Thursday, January 14, 2010

The other side of desktop virtualization; AT&T to FCC: Time to end yesterday's network

AT&T to FCC: Time to end yesterday's network | Illegal downloading using corporate networks on the up

Network World Wide Area Networking Alert

Forward this to a Friend >>>


The other side of desktop virtualization
In a recent newsletter we introduced the concept of Application Delivery 2.0, a major component of which is virtualization. In our last newsletter we discussed the interest that we see in desktop virtualization and what we see as the drivers of that interest. We also pointed out that there are two primary forms of desktop virtualization, client-side and server-side, and discussed the challenges associated with client-side virtualization. We will use this newsletter to discuss the challenges associated with server-side virtualization. Read More


SPONSOR: HP

4 Key Principles of Storage Virtualization
Applying the concept of virtual resource pools to storage can transform the virtualized storage infrastructure. Read this ESG report to learn best practices on; storage virtualization, application integration, capacity and power optimization, and storage & server convergence. Read Now!

SPONSOR: Juniper Networks

Data Center Survival Guide
The Juniper Data Center Survival Guide shows IT professionals how to survive in this increasingly complicated environment. It explains how to simplify your infrastructure and network management now with Juniper Networks®. Read More

AT&T to FCC: Time to end yesterday's network
The FCC's request for comments about transitioning from "circuit-switched network to all-IP network" could produce some interesting and maybe useful results, according to columnist Scott Bradner. Read More


SPONSOR: Dell

Case Study: Six Billion Slurpees and Counting
Managing remote users was a help desk nightmare for convenience storage giant, 7-Eleven. Read how 2800 new laptops were deployed in 30 days reducing help desk calls by 67%, decreasing management costs by 81% and increasing productivity by 30%. You'll even get the latest tally on Slurpees sold! Learn More

Illegal downloading using corporate networks on the up
The number of office workers using their corporate network to illegally file-share has increased, says ScanSafe. Read More


SPONSOR: Riverbed

Rapid Replication for Virtual Servers
What's the connection between virtualization and acceleration? It's deeper than you might think. See how these two hot technologies complement each other to consolidate servers, enhance DR and simplify the IT infrastructure. Learn more.

ISP operators among 19 arrested in cyber-fraud case
The owner of a Dallas-based Internet service provider that was raided last April has been charged with participating in a conspiracy to defraud more than US$15 million from companies such as Verizon, AT&T and XO Communications. Read More

Exinda aims to uncloak anonymous proxy traffic
New software features from Exinda aim to prevent end users from using anonymous proxy servers to bypass traffic management measures. Read More

Users shun fixed line, flock to 3G
Adoption and use of 3G networks and wireless broadband exploded last year as consumers flocked to grab the latest Internet-ready mobile, according to new research. Read More



New look

We've revamped our newsletters so that they're cleaner, easier to read and lighter on the HTML formatting. What do you think? Let us know - and thanks for reading!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Cisco buys Rohati Systems; On Microsoft Subnet: Charting out prices for Office 2010; On Google Subnet: Google plans free white spaces database.

Ethernet everywhere Decade in tech
Here is a quiz on the most important or quirkiest tech stories to hit the front pages over the first 10 years of the 2000s.




Windows 7Cool Yule Tools
Best picks from this year and a look back at 10 years of tech toys and gadgety gifts.




MOST-READ STORIES

  1. Google may pull out of China after cyberattacks
  2. Facebook unleashes lawyers on Web 2.0 Suicide Machine
  3. Forrester: Tech downturn 'unofficially over'
  4. IBM still leads in patents, Microsoft maintains No. 3 spot
  5. World's biggest cruise ship sails through wireless challenges
  6. Quiz: What were the first products from today's tech companies?
  7. Banking malware found in Google Android market
  8. MagicJack unveils femtocell at CES
  9. Cisco ASA takes on botnet
  10. Google attack part of widespread spying effort

Network World on Twitter? You bet we are

You are currently subscribed to networkworld_wide_area_networking_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Update your profile | Terms of Service/Privacy

Copyright Network World, Inc., 2010

Network World, Inc.,, 492 Old Connecticut Path, Framingham, MA 01701


No comments: