Friday, December 30, 2011

Network World Outlook 2012: Fabrics, tablets, IPv6 & more

Can you keep your IT staff in 2012? | Enterprise smartphone and tablet incursion to grow in 2012

Network World Daily News AM

Forward this to a Friend >>>


Data center, cloud fabrics all the rage in 2012
There was a considerable amount of activity in the data center/cloud switching fabric arena in 2011. That is expected to continue in 2012, along with real world implementations of the next-generation IT technologies. Read More


WHITE PAPER: CA Technologies

The Changing Role of IT
This white paper analyzes research conducted by IDG Research Services about the changing role of IT: what's driving the change, what skill-sets will be more valued and what should forward-looking IT executives consider as IT shifts increasingly towards an IT supply chain model. Learn More

In this Issue


WHITE PAPER: Quest Software

Separating the Virtualization Hype from Reality
Download this paper today and get an exclusive link to a free desktop virtual assessment! Click on the link at the end of the paper to analyze and report on your current network, user and application usage. Read Now!

Can you keep your IT staff in 2012?
IT staff retention is shaping up to be one of the biggest challenges facing CIOs in 2012. Read More

Enterprise smartphone and tablet incursion to grow in 2012
Workers bringing their own devices to work was one of the biggest challenges IT departments faced in 2011, in 2010 and in 2009 as well. And guess what? It's going to be one of the biggest challenges in 2012 too. Read More

2012: Virtual desktops are all the rage
As budgets are locked in for 2012 it's time to aggressively expand server virtualization, and for those who have been held back by cost, to consider virtual desktops. Read More

IPv6 due for wide deployment in 2012, experts say
This was the year that IPv6 garnered major headlines, but 2012 is expected to be the year when the next-generation Internet protocol gets widely deployed by U.S. carriers and enterprises. Read More

Extreme CEO: New products in 2012, growth in 2013
After years of stagnant or lackluster growth, Extreme Networks tapped Oscar Rodriguez to bring new life to the switch maker in 2010. He scrutinized global operations, streamlined the product line and brought a new focus that he says will really come through this spring with a new wave of switches. Read More


WHITE PAPER: VeriSign

Protecting Your Critical Information Infrastructure
A strategy that assures the availability and reliability of vital resources while protecting them from malicious attacks is at the core of network operations and security. This paper defines four key components of such a strategy, and offers a practical set of guidelines for ensuring its success. Read Now!

Security minefield: 'Bring your own device' will bedevil IT security in 2012
The rapid adoption of the newest mobile devices -- especially the Apple iPhone and iPad and the Google Android-based equivalents -- will be a huge disruptive force in enterprise security next year. Not only will there be pressure to decide how to protect and manage these devices, which are growing as malware targets, the complexity of this task is magnified many times over because companies are allowing employees to use their own personal smartphones and tablets for business purposes -- what's sometime called "bring your own device" (BYOD). Read More

On the company dime: Rogue game server admins tell all
Back in January, Scandinavian gamers hijacked a New Hampshire medical center's server to host "Call of Duty: Black Ops" sessions. When asked about that incident, Stephen Heaslip of the gamer site Blues News told Network World that hackers are not the most likely individuals to commandeer corporate servers for illicit gaming: Such appropriations are more often the work of IT administrators, he said. When asked if he could put us in touch with some of these rogue game server admins, Heaslip posted a call to his readership -- and four volunteers stepped forward. Read More

Look, touch and feel: How your mobile interface will morph in 2012
The mobile user interface is set for a range of changes in the next 12-24 months, creating new modes for users to interact with their devices, and with other devices nearby and network-based services. Read More

Antivirus software sales expected to show strong growth in 2012
The prevalence with which hackers are handing out headaches to IT security pros will have a big upside for vendors in the coming year, according to new figures from Canalys. Read More

For 2012, power-efficient servers could get a shot in the ARM
In 2012 a fundamental change in server architecture could be on tap as companies look to cut data center costs with the help of technologies like ARM processors and graphics chips, analysts said. Read More


WHITE PAPER: Meraki

Integrating the iPad into Enterprise Networks
As a wireless-only device, the Apple iPad puts new requirements on the security, capacity, and manageability of enterprise wireless networks. This technical whitepaper provides best practices for supporting iPads in secure enterprise environments, without training or added staff. Read more.

Cloud activity to explode in 2012
In testing cloud computing services and observing the growth of cloud activities, we've noticed that there are distinct phases that organizations go through in adopting cloud. Read More

Microsoft in 2012: All Eyes on Windows 8
While 2011 was not a breakthrough year for Microsoft products, the company held steady amid criticism regarding its absence from the tablet market, its late arrival to the cloud, and low sales for Windows Phones. Read More

Big Data, analytics get even bigger, hotter in 2012
Every enterprise software vendor will tell you how hot and in-demand their products are, but the notion rings fairly true with respect to BI (business intelligence) and advanced analytics. The products just kept selling throughout the global recession, as companies looked to gain insights into their business and subsequently, more efficiency as well as new ideas. Read More

Apple in 2012: 5 Reasons It Will Be a Tough Year
Apple's extraordinary run over the last few years may begin to show signs of slowing next year--its first year without visionary leader Steve Jobs. Read More

10 Hot IT Jobs for Managers and Executives in 2012
If you had to pick two words to describe how the market for management- and executive- level IT jobs is shaping up for 2012, you might channel Curb Your Enthusiasm star Larry David and say "pretty good. Pri-tay, pri-tay, pri-tay, pri-tay good." Read More



SLIDESHOWS

10 Things We Love and Hate about Ubuntu Oneiric Ocelot 11.10
Ubuntu 11.10 has some jagged edges and documentation isn't easy to locate, but Canonical is certainly dreaming big with this latest update, dubbed Oneiric (dreamy) Ocelot.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Windows 8 picture password is 'Fisher-Price toy'
  2. Dem PAC buys newtgingrich.com, wallops him with it
  3. DHS sued for Big Bro fake 'friends' monitoring social media
  4. iPad 3 rumor rollup for the week ending Dec. 20
  5. Data center, cloud fabrics to heat up in 2012
  6. 25 useful iPad business apps
  7. IPv6 due for wide deployment in 2012, experts say
  8. Extreme CEO: New products in 2012, growth in 2013
  9. 25 top network and IT industry news stories of 2011
  10. Top security incidents of 2011

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


Thursday, December 29, 2011

25 top network and IT industry news stories of 2011

30 events that shaped Cisco in 2011 | Microsoft: 5 smart and 5 dumb moves the company made in 2011

Network World Daily News AM

Forward this to a Friend >>>


25 top network and IT industry news stories of 2011
2011 will be remembered for Jobs' death, Cisco's refocusing, IPv6's coming out party and more Read More


WHITE PAPER: CA Technologies

The Changing Role of IT
This white paper analyzes research conducted by IDG Research Services about the changing role of IT: what's driving the change, what skill-sets will be more valued and what should forward-looking IT executives consider as IT shifts increasingly towards an IT supply chain model. Learn More

WHITE PAPER: Quest Software

Separating the Virtualization Hype from Reality
Download this paper today and get an exclusive link to a free desktop virtual assessment! Click on the link at the end of the paper to analyze and report on your current network, user and application usage. Read Now!

30 events that shaped Cisco in 2011
2011 was a tumultuously transitional year for Cisco. The company came to the realization that its strategy for growth by entering new markets spread it too thin, distracted it from core markets and impacted profits. It cost thousands of employees their jobs. Read More

Microsoft: 5 smart and 5 dumb moves the company made in 2011
Love it or hate it, Microsoft is a company that brings out strong emotions in just about every IT professional. With 2011 about to end, it is time for our picks of some of smartest moves this powerful software company made this year - and some of the moves we'd say were not so bright. Read More

2011's biggest security snafus
Perhaps it was an omen of what was to come when the city of San Francisco on New Year's Eve 2010 couldn't get a backup system running in its Emergency Operations Center because no one knew the password. Read More


WHITE PAPER: VeriSign

Protecting Your Critical Information Infrastructure
A strategy that assures the availability and reliability of vital resources while protecting them from malicious attacks is at the core of network operations and security. This paper defines four key components of such a strategy, and offers a practical set of guidelines for ensuring its success. Read Now!

The weirdest, wackiest and coolest sci/tech stories of 2011
This year we find horses helping to build the Internet, Apple having all the money in the world and way more wackiness Read More

IBM at 100: How Big Blue helped redefine corporate architecture
Led by IBM President Thomas Watson Jr., Big Blue's building boom cemented IBM's role as design patron Read More

2011's most notable tech industry deaths
Here's a look back at those who died this year whose impact on the industry and our lives will carry on. Read More


WHITE PAPER: Meraki

Integrating the iPad into Enterprise Networks
As a wireless-only device, the Apple iPad puts new requirements on the security, capacity, and manageability of enterprise wireless networks. This technical whitepaper provides best practices for supporting iPads in secure enterprise environments, without training or added staff. Read more.

Best and worst celebrity technology moments of 2011
Scarlett Johansson, Justin Bieber, Charlie Sheen, Lady Gaga and Alec Baldwin all make tech news, voluntarily or not Read More

Facebook Year in Review: 2011 Props and Flops
From new features to ongoing privacy concerns, this year was a busy one for Facebook. Here's a look at the best and worst from Facebook in 2011. Read More

Should tech pros get an MBA?
IT pros who earn MBA degrees are valued for their hybrid technical-business skills Read More

Top 20 Buzzblog posts of 2011
As another year winds to a close, we pause to ask: What did Buzzblog readers actually read when they came to visit Buzzblog in 2011? Here are the top 20 items (a few of which are slideshows and one of which was a news story that didn't actually run on the blog, but were nonetheless my work): Read More



SLIDESHOWS

10 Things We Love and Hate about Ubuntu Oneiric Ocelot 11.10
Ubuntu 11.10 has some jagged edges and documentation isn't easy to locate, but Canonical is certainly dreaming big with this latest update, dubbed Oneiric (dreamy) Ocelot.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Windows 8 picture password is 'Fisher-Price toy'
  2. Dem PAC buys newtgingrich.com, wallops him with it
  3. DHS sued for Big Bro fake 'friends' monitoring social media
  4. iPad 3 rumor rollup for the week ending Dec. 20
  5. Data center, cloud fabrics to heat up in 2012
  6. 25 useful iPad business apps
  7. IPv6 due for wide deployment in 2012, experts say
  8. Extreme CEO: New products in 2012, growth in 2013
  9. 25 top network and IT industry news stories of 2011
  10. Top security incidents of 2011

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


Wednesday, December 28, 2011

Best reviews of 2011

Ubuntu breaks from the Linux pack | Palo Alto earns short list status

Network World Daily News AM

Forward this to a Friend >>>


Hands-on review: Xoom battles iPad 2 to a draw
We got our hands on the two hottest products in the tablet computing market -- the Motorola Xoom and the iPad 2 and put them to the test. This was a 15-round heavyweight fight and in the end, the Xoom stood toe to toe with the reigning champ, iPad 2. Read More


WHITE PAPER: CA Technologies

The Changing Role of IT
This white paper analyzes research conducted by IDG Research Services about the changing role of IT: what's driving the change, what skill-sets will be more valued and what should forward-looking IT executives consider as IT shifts increasingly towards an IT supply chain model. Learn More

RESOURCE COMPLIMENTS OF: Alcatel-Lucent

Discover the new currency for the networked-community age
Alcatel-Lucent's Allison Cerra and Christina James spent a year pursuing the essence of identity in the virtual world and beyond. With Identity Shift, they examine how technology, identity and expectations intersect, offering a compelling look at how we present and protect ourselves, build trust, and find value in the networked-community age. Click to continue

Ubuntu breaks from the Linux pack
Ubuntu 11.04 (nicknamed Natty Narwhal) marks a decided change in direction for the Linux-based operating system. The biggest change is that Canonical, the organizer of Ubuntu, is replacing the Gnome/KDE desktop environment with a new user interface called Unity. Read More

Palo Alto earns short list status
Palo Alto Networks has injected excitement and innovation into the firewall market with its "next-generation" appliances that combine traditional firewalls, threat mitigation technologies such as anti-malware and intrusion prevention, and the new magic dust of application identification. Read More

How to protect smartphones and tablets
We set up a comprehensive test that included eight mobile devices, four operating systems, two service providers and five mobile management vendors. Read More


WHITE PAPER: Quest Software

Separating the Virtualization Hype from Reality
Download this paper today and get an exclusive link to a free desktop virtual assessment! Click on the link at the end of the paper to analyze and report on your current network, user and application usage. Read Now!

Cisco impresses with UCS
If you're tempted to think of Cisco's Unified Computing System (UCS) as just another blade server — don't. In fact, if you just want a bunch of blades for your computer room, don't call Cisco — Dell, HP, and IBM all offer simpler and more cost-effective options. But, if you want an integrated compute farm consisting of blade servers and chassis, Ethernet and Fibre Channel interconnects, and a sophisticated management system, then UCS might be for you. Read More

Cisco sets the bar for mobile security
Cisco has been a leader in remote access VPNs since 1999, and its latest release, the AnyConnect Secure Mobility Solution, will make both end users and network managers very happy, despite a few rough parts. Read More

iPad 2 vs. business class tablets
Tech lovers have been flocking to the iPad 2 and other tablets in order to watch movies, read books, surf the Web and make video calls on the latest, greatest, thinnest, lightest, coolest devices. But where do tablets fit within the enterprise? Read More


WHITE PAPER: VeriSign

Protecting Your Critical Information Infrastructure
A strategy that assures the availability and reliability of vital resources while protecting them from malicious attacks is at the core of network operations and security. This paper defines four key components of such a strategy, and offers a practical set of guidelines for ensuring its success. Read Now!

New security tools protect virtual machines
5-product test reveals differences between Reflex, Catbird, Beyond Trust, Hytrust and Trend Micro. Read More

Splunk explains it all
Enterprise-class product devours log data and delivers powerful analysis of security issues. Read More

First look at Windows Azure
Microsoft's vision of a Windows-only cloud is ambitious, but too many features are currently still in beta. Read More



SLIDESHOWS

10 Things We Love and Hate about Ubuntu Oneiric Ocelot 11.10
Ubuntu 11.10 has some jagged edges and documentation isn't easy to locate, but Canonical is certainly dreaming big with this latest update, dubbed Oneiric (dreamy) Ocelot.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Windows 8 picture password is 'Fisher-Price toy'
  2. Dem PAC buys newtgingrich.com, wallops him with it
  3. DHS sued for Big Bro fake 'friends' monitoring social media
  4. iPad 3 rumor rollup for the week ending Dec. 20
  5. Data center, cloud fabrics to heat up in 2012
  6. 25 useful iPad business apps
  7. IPv6 due for wide deployment in 2012, experts say
  8. Extreme CEO: New products in 2012, growth in 2013
  9. 25 top network and IT industry news stories of 2011
  10. Top security incidents of 2011

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


Tuesday, December 27, 2011

About Computer Networking: Looking Ahead to Online Video in 2012

If you can't see this email, click here

About.com

Computer Networking

Fundamentals

Get Connected

Use and Upgrades



From Bradley Mitchell, your Guide to Computer Networking
It's time for New Year prognosticators to lock in their gues... er, forecasts for 2012. Many, like these predictions for online video in 2012, might seem obvious. Does anyone want to go out on a limb and predict Apple will ship a new television product next year?

Home Networking For Internet TV
Home networks aren't just for PCs. Smartphones, game consoles, and handhelds are also now commonly networked to each other and to the Internet. One of the most popular usages of these connected consumer devices: watching television.

How Fast Does Your Network Need To Be?
Depending on what you are trying to accomplish, a 5 Mbps network connection might be unacceptably slow, or more than good enough. Understanding the performance requirements of different network usages helps you judge whether yours is up to the task.

Extending The Range of a Wi-Fi Network
Several different techniques can be used to boost the wireless signal range of a Wi-Fi network as described here.

Top Apple iOS Apps For Wireless Networking
Did you receive an Apple iPhone or iPad as a gift this holiday season? Consider adding some of these apps for networking to your collection.

 


Wireless / Networking Ads
Featured Articles
What Is TCP/IP?
Setting Passive FTP Mode In Internet Explorer
Tracking The Owner Of An IP Address
Readers Respond: How Much Does Your Internet Cost?
Home Network Diagrams
What Is Computer Networking?

 

More from About.com

Living with Depression
By obtaining the correct medical intervention and learning better coping skills, you can not only live with depression, but live well. More>



9 Symptoms of Depression
If you have experienced five or more of these symptoms within the same two week period, this could be indicative of an episode of depression. More>




This newsletter is written by:
Bradley Mitchell
Computer Networking Guide
Email Me | My Blog | My Forum
 
Sign up for more free newsletters on your favorite topics
You are receiving this newsletter because you subscribed to the About Computer Networking newsletter. If you wish to change your email address or unsubscribe, please click here.

About respects your privacy: Our Privacy Policy

Contact Information:
249 West 17th Street
New York, NY, 10011

© 2011 About.com
 


Must Reads
Wireless Router Networking
IP Addresses + Internet Networks
Connecting Two Computers
Home Network Diagrams
Home Network Setup Advisor Tool
 
Follow me on:
Facebook Twitter

Advertisement