Issue highlights 1. 8 New Websites to Help You Find Your Next IT Employee 2. West Virginia auditor blasts Cisco, state for "oversized" router buy 3. 14 dirty IT tricks, security pros edition 4. INSIDER HP brings sizzle to Windows Storage Server 5. Forrester: 70% of "private clouds" aren't really clouds at all 6. Samsung's Knox should have Apple worried about the enterprise 7. Why Android 4.2.2 is an important update 8. Juniper Networks tried to sell enterprise assets: report 9. 10 LinkedIn Tips to Boost Your Networking Success |
WHITE PAPER: Riverbed WAN optimization has evolved into a complete system that optimizes traffic across a broad range of most popular applications while providing deep visibility into performance. Read Now |
Searching for the right person to add to your team is like looking for a needle in a haystack, so check out these sites that cater specifically to job-seeking IT professionals. READ MORE |
West Virginia wasted millions in federal grant money when it purchased 1,164 Cisco routers for $24 million in 2010, a state audit concluded. A report issued this month by the West Virginia Legislative Auditor found the state used a "legally unauthorized purchasing process" when awarding the router contract, paid for with federal stimulus funds, to Cisco. The auditor also found Cisco "showed a wanton indifference to the interests of the public" in recommending the investment in its model 3945 branch routers, the majority of which were "oversized" for the requirements of the state agencies using them, the report stated. READ MORE |
The IT security world is full of charlatans and wannabes. And all of us have been "advised" by at least one of them. READ MORE |
WHITE PAPER: Phoenix NAP A hosted private cloud can offer many advantages for organizations looking to benefit from a secure cloud model. This white paper details how the hosted private cloud can address security and compliance concerns, deliver scale-up and scale-down capabilities, reduce costs and improve IT utilization all while minimizing loss of control by IT. Learn more. |
The HP StoreEasy 5530 puts serious muscle behind Windows file serving, Hyper-V virtualization, and SQL Server workloads READ MORE |
If an enterprise data center has a highly virtualized environment, a web portal for business users to request and access virtual machines and a method for tracking how many of those resources are being used... that's not quite a private cloud. READ MORE |
Samsung's Knox, the secure enterprise enhancements to its Android devices, is not unique, but it is brilliant nevertheless. Market dominance, control over mobile hardware, and Android's open source model made this a straightforward development for Samsung that should pay dividends. It could even create a contagion of secure Android products from other Android device manufacturers. READ MORE |
WHITE PAPER: Moovweb In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now! |
Google released Android 4.2.2 for the Nexus 4, 7 and 10 this week. Some devices have already received over-the-air updates. Compared to Android 4.2.1, is there really anything important in this incremental release? With Google's annual developer's conference Google IO scheduled just 82 days from now, when Android 5.0 Key Lime Pie is anticipated to be announced, why would Google interrupt its course... READ MORE |
Juniper Networks (NYSE: JNPR) reportedly shopped around its enterprise assets to rivals last year but found no takers for properties such as the NetScreen security business it acquired in 2004. READ MORE |
If you're reviving an old job search or looking to expand your LinkedIn savvy, take a look at these features and tips to get back on the right path. READ MORE |
WHITE PAPER: HP The software industry has learned that putting fancy boxes on the network doesn't fix bad software, cloud converts must focus on the risks they bring along with the software they deploy. This paper details risks to software deployed in the cloud and what steps to take to mitigate that risk. Learn more. |
|
No comments:
Post a Comment