Friday, August 31, 2012

10 Big Data Migration Mistakes

If you have trouble viewing this email, read the online version.

TechWeb
NETWORKING UPDATE 
Join the community
Facebook Twitter LinkedIn
  Friday, August 31, 2012
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
10 Big Data Migration Mistakes
By Jeff Bertolucci
Beware these pitfalls and risks when transferring your data to new computer systems or storage formats.

MUST READ
Dell Gains In Lackluster Server Market
While global server revenue fell in the second quarter, Dell grabbed its largest market share to date. HP's share stays flat as it fights roadmap and identity problems.

How Wireless Operators Get Hurricane-Ready
Verizon Wireless talks about how its COLT (cell on light truck) mobile base station trucks can be deployed at hurricane time.

Saudi Aramco Restores Network After Shamoon Malware Attack
Hacktivist-launched virus takes out 75% of state-owned oil company's workstations, signals the growing power of attackers with social or political agendas.

AT&T: No iPhone FaceTime Without Paying Extra
Legal experts say AT&T violates FCC rules with plan to restrict FaceTime use on its cellular network to premium-plan customers.

Big Data Fuels 2012 Olympics Stats Frenzy
Fans, not athletes, are setting the most historically significant numbers during the 2012 Olympics. Take a look at the stats being analyzed, from basketball to social media.

ALSO IN THIS EDITION
AT&T: No iPhone FaceTime Without Paying Extra
Big Data Fuels 2012 Olympics Stats Frenzy
IT Pro Impact: VDI in the Cloud
File Storage Costs Less in the Cloud than In-House
10 Best Apps For Samsung Galaxy Notes
The Business Value of Data Quality
There's Still Time To Attend Cloud Connect Chicago

Download our iPad App

JOIN THE CONVERSATION
Posted By MyW0r1d:
"So what does this socialising add? It imposes a check which oftentimes was overlooked and led to the tail wagging the dog, ensuring that IT is providing a value added product or service that operations wants and will use."
In reply to: 'The Problem With Social Collaboration On IT Projects'
View Entire Response | Post Your Own Reply
  Digital Issue  
DOWNLOAD INFORMATIONWEEK SMB's LATEST DIGITAL ISSUE
Even small IT shops can now afford thin provisioning, performance acceleration, replication, and other features to boost utilization and improve disaster recovery.

Also in the new, all-digital special issue of InformationWeek SMB: Don't be fooled by the Oracle's recent Xsigo buy.


DOWNLOAD NOW FREE (Registration Required)

 

 

REPORTS & WHITEPAPERS:
FEATURED REPORT
IT Pro Impact: VDI in the Cloud
The benefits of desktop virtualization have always been something of a mirage: They tend to look better at a distance than up close. But the cloud is making virtual desktop deployments much more affordable, just as mobile devices heighten the need to deliver Windows apps to a new generation of post-PC clients.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
File Storage Costs Less in the Cloud than In-House
You can fantasize about tearing down your data center and riding into the sunset on a cloud, but in reality that cloud is just another way to deliver IT services and it has limitations, both operational and financial. This document breaks down the cost differences by modeling a common workload, built and deployed traditionally versus consumed through the public cloud.
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

10 Best Apps For Samsung Galaxy Notes
Check out these 10 great apps that take advantage of the Samsung phablet's S Pen stylus.

Military Transformers: 20 Innovative Defense Technologies
Department of Defense technologies under development, from brainy microchips to battlefield transformer vehicles, promise to make the U.S. military more nimble. Here's a visual tour of 20 breakthrough ideas.

Air Force Seeks Offensive Cyber Weapons
Agency solicits proposals on capabilities ranging from attack to mapping networks.

Apple iPhone 5 Vs. Samsung Galaxy S III: What We Know
How will Apple's new iPhone stack up to Samsung's premier smartphone? Here's a look at some key considerations.

Samsung Galaxy Note 2, Windows 8 Smartphones: First Impressions
Samsung's new Android phablet and Windows Phone 8 smartphones impress, but Nokia is gunning for Samsung.
 

WEBCASTS:

The Business Value of Data Quality
Join Jon Erickson of Forrester Consulting as he uses real world examples to lay out in pragmatic, business terms the value of automated data quality systems. It happens Thursday, September 6, 2012.
More Information & Registration

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
There's Still Time To Attend Cloud Connect Chicago
Cloud Connect is expanding to the Windy City. Join 1,000+ IT professionals at the event where you will learn how to leverage new cloud technology solutions to increase productivity and improve your business agility. Use Priority Code UFPQCH25 for a Free Expo Pass. Join us in Chicago, Sept. 10-13.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to networking.world@gmail.com

InformationWeek Networking Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Networking Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

Toyota accuses fired worker of major security breach

Tech CEOs' first jobs: Licorice maker, housekeeper, scuba diver and more | vCloud vs. vSphere: VMware explains security changes

Network World Compliance

Forward this to a Friend >>>


Toyota accuses fired worker of major security breach
Car maker Toyota has filed a lawsuit against a worker it claims attacked the company's US parts supply website as retribution for being fired. Read More


WHITE PAPER: IBM

IBM InfoSphere: Solutions for Insurance
By creating a single, 360-degree view of the customer with IBM InfoSphere Master Data Management, insurance companies can gain a deeper understanding of customer needs, develop targeted marketing campaigns, adapt to consumer trends and enhance the efficiency of operations. Learn More.

WHITE PAPER: HP & Intel

Gartner Magic Quadrant for Blade Servers
The market for blade servers is becoming ever more complex and diverse due to the convergence of related modular form factors, a fast-growing interest in fabric-based infrastructure and the influence of cloud computing on buying behavior. Download the Gartber Magic Quadrant to see how the vendors in blade servers stack up. Read Now!

Tech CEOs' first jobs: Licorice maker, housekeeper, scuba diver and more
Before their corporate jobs, many tech CEOs got their hands dirty, scrubbing oils stains off asphalt, cleaning bathrooms, and shoveling monkey cages. Here are their stories. Read More

vCloud vs. vSphere: VMware explains security changes
In unveiling its VCloud suite at its annual conference this week, VMware took pains to explain how the security model for it differs significantly from that of its existing vSphere cloud computing virtualization operating system both in terms of functionality and naming conventions. Read More

INSIDER
Why passwords are failing us -- still!
Three decades into the digital revolution, passwords are still complicated, ineffective and a drain on IT's resources. What gives? Insider (registration required) Read More

Oft-cited cybercrime cost estimates hosed down
There is general agreement that the worldwide cost of cybercrime is in the hundreds of billions. But just how many hundreds of billions is a matter of debate, following a ProPublica report that questioned the most widely quoted estimates by two major security vendors. Read More


WHITE PAPER: Dell

Management Madness: How to Manage Mobile Devices
There are six major mobile operating systems in use now and each one offers its own set of security and management challenges. The resources in this Mobility KnowledgeVault will help you keep these devices secure on the corporate network with expert tips on management tools, endpoint security software, increasing application support and more. Learn More

Leaky web sites provide trail of clues about corporate executives
You can read about Zappos' CEO Tony Hsieh on the company's Web site-- about how he sold his first company, LinkExchange to Microsoft in 1999, at the age of 24, and joined Zappos as an advisor and investor, eventually rising to the company's top post. What you might not learn is that Tony is an exercise enthusiast who gets his gear from Nikeplus.com, watches his favorite shows on the Internet streaming site Hulu, keeps up with his friends on Facebook and checks the value of his Amazon.com stock (Amazon bought Zappos in 2009) at Marketwatch.com. That lesser known information about Hsieh -- a treasure trove for hackers -- is public, all the same: leaked from e-commerce and social networking sites linked to the CEO's @zappos.com e-mail address. Read More

Products of the week 8.27.12
Our roundup of intriguing new products Read More

Cloud security company Zscaler attracts $38 million in funding
Cloud-security provider Zscaler Thursday announced it has received $38 million in venture-capital funding, naming Lightspeed Ventures as a strategic investor but not the other venture-capital partners involved in the round. Read More

Java security threats: What you need to know
First, the bad news. Once again, Mac users are at risk due to a flaw in Java, similar to the one that enabled the Flashback Trojan. Even worse, there isn't (yet) a patch to fix that vulnerability. But don't worry: This time around, there's good news for Mac users: Thanks to changes Apple has made, most of us are likely to be safe from this threat. Read More


WHITE PAPER: McAfee

Top 4 Security Surprises That Await Private Cloud Builders
This report published by Gabriel Consulting Group discusses security risks that prospective private cloud builders might be overlooking. Learn more.

Security Manager's Journal: Closing off a hole in Outlook
With Outlook Anywhere, users can download their mail to untrusted PCs and leave sensitive documents behind. Read More

IT's 9 biggest security threats
Hacking has evolved from one-person crime of opportunity to an open market of sophisticated malware backed by crime syndicates and money launders Read More

18 great IT tools for Android
These Android apps, from network sniffers to SNMP MIB browsers to SSH tools, will come in handy for network and IT pros Read More

How to handle a digital-certificate fraud incident
Are you prepared to deal with a security incident involving digital-certificate fraud? You should be, because if it happens, it might well involve the need to replace thousands of digital certificates used for security by your organization in applications or for other purposes. Here's how to prepare for bad news and be ready to respond when criminals undermine the complex public-key infrastructure (PKI) ecosystem. Read More

Phishing attack targets users with fake BlackBerry ID email
Security vendors say they've spotted phishing attacks trying to fool BlackBerry users into opening email on their Windows machines that launches malware for taking over the system. Read More



SLIDESHOWS

Hot Products at VMworld 2012
Click through all the products being released at VMworld in San Francisco this week.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Windows 8 is awesome ...
  2. 18 great IT tools for Android
  3. James Bond chooses Sony Xperia T over iPhone 5
  4. Second Java zero-day found: Time to disable it, say experts
  5. Tech CEOs' first jobs
  6. 5 reasons Android users will switch to the iPhone 5
  7. HP announces Envy X2 tablet-laptop hybrid device with Windows 8
  8. VMware joining OpenStack delayed, for now
  9. Six ways to protect against the new actively exploited Java vulnerability
  10. Juniper dumps BitGravity CDN tech

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


Hottest Android news and rumors for the week ending Aug. 31

Tech CEOs' first jobs: Licorice maker, housekeeper, scuba diver and more | The Security Skills Shortage Is Worse Than You Think

Network World Daily News AM

Forward this to a Friend >>>


Hottest Android news and rumors for the week ending Aug. 31
It's fair to say that the verdict in the landmark Samsung vs. Apple case could have been better for the Android manufacturer, as the jury dealt it a billion-dollar blow. Many pundits are already saying that the case could have broad ramifications for the rest of the Android world, scaring off hardware makers that couldn't absorb such a whopping judgment as easily as Samsung and forcing product redesigns that avoid potentially damaging legal trouble. Read More


RESOURCE COMPLIMENTS OF: Sprint

Streamline your business with UC&C from Sprint
If you're still weighed down by an outdated communications infrastructure, you're holding your business back. Our comprehensive cloud-based unified communications & collaboration (UC&C) solution offers a risk-mitigating migration strategy, providing scalability, network & cost efficiency, greater reliability, & enhanced mobility for all employees. GET THE DETAILS

WHITE PAPER: Cisco

Cisco Bring Your Own Device
This paper explores the challenges mobile devices create for IT, offers key considerations before adopting a BYOD strategy and highlights a comprehensive architecture from Cisco that enables freedom of choice for users while affording IT security and control. Learn more.

Tech CEOs' first jobs: Licorice maker, housekeeper, scuba diver and more
Before their corporate jobs, many tech CEOs got their hands dirty, scrubbing oils stains off asphalt, cleaning bathrooms, and shoveling monkey cages. Here are their stories. Read More

The Security Skills Shortage Is Worse Than You Think
I've written a lot about the security skills shortage but it is worth reviewing a bit of data here for context. According to ESG Research, 55% of enterprise organizations (i.e. those with more than 1,000 employees) plan to hire additional security professionals in 2012 but they are extremely hard to find. In fact, 83% of enterprises claim that it is "extremely difficult" or "somewhat difficult"... Read More

Java security threats: What you need to know
First, the bad news. Once again, Mac users are at risk due to a flaw in Java, similar to the one that enabled the Flashback Trojan. Even worse, there isn't (yet) a patch to fix that vulnerability. But don't worry: This time around, there's good news for Mac users: Thanks to changes Apple has made, most of us are likely to be safe from this threat. Read More


WHITE PAPER: Shoretel

Sophisticated Simplicity
The key is to build simplicity and ease of use into these solutions from Day 1. This white paper will demonstrate a clear path to UC simplicity, and to overall success of UC deployments. Learn more.

INSIDER
How IT Outsourcing May Unearth the Mine of the Future
A team of IT service providers helped mining company Rio Tinto push new ideas into adoption and improve the mine of the future. Read More

Will cyberattacks define the future of war?
Is the future of warfare going to be fought by soldiers using bullets, bombs and missiles -- or by computer geeks hunched over a laptop? Both, say experts in cyber conflict. Read More

Leaky web sites provide trail of clues about corporate executives
You can read about Zappos' CEO Tony Hsieh on the company's Web site-- about how he sold his first company, LinkExchange to Microsoft in 1999, at the age of 24, and joined Zappos as an advisor and investor, eventually rising to the company's top post. What you might not learn is that Tony is an exercise enthusiast who gets his gear from Nikeplus.com, watches his favorite shows on the Internet streaming site Hulu, keeps up with his friends on Facebook and checks the value of his Amazon.com stock (Amazon bought Zappos in 2009) at Marketwatch.com. That lesser known information about Hsieh -- a treasure trove for hackers -- is public, all the same: leaked from e-commerce and social networking sites linked to the CEO's @zappos.com e-mail address. Read More


WHITE PAPER: ADTRAN

Traditional WLAN vs. ADTRAN's Virtual Wireless LAN (vWLAN)
The substantial differences between a traditional hardware controller-based wireless LAN and ADTRAN's virtual wireless LAN (hypervisor-based) are detailed in ADTRAN's WLAN vs. vWLAN comparison chart. Learn more.

Dell announces XPS 10 tablet with ARM processor, Windows RT
Dell is back in the tablet market after laying low for a few months, announcing the XPS 10 tablet, which has an ARM processor and Microsoft's upcoming Windows RT OS. Read More

Google should speed up Apps' enterprise social networking development
Google may be moving too slowly in building up Google Apps' enterprise social networking (ESN) features, at a time when this type of software has become a key component in workplace collaboration suites. Read More

The twisted tale of Tizen mobile OS
Read More

VMworld takes San Francisco with more than 21,000 attendees
VMware says the show has grown tremendously since its first show in 2004, with about 700 attendees. 2012 brought more than 21,000. VMware made a few announcements during the show but is most proud of it's VCloud Suite. Read More



SLIDESHOWS

Hot Products at VMworld 2012
Click through all the products being released at VMworld in San Francisco this week.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Windows 8 is awesome ...
  2. 18 great IT tools for Android
  3. James Bond chooses Sony Xperia T over iPhone 5
  4. Second Java zero-day found: Time to disable it, say experts
  5. Tech CEOs' first jobs
  6. 5 reasons Android users will switch to the iPhone 5
  7. HP announces Envy X2 tablet-laptop hybrid device with Windows 8
  8. VMware joining OpenStack delayed, for now
  9. Six ways to protect against the new actively exploited Java vulnerability
  10. Juniper dumps BitGravity CDN tech

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **