Friday, December 23, 2011

Process Analysis: A Necessary First Step To Automation

If you have trouble viewing this email, read the online version.

TechWeb Networking News Update -- Issue Highlights:
TOP STORY: Process Analysis: A Necessary First Step To Automation
ALSO SEE: Security Researcher Details New SCADA Bugs
ANALYTIC REPORT: Research: Windows 8
WHITE PAPER: Six Ways to Improve Storage Management
MOST POPULAR: 5 Ways The Smartphone Market Evolved In 2011
BLOG: All I Want For Christmas Is 10Gbase-T
WEBCAST: The Rise of Social Networks in the Enterprise
RESOURCES: InformationWeek Reports: Now Free

TechWeb
NETWORKING NEWS UPDATE 
  Friday, December 23, 2011
REPORTS & WHITEPAPERS   |     MOST POPULAR   |     BLOG   |     WEBCASTS   |     RESOURCES  
TOP STORY
Process Analysis: A Necessary First Step To Automation
Process automation has many benefits, but getting there can be tricky. Start with small, targeted projects.

ALSO SEE
Security Researcher Details New SCADA Bugs
Supervisory control and data acquisition systems' programmable logic controllers could be remotely accessed and loaded with trojanized firmware.

Who Owns The LAN? We Rank Six Switch Vendors
Cisco leads our IT Pro Ranking with an overall score of 77%, but HP, Dell, and others are finding ways to compete.

Verizon Cedes Data Center Management To Terremark
Terremark, acquired by Verizon this year, showcases security, capacity of the data centers it will now oversee.

Cisco CloudVerse: Build One Private Cloud, Multiple Hypervisors
Cisco steps back from close partner VMware to help firms build a private cloud using Microsoft Hyper-V and VMware ESX Server, plus Cisco blades.

VirtualSharp Upgrades Virtual Machine Disaster Recovery
ReliableDR 3.0 software targets enterprises and cloud service providers seeking simpler way to keep track of sprawling virtual environments.

  Digital Issue  
DOWNLOAD OUR SUPPLEMENT ON IT PROCESS AUTOMATION
Data Center Automation: Time to get going. The cloud requires automation, and it'll free resources for other priorities.

ALSO: Process Analysis: A necessary first step to automation.


DOWNLOAD NOW (Registration Required)

 


 

ANALYTIC REPORTS & WHITEPAPERS:
FEATURED REPORTS
Research: Windows 8
Microsoft's ambitious new OS tackles servers, PCs and mobile devices. But it has yet to prove it can compete with Apple, Google and RIM.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

spacer spacer spacer
FEATURED WHITEPAPERS
Six Ways to Improve Storage Management
As businesses deploy more applications and services, the costs of storing and managing the data they generate are soaring. Storage virtualization presents a viable option to curb the data management expenses. This white paper reveals a storage resource management solution that gives IT organizations the monitoring, visibility, reporting, and trend analysis they need to make virtualization work the way it is supposed to - to fully utilize storage resources.
 

TODAY'S MOST POPULAR STORIES @ TECHWEB.COM:
5 Ways The Smartphone Market Evolved In 2011
The smartphone market is one of the most dynamic in the world. Here are the five biggest smartphone trends that took place during 2011.

10 Epic Android Apps
Among the hundreds of thousands of Android apps, we've rounded up 10 epic, must-have choices. These apps will save your bacon, day in and day out.

12 Epic Tech Fails Of 2011
From Apotheker to Zuckerberg, tech chiefs had plenty of time on the hot seat this year. Take a look back at the notable product, strategy, and security fails of 2011.

 

FROM THE NETWORK COMPUTING BLOG:
Featured  Blogger All I Want For Christmas Is 10Gbase-T
By Howard Marks
Dear Santa: The best present Santa, and the networking industry, could give me is general availability of 10GBase-T across switches and NIC/CNAs. Once I can just order my 10gig network gear with 10Gbase-T, I can stop worrying about how to pay for optical transceivers at $350-$1,200 a pop, as well as the never ending compatibility problems with both optics and twin-ax direct connect cables.

Security 2011: Attack Of The Human Errors
By Robert Mullins
Some household names in enterprise and consumer technology suffered the embarrassment of having been hacked by cybercriminals in 2011. RSA, of all companies -- the IT security division of EMC -- had to admit that its two-factor SecureID protection technology for customers had been compromised. And the most high profile breach affecting consumers made news when the Sony PlayStation Network was hacked, affecting 77 million customers whose private information was stolen.

Ignoring BYOD Spells Disaster!
By Joe Onisick
Last week in a blog titled ‘BYOD- Bring Your Own Disaster’, I urged caution and scope for BYOD projects. This week I'm playing devil's advocate to myself. A conversation with Greg Knieriemen got me thinking of the consequences of ignoring BYOD. Let's dive into the risk of burying your head in the sand and ignoring the BYOD push.

 

WEBCASTS:

The Rise of Social Networks in the Enterprise
Join this webinar to hear from the real experts -- the IT and finance executives who have implemented ERP in the cloud. Learn how they dealt with old systems and challenges, understand their evaluation process and the questions they asked, and hear how their deployments are today. It happens December 15.
More Information & Registration
 

RESOURCES AND EVENTS:
InformationWeek Reports: Now Free
Good news, readers: We've changed the name of InformationWeek Analytics to InformationWeek Reports--and made the service free to registered users.
It happens March 25-29 in Orlando, Fla.


This e-mail was sent to networking.world@gmail.com

NETWORKING NEWS UPDATE
-- Published By TechWeb
600 Community Drive
Manhasset, NY 11030


To subscribe to our other newsletters, change your e-mail
address or format (Text/HTML) or to unsubscribe, click here



Keep Getting This Newsletter
Don't let future editions of Techweb's Networking News Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment