefits include: Identifying and redirecting dark storage, allowing data to grow into existing storage safely, the ability to reclaim over-provisioned storage, a fast return on investment. Don't let storage unnecessarily drain your IT budget.
Realize Significant Storage Cost Savings with Automation

 

August 05, 2009

TOP STORIES | MOST DUGG STORIES

  1. When error messages go public
  2. CEOs still getting big perks despite pay backlash
  3. BGP vulnerabilities in Cisco IOS
  4. Kevin Mitnick seeks refuge from hackers
  5. Conficker talk sanitized at Black Hat to protect investigation
  6. Fake ATM doesn't last long at hacker meet
  7. Korean 'journalists' booted from Defcon
  8. Black Hat 2009: How to hack a parking meter
  9. Nine things about botnets that will scare your pants off
  10. Some IT skills hot, even in down economy

Choosing the Best WLA Vendor for your Environment
Which vendor is leading the job scheduling pack? Learn which company has the best vision for today and tomorrow and which vendor displays the strongest ability to execute on that vision. Get critical tips on finding the best workload automation platform for your organization.
Read More



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: