Thursday, May 10, 2012

VMware: Virtualize the rest of the data center

  FBI Chief dishes on technology, insider threats and cyber criminals | New York City agency pushes plan to prevent cyberattacks on elevators, boilers
 
  Network World Daily News PM

Forward this to a Friend >>>


VMware: Virtualize the rest of the data center
The server has been virtualized, now it's time for the rest of the data center - including the network - to catch up. That's the message form VMware at this year's Interop, as the company seeks to ensure it remains a major enterprise IT player while the software-defined networking trend continues to gain momentum. Read More


WHITE PAPER: Limelight

Warp Speed: The Nuts and Bolts of Web Acceleration Solutions
Enterprises are quickly realizing that they can't achieve the web performance they need by simply deploying their web server on a high-speed network. Improving page rendering speeds incrementally through content caching is no longer enough. It's time to look for dramatic performance gains by applying optimization techniques right at the browser. Learn More!

In this Issue


WHITE PAPER: Comcast

Bank Raises the Bar on Service Delivery with Comcast
Read this exclusive case study to learn how Comcast and Eastern Bank teamed to maintain a secure, reliable network infrastructure for transferring and protecting an enormous amount of data, including customers' bank account and credit card information, financial transactions, mortgage payments and payroll processing for their businesses. Learn More

FBI Chief dishes on technology, insider threats and cyber criminals
Technology has allowed the FBI to better fight all manner of crime but it has also enabled cybercriminals and others to rapidly morph and change tactics that can be difficult to keep up with. Read More

New York City agency pushes plan to prevent cyberattacks on elevators, boilers
Imagine what would happen if an attacker broke into the network for the industrial control systems for New York City's elevators and boiler systems and decided to disrupt them, imperiling the lives of hundreds of thousands of residents relying on them. Think it could never happen? Think again. Read More

MIT business school grapples with virtualization
MIT's Sloan School of Management has embraced virtualized desktops as a way to meet user needs and streamline operations, but the IT staff accepts that finding just the right mix of hardware and software is an ongoing challenge. Read More

HP has all the ingredients for software defined networking, almost
HP says it has all of the necessary orchestration tools for its software defined networking strategy - the big question is, will it build its own controller? Read More

Ultimate Man vs. Computer: Garry Kasparov, Deep Blue and the Internet
It has been 16 years this year since the first traditional chess match between world champion Garry Kasparov and IBM's Deep Blue supercomputer. In the first challenge, Deep Blue won one game, tied two and lost three. In the rematch the next year, Deep Blue defeated Kasparov in a six-game match -- the first time a reigning world champion lost a match to a computer opponent in tournament play. Kasparov hasn't just battled IBM, he challenged other supercomputers and in a highly successful, hotly contested Internet-based contest. Here we look back at the ultimate in Kasparov vs. machine battles Read More


WHITE PAPER: Silver Peak Systems, Inc.

Understanding WAN Challenges
What is the secret sauce of WAN Optimization (WAN Op)? First time users are always amazed at the performance results. Long time users know they risk the wrath of their colleagues if they take it out. Read now.

Five ways to improve data center power efficiency you might not have thought of
While few doubt the importance of maximizing the energy efficiency of their corporate data centers, executive vice president of data center technology for Las Vegas-based Switch, Mark Thiele's talk at Interop this week showcased just how much companies might still be missing. Read More

CTIA 2012: A non-stop spectrum beg-a-thon
No one will ever say that America's wireless carriers are too proud to beg. Read More

BYOD Stirs Up Legal Problems
Does BYOD put your company in murky legal water? You bet. Employees need protections, too. Read More

Top 20 Mobile Web Sites and Services
Apps, schmaps. Who needs to download anything when these mobile sites and services offer fast information and entertainment right in your mobile browser? Read More

Mozilla hits Microsoft with complaint about Windows RT browser choices
Mozilla complained Wednesday that Microsoft prohibits running any browser except Internet Explorer (IE) on Windows RT, hampering choices for users. Google said on Thursday it shares the concerns. Read More


WHITE PAPER: Quest Software

Exchange 2010 and Your Audit Strategy
In this Quest Software white paper, discover how to easily understand and control who accesses your company's sensitive data. Learn to implement a strong Exchange 2010 audit strategy, and read about the options that give you the power to safeguard your company's vital information. Read it today. Read Now!

CSOs warned of serious cyber-espionage attack
A cybersecurity consulting firm has documented the existence of a China-based espionage operation that has infiltrated the computer systems of at least 22 organizations in the government and private sectors in the U.S., Europe and Asia. Read More

All Things Interop Part 1
I'm here in Las Vegas wrapping up Interop 2012. I now understand why Hunter S. Thompson binged on alcohol and narcotics when visiting this town -- you need these substances to create the illusion that this town is the least bit palatable. Aside from the Sin City aspect, Interop was eventful and the industry seems to be in good shape. A few thoughts: Read More

APT attackers are increasingly using booby-trapped RTF documents, experts say
Booby-trapped RTF documents are one of the most common types of malicious Microsoft Office files that are used to infect computers with advanced persistent threats (APTs), according to security researchers from Trend Micro. Read More

U.S.-Israel project with Motorola leads to security-hardened industrial control system
The security associated with industrial control systems (ICS) is facing heavy criticism this week at the ICS Joint Working Group 2012 Spring Conference, sponsored by the U.S. Department of Homeland Security (DHS). DHS is concerned cyberattacks could disrupt America's energy, water and manufacturing facilities. But DHS is also taking concrete steps to improve ICS through a joint effort that includes Motorola Solutions, DHS and Israel's National Information Security Authority -- the Israeli government agency tasked with protecting its critical infrastructure. Together, under what's called the "Secure Controller Joint Project," it has led to Motorola coming up with the security-hardened ACE-3600, which was unveiled today at the conference. Read More

All hail: Inside the museum of nonsense
Some call it the museum on failed inventions and others might just call it the stupidity museum, either way it is officially known as the Museum of Nonsense and it opened in Austria this recently. It is decidedly low-tech though it does contain some high-tech ideas like a truly interesting way to anonimize identity (a piece of black card on a stick so people can't see your eyes) and a device that promises to cut down on those huge cell-phone bills (think tin cans and a string). Failed Austrian inventor Fritz Gall got an Austrian government grant of about $40,000 to set up the museum. Anyway if you can't get to Austria, here's a look at some Read More

 
 
 

SLIDESHOWS

Who are tech's highest paid CEOs?
Oracle's Larry Ellison finally ousted from the top spot on our list of highest paid tech execs.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. FBI issues warning on hotel Internet connections
  2. Yahoo CEO apologizes for tumult
  3. CTIA: At a show full of pom-pom waving, Sprint's Hesse sounds a warning
  4. Sprint launches 'Tri-Fi' 4G mobile hotspot
  5. iOS vs. Android in the enterprise
  6. Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial
  7. Who are tech's highest paid CEOs?
  8. 10 must-have gadgets for the traveling executive
  9. AT&T sees an end to Wi-Fi-only tablets
  10. IT toolbox for the iPad
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment