Thursday, August 02, 2012

Rackspace, HP go all in with OpenStack

  Judge sides with Hewlett-Packard, rules that Oracle must continue porting software to Itanium | Setting IT User Policies That Work
 
  Network World Network Architecture

Forward this to a Friend >>>


Rackspace, HP go all in with OpenStack
Rackspace and HP have each brought major portions of their cloud offerings based on the OpenStack code out of beta and into general availability today. Read More


WHITE PAPER: Citrix Systems

Join the Scale Revolution in Cloud Networking
Transform your enterprise data centers into a highly scalable enterprise clouds. Learn how to scale your cloud network for more elastic performance, seamless expansion and simple consolidation. Download whitepaper and enable multi-dimensional scalability for your enterprise cloud. Learn More

WHITE PAPER: Shoretel

Sophisticated Simplicity
The key is to build simplicity and ease of use into these solutions from Day 1. This white paper will demonstrate a clear path to UC simplicity, and to overall success of UC deployments. Learn more.

Judge sides with Hewlett-Packard, rules that Oracle must continue porting software to Itanium
A California court on Wednesday ordered Oracle to continue porting its software to the Intel Itanium chips used by Hewlett-Packard in a number of its servers. Read More

Setting IT User Policies That Work
The wave of new age technologies that are invading the enterprise hasspurred the debate on who sets IT user policy and how organizations cancontrol it. Richard H. Thaler, a Professor of Behavioral Science and Economics, in his paper- "Test, Adapt, Learn: Developing Public Policy with Randomised Controlled Trials" cites two principles that help policymakers create good policies that work for normal people: Read More

New Requirements for Security Monitoring
Today's security threats are difficult to defend against. On the one hand, the volume of malware variants has gone through the roof over the past few years. On the other, targeted attacks have become more stealthy and damaging. How can CISOs possibly combat this cybersecurity double-edged sword? With continuous monitoring of everything -- IT assets, configurations, network traffic, application... Read More


WHITE PAPER: Cisco

Cisco Bring Your Own Device
This paper explores the challenges mobile devices create for IT, offers key considerations before adopting a BYOD strategy and highlights a comprehensive architecture from Cisco that enables freedom of choice for users while affording IT security and control. Learn more.

13 awesome and scary things in near Earth space
There were a few interesting news items regarding the space around Earth this week. First NASA published a depiction of how the asteroids and comets that travel near the Earth. Second, the space agency issued another depiction of three of the largest contributors to space debris and how it orbits the planet. It makes you wonder why more things don't smash into each other more often in space. Take a look at those news items and some other amazing things that have or will happen in the space around Earth. Read More

Outsourcers apparently don't miss a beat in face of massive India power outage
The massive power outages across most of northern India have not affected the software development, back office operations and services work that emanates from the country. Read More

Following Xsigo acquisition, Oracle becomes the Apple of enterprise IT
This morning Oracle announced the acquisition of Xsigo Systems and there has been a frenzy of media coverage around it, primarily because it follows VMware's acquisition of Nicira, creating speculation of future acquisitions and many implications to the future of IT. However, some of the positioning of this acquisition was just flat out wrong. Read More


WHITE PAPER: HP

Bring Your Own Mobile Devices to School
In today's educational environments, more and more students, guests, and faculty are bringing in their own Wi-Fi devices into the school's network. This paper discusses the challenges and solutions IT administrators are facing and how to address the security and management of the multiple devices being introduced into the wireless/wired network. Learn more.

Can Big Data Help Universities Tackle Security, BYOD?
Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data analytics technologies to mine the data in their logs and improve their security footing. Read More

New data center design boasts 'world's most efficient cooling system'
A new kind of data center claiming to employ "the world's most efficient cooling system" turns the traditionally unbearable "hot aisle" between server racks into a rather pleasant air-conditioned hallway, all the while using significantly less energy. Read More

Juniper: We have 200 QFabric data center switch customers now
Juniper says it now has 200 customers for its QFabric data center switches, having gained 50 since the first quarter. Read More

 
 
 

SLIDESHOWS

12 new network features in Windows 8
There are a bunch of new and impressive administrative features designed to increase network support, reliability, performance, and security.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Microsoft kissing Hotmail goodbye
  2. IBM attempts to redefine the IPS
  3. New data center design boasts 'world's most efficient cooling system'
  4. Following Xsigo acquisition, Oracle becomes the Apple of enterprise IT
  5. Outsourcers apparently don't miss a beat in face of massive India power outage
  6. Leaked Windows Phone 8 SDK brings app surprises
  7. In face of Flame malware, Microsoft will revamp Windows encryption keys
  8. Netflix uncages Chaos Monkey disaster testing system
  9. Meet the new email boss Outlook.com, not the same as the old boss Hotmail
  10. iPhone 5 unveiling set for Sept. 12, rumors claim
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_architecture_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment