NETWORKING NEWS UPDATE | | TOP STORY Virtualization, Unified Communications Meet, At Last Unified communications servers and virtualization do mix, more enterprises find. But desktop virtualization and UC remains tricky. ALSO SEE Computing Cartels Shake Up IT Purchasing Massive firms with global reach will emerge during the next 10 years, offering optimized stacks of computing capability on a pay-per-use basis. The Upside-Down SAN Vendors are pushing local flash storage for your most active data, which may turn your storage area network to a digital dumping ground. HP Displaces Cisco, EMC In Sabre Data Centers $800 million deal with travel industry leader replaces rivals' aging equipment with HP's latest virtualized, converged systems. Avaya Buys Radvision, Broadens Video Reach Radvision will help Avaya provide low-bandwidth, high-definition video to a broader variety of devices. Cloud ROI: The Missing Link What return are you getting on your investments in public cloud services? New research reveals you probably don't know, and that's a problem. FROM THE NETWORK COMPUTING BLOG: Seagate's HAMR Time: Can't Touch This...Yet! By Steve Wexler Seagate is inching closer to the next evolution of disk technology – heat-assisted magnetic recording (HAMR) – with the demonstration of 1 terabit (1 trillion bits) per square inch and the intention of releasing 3.5-inch hard drives with up to 60 terabytes capacity as early as 2015. That's double the capacity of the current drive technology, Perpendicular Magnetic Recording (PMR), which replaced longitudinal recording, starting in 2006. Boundary Hosts Network Monitoring Service By Frank J. Ohlhorst Real-time network monitoring is quickly becoming a must have capability for network managers supporting transaction intensive networks, especially when cloud based applications are involved. Data Classification Tips & Technologies Part 2 By Esther Shein Even though the process of classifying data is, in theory, well understood and considered a tenet of good business and security practices, industry observers say companies are not doing it across the board—or doing it well. RESOURCES AND EVENTS: Take Our Public Cloud Survey InformationWeek is conducting a survey on the state of private cloud use in the enterprise. Upon completion of our survey, you will be eligible to enter a drawing to receive an 32-GB Apple iPod Touch. Additionally, you will receive a discount code good for 25% off Flex and Conference passes to Interop Las Vegas 2012, to be held at the Mandalay Bay, May 6-10. It happens March 25-29 in Orlando, Fla. | This e-mail was sent to networking.world@gmail.com | NETWORKING NEWS UPDATE -- Published By TechWeb 600 Community Drive Manhasset, NY 11030 To subscribe to our other newsletters, change your e-mail address or format (Text/HTML) or to unsubscribe, click here | | Keep Getting This Newsletter Don't let future editions of Techweb's Networking News Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. We take your privacy very seriously. Please review our Privacy Statement. | | | |
| | You are Cordially Invited to the Spring Fashion Show and Startup Gala Experience the elegance of this festive event at the Fairmont San Francisco on Friday April 27th 2012 What: Spring Fashion Show and Startup Gala When: Friday April 27th 2012 (7:00 PM) Where: Fairmont San Francisco Link: http://sffashion.eventbrite.com/ Please purchase your tickets early! ~~~~ Tickets: http://sffashion.eventbrite.com/ ~~~~ We sincerely hope that you take advantage of our Early Bird Special All attendees receive a gift bag valued at over $500. | | | | | | |
| Review: 7 password managers for Windows, Mac OS X, iOS, and Android | 10 funny (?) April Fools' pranks - Web style
| | Network World Compliance | Forward this to a Friend >>> |  | Threat of a bullet in the face keeping cybercrooks cautious Scott Borg, director of a cybersecurity research institute, kicked off the SecureWorld Expo Boston with an uplifting talk about the end of the cybersecurity world as we know it. Sure, more sophisticated threats are on the way, but those in cybersecurity also have new opportunities to defend threats and even enable economic growth. Read More WHITE PAPER: IBM
Get more out of cloud with a structured workload analysis Adopting cloud technology is a reasonably easy decision. Figuring out when and how to get the most value from cloud computing is the next—often more challenging—step. Read this white paper to learn how a robust analysis of your workloads can help identify candidates for your target cloud environments. Read Now WHITE PAPER: NetIQ
Simplify Compliance and Security This introduction to NetIQ Sentinel Log Manager provides insight into a flexible and cost-efficient software appliance that lights a clear path to complete, real-time, identity-aware security information and event management. Learn More! Review: 7 password managers for Windows, Mac OS X, iOS, and Android 1Password and KeePass lead the field in features, flexibility, browser integration, and ease-of-use Read More 10 funny (?) April Fools' pranks - Web style Our roundup of some of 2011's Internet-based April Fools' pranks should get you in the mood for this year's inevitable crop. Get ready to wince. Read More Operation Global Blackout: Real danger or irrelevant? Anonymous announced March 31 as the date of the attack, along with the method they intend to use -- disabling the Domain Name Service through DDoS attacks. Read More WHITE PAPER: Oracle
Oracle Solaris on the Oracle Exalogic Elastic Cloud This paper provides a high level overview of the Oracle Exalogic Elastic Cloud and then describes the value that Oracle Solaris brings to the Oracle Exalogic offering. Learn More! Ukraine shuts down forum for malware writers Ukrainian authorities have shut down a long-running forum that was used to trade tips on writing malicious software, a sign the country's law enforcement may be watching hackers more closely. Read More Microsoft bot takedowns help, but are no cure Takedowns of Zeus botnet command and control servers like the one executed last week by Microsoft and others do reduce the criminal activity they spawn - for a while - but attackers learn from the experience and come back with more sophisticated techniques, a security expert says. Read More Do-it-yourself plan to take down Sality botnet outlined on public mailing list A method that anyone can use to hijack a massive multipurpose botnet called Sality was described in detail on a public mailing list on Tuesday. Read More WHITE PAPER: Tripwire
Responding to New Threats in More Complex IT Environments As organizations today face the challenge of protecting their valuable data, they must balance that protection with giving business users and customers access to the data. Learn More! Fake 'The Roar of the Pharaoh' Android app latest Trojan scam It may look like an app for a Chinese game called "The Roar of the Pharaoh," but it's actually just another fake Android app that's really a malware Trojan in disguise, according to security researchers warning about it today. Read More Avira becomes latest vendor to offer Mac antivirus software German security company Avira has released free antivirus software for Apple Macs, joining a host of security software providers offering protection for OS X. Read More AVG adds 'do not track' technology to antivirus AVG has become the first antivirus vendor to offer a privacy filter to monitor and block websites and ad networks that silently collect Internet usage data from consumers, the company has announced. Read More Q&A: What the FTC recommendations mean for online privacy Future of Privacy Forum co-chair Christopher Wolf answers questions about privacy "self-regulations," centralized data broker websites and more. Read More OnStar introduces new tracking feature Onstar will roll out a new feature called Family Link that lets drivers find and track their cars. Read More |  | | | | | SLIDESHOWS 20 iPad business apps every CIO should want iPad apps for sales forces, IT departments and more. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn MOST-READ STORIES - IETF attendees reengineer their hotel's Wi-Fi network
- New Google Account Activity lets you know what Google knows about you
- Cisco acquires home network management company
- Cloud services face taxing dilemma
- More fun with naming wireless nets
- Steve Jobs wasn't a fan of the Siri name
- International security team shoots down second Hlux/Kelihos botnet
- Firewall fail: A tale both funny and sad
- Critical milestones in Cisco history
- 7 password managers for Windows, Mac OS X, iOS, and Android
| | Do You Tweet? Follow everything from NetworkWorld.com on Twitter @NetworkWorld. You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** | |
|