Tuesday, December 13, 2011

What's next with hypervisors?

10 Tech Wins of 2011 | Will the cloud take my job?

Network World Daily News AM

Forward this to a Friend >>>


What's next with hypervisors?
The world of hypervisors is complicated by the fact that there are proprietary and open source tools and the latter are often pressed into service in different ways, say nothing of the fact that the whole market is evolving quickly. To get a handle on recent developments, Network World Editor-in-Chief John Dix corralled a panel of experts to assess where we are today and where we're going. Read More


RESOURCE COMPLIMENTS OF: Sprint

Sprint 4G Enterprise WAN
Easily connect new branch locations using a wireless network that is quick and affordable. It doesn't matter if it's one location or one hundred; a flexible WAN solution will help get you up and running faster. Together, we can help you grow as big as you want to be. Click to continue

RESOURCE COMPLIMENTS OF: Palo Alto Networks

10 Things Your Next Firewall Must Do
Choosing a next-generation firewall is more than a simple comparison of technical features. It's about balancing the needs of the business with the risks associated with modern applications. Gain access to valuable information in one location- read articles and watch videos that will empower you to make the right decision. Learn More!

10 Tech Wins of 2011
Among the high-profile flops, some companies managed to find success this year. Read More

Will the cloud take my job?
I remember the first SAAS application I helped deploy. It was great! One less application to worry about, and simple, fast installation. It meant an end to frequent application updates and late night service windows for IT. What I didn't realize at the time, was that "as-a-service" wasn't only nice for the infrastructure teams, it also tempted the business side into thinking IT could be replaced. Read More

Download Wrappers Are Wrong, Doubly Wrong With Open Source
How many times have you downloaded software over the net and while it was installing it asked you if you would like to use this terrific new toolbar or some other software? Worse yet, how many times did you install software you downloaded over the net only to find out that it installed other software without even asking you? No matter how many times it has happened to me, I always feel violated afterwards. Read More

Online holiday spending nears $25 billion
U.S. online shoppers have spent $24.6 billion so far this holiday season, marking a 15% increase compared to the first 39 days of the 2011 holiday season, according to Web watcher comScore. Read More


WHITE PAPER: FireEye

5 Methods to Disrupt Next- Gen Threats
Relying on signatures and lists are ineffective when trying to combat advanced malware threats. Discover how to augment existing firewalls, IPS and Web gateways with technology that recognizes new attacks in real-time without requiring prior knowledge of vulnerability, exploit or variant and then prevents system compromise and data theft. Read now.

Startup founded by ex-Cisco execs pushes software-defined networking
Software-defined networking startup Embrane this week came out of stealth mode to unveil its product and strategy for virtualizing network services. Read More

Intel's Warning Will Mean Pain for Everyone
Intel ruined the start of the trading week with some very bad news: it was lowering guidance for the fourth quarter by $1 billion due to lower sales, thanks to the flooding in Thailand. Read More

Microsoft releases first Office app for iPad
Microsoft today released an update to its OneNote application for iOS that it said has been tweaked for the iPad. Read More

Google pulls 22 more malicious Android apps from Market
Google has removed nearly two dozen malware-infected apps from its official Android Market in the last several days, according to San Francisco-based Lookout Security. Read More


WHITE PAPER: AMD

Make Virtual Desktops a Valuable Reality with AMD
This paper will explore how the fast-emerging trend of "desktop virtualization" is giving IT managers a potent solution for tackling the problems associated with PC sprawl. Read More!

The new age of malware
Smart devices, social media and increased online activity through app stores and other transaction-based websites are coming together in what one researcher says is a scary combination of factors that have dire implications for national security. Read More

FBI rejects FOIA request for Carrier IQ info
The FBI has denied a request for the release of information regarding its use of Carrier IQ's software, saying that releasing suchinformation could interfere with ongoing law enforcement operations. Read More

Lulzlover Hacked Coalition of Law Enforcement, Data Dumped for 2,400 cops and feds
There's been no shortage of OWS video footage and some of the outrageous stunts the cops have pulled, but it caused another Anonymous hacker to lock and load on the police. Read More

5 IT Security Breakthroughs Promise to Thwart Threats
For the past 25 years, a war has waged between malicious programmers and the researchers trying to make computing safe for the enterprise. The battle has shown no signs of subsiding — once a new countermeasure is deployed, the hackers find new ways to make IT worried. Read More

2011's Hottest Holiday Tech Gifts
Looking for the perfect gadget for everyone on your holiday list this year? Whether your budget is big or small and whether your recipients are old or young, here's a list. Read More



SLIDESHOWS

8 Free Wi-Fi security tools
Here are several free programs you can use to do Wi-Fi stumbling and surveying on all the popular platforms - Windows, Mac OS X, and Linux. You'll be able see all the nearby wireless access points (APs) and their details, including channels, signal levels, and MAC address.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. 8 free Wi-Fi security tools
  2. Surveillance industry objects to spying secrets & mass monitoring leaks
  3. Microsoft: 5 smart, 5 dumb moves the company made in 2011
  4. Usenix: Google deploys IPv6 for internal networks
  5. The tech jobs hiring boom is real -- for these skills
  6. Security roundup
  7. What's really going on with Carrier IQ on your phone
  8. Private investment firm buys Blue Coat for $1.3 billion
  9. 10 most powerful cloud companies
  10. Cisco storms back in switching

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: