Friday, March 30, 2012

Virtualization, Unified Communications Meet, At Last

If you have trouble viewing this email, read the online version.

TechWeb Networking News Update -- Issue Highlights:
TOP STORY: Virtualization, Unified Communications Meet, At Last
ALSO SEE: Computing Cartels Shake Up IT Purchasing
ANALYTIC REPORT: Fundamentals: 10 Steps to Effective Data Classification
WHITE PAPER: Extending the Value of Legacy Applications Through Application Transformation
MOST POPULAR: 10 CIOs: Career Decisions I'd Do Over
BLOG: Seagate's HAMR Time: Can't Touch This...Yet!
WEBCAST: How Can You Be Certain Your Environment is Still Locked Down?
RESOURCES: Take Our Public Cloud Survey

TechWeb
NETWORKING NEWS UPDATE 
  Friday, March 30, 2012
REPORTS & WHITEPAPERS   |     MOST POPULAR   |     BLOG   |     WEBCASTS   |     RESOURCES  
TOP STORY
Virtualization, Unified Communications Meet, At Last
Unified communications servers and virtualization do mix, more enterprises find. But desktop virtualization and UC remains tricky.

ALSO SEE
Computing Cartels Shake Up IT Purchasing
Massive firms with global reach will emerge during the next 10 years, offering optimized stacks of computing capability on a pay-per-use basis.

The Upside-Down SAN
Vendors are pushing local flash storage for your most active data, which may turn your storage area network to a digital dumping ground.

HP Displaces Cisco, EMC In Sabre Data Centers
$800 million deal with travel industry leader replaces rivals' aging equipment with HP's latest virtualized, converged systems.

Avaya Buys Radvision, Broadens Video Reach
Radvision will help Avaya provide low-bandwidth, high-definition video to a broader variety of devices.

Cloud ROI: The Missing Link
What return are you getting on your investments in public cloud services? New research reveals you probably don't know, and that's a problem.


 

REPORTS & WHITEPAPERS:
FEATURED REPORTS
Fundamentals: 10 Steps to Effective Data Classification
It sounds simple enough: Define categories to protect information according to how devastating its loss would be to the organization. But unfortunately, complexity, cultural barriers and a lack of business user motivation can derail even the best-laid plans. We reveal how to keep classification initiatives on track.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

spacer spacer spacer
FEATURED WHITEPAPERS
Extending the Value of Legacy Applications Through Application Transformation
Gain insight into why automated application migration is the least risky, least expensive and fastest choice for achieving tangible results of all available legacy application modernization alternatives.
 

TODAY'S MOST POPULAR STORIES @ TECHWEB.COM:
10 CIOs: Career Decisions I'd Do Over
Listen and learn as leading CIOs share the decisions they'd do over, from misusing outsourcing to adopting tech too early.

How To Secure Your Flat Network
You don't have to trade control for a faster network architecture.

How To Sync Evernote With Google+
Evernote and Google+ are a good team. Here's how to make them work together.

 

FROM THE NETWORK COMPUTING BLOG:
Featured Blogger Seagate's HAMR Time: Can't Touch This...Yet!
By Steve Wexler
Seagate is inching closer to the next evolution of disk technology – heat-assisted magnetic recording (HAMR) – with the demonstration of 1 terabit (1 trillion bits) per square inch and the intention of releasing 3.5-inch hard drives with up to 60 terabytes capacity as early as 2015. That's double the capacity of the current drive technology, Perpendicular Magnetic Recording (PMR), which replaced longitudinal recording, starting in 2006.

Boundary Hosts Network Monitoring Service
By Frank J. Ohlhorst
Real-time network monitoring is quickly becoming a must have capability for network managers supporting transaction intensive networks, especially when cloud based applications are involved.

Data Classification Tips & Technologies Part 2
By Esther Shein
Even though the process of classifying data is, in theory, well understood and considered a tenet of good business and security practices, industry observers say companies are not doing it across the board—or doing it well.

 

WEBCASTS:

How Can You Be Certain Your Environment is Still Locked Down?
IT security and operations managers will find that this webinar presents a set of best practice methods which allows them to quickly and easily manage and mitigate privilege creep. It happens Tuesday, April 3, 2012.
More Information & Registration
 

RESOURCES AND EVENTS:
Take Our Public Cloud Survey
InformationWeek is conducting a survey on the state of private cloud use in the enterprise. Upon completion of our survey, you will be eligible to enter a drawing to receive an 32-GB Apple iPod Touch. Additionally, you will receive a discount code good for 25% off Flex and Conference passes to Interop Las Vegas 2012, to be held at the Mandalay Bay, May 6-10.
It happens March 25-29 in Orlando, Fla.


This e-mail was sent to networking.world@gmail.com

NETWORKING NEWS UPDATE
-- Published By TechWeb
600 Community Drive
Manhasset, NY 11030


To subscribe to our other newsletters, change your e-mail
address or format (Text/HTML) or to unsubscribe, click here



Keep Getting This Newsletter
Don't let future editions of Techweb's Networking News Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments: