Tuesday, December 07, 2010

Private cloud software available; Cisco, BMC develop cloud platform

Network World Data Center - Newsletter - networkworld.com
Cisco, BMC co-develop cloud platform for service providers | Enhanced trust and data integrity in the public cloud

Network World Data Center

Forward this to a Friend >>>


Private cloud software available as free beta download
A startup founded by the creator of Amazon's Elastic Compute Cloud is now offering a free beta download of its software, which creates Amazon-like clouds behind the enterprise firewall. Read More


RESOURCE COMPLIMENTS OF: i/o Data Centers

i/o's Data Center Checklist
i/o's comprehensive data center checklist provides more than 120 criteria to evaluate data centers and colocation providers. Criteria include data center structure, environmental threats, utility, backup, and conditioned power, cooling, compliance, access control, network connectivity & carrier availability and more. Download Now.

RESOURCE COMPLIMENTS OF: AccelOps

Virtualization & Cloud Blindspots?
Having VM triage and optimization issues? Building private/hybrid clouds? How can you assure service quality and performance reliability? AccelOps integrated monitoring delivers end-to-end visibility, proactive control, reduced MTTR and service intelligence. Test the ultimate data center monitoring platform in-house with our 14-day trial download.

Cisco, BMC co-develop cloud platform for service providers
The Integrated Cloud Delivery Platform, jointly developed by Cisco and BMC, is aimed at eliminating many of the manual steps required to set up and provision cloud computing services. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

Enhanced trust and data integrity in the public cloud
If you run applications or store data in the public cloud, what assurance do you have that the service provider is maintaining the integrity of your critical assets? How would you know if a security breach ever happened? Now there is a simple solution to verify data integrity in the cloud. It provides absolute verifiable proof that your data, code and logs have not been compromised. Read More


WHITE PAPER: APC by Schneider Electric

Data Center Infrastructure: Optimizing Business Value
To stay competitive in today's rapidly changing business world, companies must update the way they view the value of their investment in data center physical infrastructure (DCPI). No longer are simply availability and upfront cost sufficient to make adequate business decisions. Learn more

Microsoft gains cloud security certification … six months after Google
Microsoft counters Google's cloud momentum in the government market with FISMA certification. Read More

IT spending to be up as much as 6% in 2011
IT spending may grow by almost 6% next year due to cloud computing, mobile networking and social media, according to market researcher IDC. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

December goodies from the Subnets
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Top IT Turkeys of 2010
Thanksgiving is a time for giving thanks for all of the people and things we love, to cherish what's most important to us. But that's for another slideshow. This one's all about taunting the companies, products and people who most resembled a turkey over the last year. So cut me a hockey-puck-shaped slice of jellied cranberry sauce and read on.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. Facebook rolls out redesigned profile pages
  2. WikiLeaks' only 'friend' on Twitter could become target, too
  3. Feds tracking Americans' credit cards in real-time without a warrant
  4. Droid 2 phone explodes, bloodies Texas man
  5. 2010's biggest security SNAFUs
  6. Is Apple repeating the same mistake it made with PCs?
  7. Is a next-generation firewall in your future?
  8. Verizon's LTE pricing: Good deal or gouge?
  9. Microsoft gains cloud security certification ... six months after Google
  10. Offshoring blamed in part for IT's jobless recovery

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_data_center_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment