Tuesday, March 06, 2012

What's your favorite enterprise IT product?

Siemens launches new VoIP/UC platform, says it has earned another look | Mobile Users Bill of Rights Proposed

Network World Network Architecture

Forward this to a Friend >>>


What's your favorite enterprise IT product?
Do you have a favorite enterprise IT product you can't live without? Tell us about it and we'll share your raves with our readers. Please send your submissions to Ann Bednarz at Network World (abednarz@nww.com) by Wednesday, March 21. Please note: Submissions must be received directly from IT professionals, not through a third party. Items to address: Read More


RESOURCE COMPLIMENTS OF: CloudPassage

CloudPassage
If you thought that public cloud providers protect your cloud servers from harmful intrusions and other security threats - think again. The burden of securing your cloud servers typically rests with you. Register today to secure 25 cloud servers for free with the award-winning CloudPassage Halo.

WEBCAST: NetIQ

Disaster Recovery Planning and the Cloud
Find out how virtualization is the stepping stone to the cloud and how to leverage virtualization technologies today to reduce the cost and improve the performance of your disaster recovery plan. Learn More!

Siemens launches new VoIP/UC platform, says it has earned another look
Siemens Enterprise Communications, which has been rebuilding itself here in the U.S. for the past several years, will punctuate the idea that it deserves another look with the announcement Monday of Version 7.0 of its OpenScape UC suite that enables the VoIP platform to support up to 500,000 users. Read More

Mobile Users Bill of Rights Proposed
A call for a privacy Bill of Rights for wireless consumers is being sounded by the Electronic Frontier Foundation (EFF). Read More

Warning: you may be an e-hoarder
Hoarding shows are popular these days. Hoarders, Hoarding: Buried Alive, Confessions: Animal Hoarding and on and on. The images are consistent: Boxes stacked to the ceilings. Piles of newspapers dating back to the Nixon era. Feral cats skittering behind furniture. Empty cans of cat food, beans and soup scattered everywhere. Read More


WHITE PAPER: NetIQ

First Industy-Wide BSM Maturity Benchmark Study
This first-of-its-kind benchmark study reporting the IT and Business maturity illustrating the business service management imperative today. The survey offers insight into the current and future state of the Business Service Management imperative across global organizations. Learn More

IT's 6-step guide to adopting consumerization
Most businesses are accepting, even embracing, consumer technology. What do they know that you don't? Read More

The story of the Picasso and a 1.5 ton robot
Spanish telecom firm Telefonica built a robot to digitally image and look for problems with Pablo Picasso's famous 'Guernica' painting Read More

Should You Allow Inbound E-mail Over IPv6?
Federal organizations are aiming for September 2012 mandate to IPv6-enable their Internet perimeter applications. This not only includes IPv6-enabling web servers, but also IPv6-enabling e-mail servers. Therefore e-mail servers would be allowing inbound SMTP (TCP port 25) connections over IPv4 and IPv6. However, most e-mail content filtering companies only have defensive capabilities for IPv4. ... Read More


WHITE PAPER: Tripwire

Protecting Your Data in Today's Threat Landscape
Today's threats to critical systems and valuable data come from more sources than ever—a ticked off employee who seeks revenge, or activists seeking to expose sensitive data. Learn More!

Supersize me: Hadoop upgrade will handle even bigger data
Apache aims to have the upcoming 0.23 release this year be able to run on 6,000-node clusters Read More

Investment firm warns of delays, performance issues in Juniper products
Is Juniper experiencing longer product delays and performance issues than the company has disclosed? Read More

Cisco brings Hotspot 2.0 carrier-network smarts to its Wi-Fi
Cisco Systems announced its take on the reshaping of mobile networks that is emerging at this week's Mobile World Congress on Tuesday, saying it can build a Wi-Fi infrastructure spanning all the way from the access point to the core network. Read More



SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. iPad 3 pricing to remain the same as the iPad 2
  2. Warning: you may be an e-hoarder
  3. Investment firm warns of delays, performance issues in Juniper products
  4. 15 high-tech wristwatches that would make Dick Tracy jealous
  5. Anonymous supporters victims of Zeus Trojan Horse
  6. Should you allow inbound e-mail over IPv6?
  7. Giving up your iPhone
  8. Siemens launches new VoIP/UC platform
  9. How to catch an Internet cyber thief
  10. The future of end user computing

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_architecture_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment