Monday, August 08, 2011

The accidental revolution: How Apple's iPhone transformed enterprise IT

5 cool tools for cloud management | Data center surprises

Network World Network/Systems Management

Forward this to a Friend >>>


The accidental revolution: How Apple's iPhone transformed enterprise IT
There's a good article over at Fortune about how Apple's iPhone -- always intended as a consumer device -- opened the floodgates for Apple's invasion of the enterprise with mobile devices. Read More


WHITE PAPER: CA Technologies

Exceptional Application Experience
Deliver a consistent and quality end-user experience with application performance management that enables you to: - Measure and analyze application performance for all transactions - Compare the response times against intelligent baselines and thresholds - Identify abnormal latencies in the infrastructure Learn More

WHITE PAPER: F5

Hardware Load Balancing
A comprehensive F5 solution readies application infrastructure for a successful implementation of the re-engineered Microsoft Exchange Server 2010. Learn More!

5 cool tools for cloud management
Cloud management tools are as varied as cloud uses. For this test, we chose five tools that each attack cloud management from a different perspective. Read More

Data center surprises
It isn't surprising that virtualization topped the list of technologies expected to have the biggest impact on data center investments over the next two years, according to a new Network World study, but the survey turned up some surprises as well. Read More

Staying ahead of cloud complexity
Managing cloud infrastructure and services is similar to traditional network management - only bigger, badder and more complex. Read More


WHITE PAPER: Riverbed

Business Value with Network and Application Visibility
In this white paper, IDC analyzes the ROI that customers can expect from Riverbed Cascade, based on interviews with Cascade customers. Additionally, IDC lays out the business case for proactively managing network and application performance. Get the visibility you need to achieve your IT objectives. Read Now.

5 lessons I've learned about how to create memorable and useful SharePoint governance plans
I feel like I've worked on a gazillion SharePoint governance plans - or at least half that many - and each time, I think the latest one is the best one. I've definitely learned that the 80-page governance plan document is just that - a document. It doesn't actually help govern a SharePoint deployment, much less provide any type of guidance to SharePoint users. Here are 5 of the lessons I've learned. Read More

Cyber-espionage attacks threaten corporate data in new unrelenting ways
Stealthy, sometime long-term cyber-espionage attacks to steal sensitive proprietary information -- what some now call "advanced persistent threats" (APT) -- have become a top worry for businesses. Read More

4 reasons Windows Phone 7 will beat iPhone and Android
Microsoft has a relatively long history with mobile operating systems, stretching back to the mid-nineties and Windows CE. Developed originally for "embedded systems," Windows CE quickly found its way into PDAs and eventually phones, and while consumers never warmed to the platform, it did achieve a level of success in the enterprise. Read More


WHITE PAPER: Emerson Network Power

Ten Steps to Increasing Data Center Efficiency
You can't manage what you don't monitor. That's why infrastructure monitoring is essential to data center optimization. Emerson Network Power outlines what you should be monitoring, how to monitor it and the results you can expect. Take the proactive approach to infrastructure monitoring. Read now

Build your own camera, launch it like a grenade
Meet the Firefly. Israeli defense contractor Rafael Armament Development Authority calls it a "revolutionary concept in tactical intelligence," but really it's a wireless camera that's shot 500 feet in the air by a grenade launcher. And if a couple of hackers here at the [Defcon] hacking convention get their way, soon anyone will be able to buy this type of military grade technology for only $500. Read More

The data center network transition
Up until a couple of years ago, the data center network was somewhat staid. Today, however, it is anything but staid as the majority of IT organizations are trying to determine how they should evolve their data center networks to support the demands brought about by the ongoing adoption of technologies such as server virtualization. Read More

Freedom and privacy, R.I.P.
Gibbs sees two kinds of privacy, and if both aren't already lost, they soon will be. Read More

How to conduct a Linux server security audit
Nowadays many Linux servers are neither initially installed nor maintained by dedicated Linux administrators, yet IT professionals are responsible for their servers' security. If your server is compromised, not only can all your sensitive information be exposed, but your server can also become a tool in the wrong hands. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

Chromebooks you can buy now
Here's a roundup of computing devices that run Chrome OS, a few which you can buy now, or which may be on the way.

MOST-READ STORIES

  1. Scariest Black Hat story so far: Power plants at risk
  2. Leaked Verizon document reveals key launch dates
  3. Cisco Videoscape chief resigns
  4. Black Hat: routers using OSPF open to attacks
  5. VMware backpedals on price changes after customer criticism
  6. Black Hat: Lots of hacks and patriotic plea
  7. AT&T cracks down on free tethering and hotspots
  8. Webcam to computer users: Sit up straight
  9. South Korea fines Apple ... How much?
  10. 5 surprising IT skills that hiring managers want now

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment