Wednesday, May 30, 2012

Sales of unused IPv4 addresses gathering steam

10 mobile device management apps to take charge of BYOD | VMware: Make your networks 10x simpler to manage

Network World Network/Systems Management

Forward this to a Friend >>>


Sales of unused IPv4 addresses gathering steam
A growing number of U.S. carriers and enterprises are hedging their bets on IPv6 by purchasing blocks of unused IPv4 addresses through official channels or behind-the-scenes dealmaking. Read More


WHITE PAPER: Extreme Networks

Mobility in the Network: A Phased Technology Approach
The evolution of the network to provide the intelligence needed to address user, device and application mobility is underway. In this white paper, Extreme Networks® outlines the five phases required to bring mobility into the network. Learn more.

WHITE PAPER: HP

Your Network is Heading for Traffic Chaos
The increased use of virtual machine (VM) mobility and new application deployments is significantly increasing traffic levels between servers in the data center. This Gartner report provides recommendations for overcoming these challenges prevalent in most traditional data center networks. Learn more.

10 mobile device management apps to take charge of BYOD
Managing devices in a BYOD environment is no mean feat, and the right mobile device management (MDM) product can be a key component in making it work. Here are 10 leading MDM products on the market today. Read More

VMware: Make your networks 10x simpler to manage
An important message came out of EMCWorld last week that should interest anyone looking to run a major data network. Both EMC and VMWare drew attention to the importance of making our networks simpler to run and manage. If organizations are going to build truly massive networks efficiently, reducing the time it takes to deploy and manage resources is essential. Read More

Juniper packs 30 new features into Web security software
Juniper Networks this week unveiled enhancements to the Web security software it obtained via the acquisition of Mykonos Software in February. Read More


WHITE PAPER: IBM

Proven Strategies for Uncovering Cost Savings
Learn how your organization can take advantage of recent breakthroughs to lower the cost of data management. Learn More

AT&T demands we change our networks
If you recall, some time ago I had problems with my AT&T U-verse DSL service until a small village's worth of AT&T folk got involved and resolved the issues. Since then, an executive director from the "Office of the President at AT&T," who I'll call "Bob," has followed up with me once a week to make sure things are still OK. Read More

Patch management still big stumbling block in risk management, survey shows
Everyone talks about "risk and compliance" in security, but what do companies have to do to make it through audits and meet regulations related to information security? And what are the costs? Read More

10 keys for building private clouds
One of the toughest parts about implementing a cloud strategy isn't choosing the underlying technology to power the deployment; it's having the processes in place to manage an effective migration to the cloud, says Thomas Bittman, a cloud analyst for Gartner. Read More


WHITE PAPER: Dell

High-availability virtualization with Dell PowerEdge servers
Dell 3-2-1 Reference Configurations help companies simplify the design, ordering and deployment of a highly available virtualized infrastructure. This proven architecture is comprised of three servers, two switches and one storage array, plus the software you'll need to manage the environment to support over 500 users. Learn More

Dell reaches for the cloud with new prototype ARM server
Dell on Tuesday announced a prototype low-power server with ARM processors, following a growing demand by Web companies for custom-built servers that can scale performance while reducing financial overhead on data centers. Read More

Consumer Reports: Free anti-malware software for Windows, Mac is effective
In what could be regarded as a controversial test of anti-malware effectiveness, the influential Consumer Reports publication in its June issue gives its main recommendation to anti-malware freeware for protecting Windows and Mac computers. With some caveats, Consumer Reports says in its "Security Software" article it regards it as unnecessary to buy commercial anti-malware software. Read More

9 warning signs of bad IT architecture
Chances are someone at some point spent countless brain cycles planning your organization's IT architecture before handing the grand plan off to someone else to build it out, and then to someone else to maintain it as your computing environment inevitably grew. And, chances also are, somewhere along the line, best intentions faded in the face of expediency, departmental politics, and general mismanagement, eroding what was once a coherent architecture management strategy into an ongoing series of independent, case-by-base decisions about each technical component. Read More

Box to beef up IT administration features of cloud content management software
Box will start letting customers test a new set of IT administration controls for its cloud-hosted enterprise collaboration and content management software. Read More

Oracle buys social relationship management company Vitrue
Taking a step into the social media marketing industry, Oracle is purchasing Vitrue, the two companies announced. Read More



SLIDESHOWS

10 terrific LTE smartphones for $150 or less
LTE on the cheap: Offerings from Apple, Samsung, Nokia and more make cut.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. iPhone 5 rumor rollup for the week ending May 25
  2. Cisco all but kills Cius tablet computer
  3. RIM said to plan to lay off 2,000 staff
  4. Gartner: Don't trust cloud provider to protect your corporate assets
  5. Researchers identify Stuxnet-like cyberespionage malware called 'Flame'
  6. Extreme BYOD: When consumer tech goes to unexpected places
  7. Gearhead: Hardware we want to get our hands on
  8. Sales of unused IPv4 addresses gathering steam
  9. Cisco takes its lumps, keeps developing video meeting tools
  10. Patch management still big stumbling block in risk management, survey shows

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: