Tuesday, December 10, 2013

Cloud pricing: It's (really) complicated

Using BYOD? Get SaaS-based mobile device security | 8 Ethernet predictions for 2014

Network World Cloud Computing

Forward this to a Friend >>>


Cloud pricing: It's (really) complicated
In theory, cloud computing offers a fairly straightforward model for consuming compute and storage resources. Customers request capacity, it is provided by a vendor and it is paid for. Customers should be able to spin up and down resources as they need to and only pay for what they use. Read More


WHITE PAPER: F5 Networks

Application Performance in a World of Cloud and Mobility
Cloud, mobility, and networking have shifted the dynamics of application performance. As a result, IT is under more pressure than ever to improve application performance. Learn how to ensure that employees and customers can access applications effectively without being forced to expend more resources on network upgrades. Read more >>

WHITE PAPER: Dell

Understanding Enterprise Cloud Governance
This whitepaper covers how to deliver the agility of cloud computing address while still maintaining operational control, through the use of cloud management software, View Now

Using BYOD? Get SaaS-based mobile device security
CISOs' number one concern about allowing BYOD is the security of enterprise data. A close second is the security of the enterprise network that can be compromised by just one malware-infected smart device. Mojave Networks addresses those concerns by offering enterprise-grade security for mobile devices from the cloud. Read More

8 Ethernet predictions for 2014
Among the many expectations for IT in 2014, Ethernet is projected to broaden its penetration in the metro area and the WAN. The ubiquitous technology will become further entrenched as a broadband access, cloud interconnect and wide area medium, further distancing itself from legacy TDM services. Read More

Why CIOs stick with cloud computing despite NSA snooping scandal
Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT executives aren't panicking -- yet. Read More


WHITE PAPER: CDW

Software Asset Management: Practices for Success
This white paper discusses best practices that can dramatically increase your success rate of a SAM deployment. Make sure and follow these steps and verify that your SAM toolkit has the necessary functionality to keep your organization steps ahead of the competition -it's a long term investment. Read Now

Cloud Security Alliance offers ultra-high cloud security plan
The Cloud Security Alliance (CSA) is putting forward an innovative encryption-based security architecture for software-defined networks and cloud environments that draws some of its inspiration from high-security networks used by the U.S. Department of Defense and intelligence agencies. Read More

HP (quietly) snubs Amazon's cloud in latest release
HP this week released the 13.5 version of its cloud platform, which is the software that serves as the basis for the company's public cloud offering. Toward the bottom of a note about new features, HP mentions something quite interesting: HP's cloud no longer inherently supports Amazon Web Service's cloud Elastic Compute Cloud (EC2). It may not sound like a big deal, but it marks a strategic shift. Read More

Should Facebook, Yahoo and Twitter really judge what's news?
Where did you first learn about Amazon's crazy plan to deliver packages via drone? "60 Minutes"? The New York Times? Increasingly, the answer is likely to be Twitter, Facebook or Yahoo, and that's just how the online giants like it. Read More


WHITE PAPER: Dell

Enterprise Governance and Automation for AWS & Hybrid Clouds
Cloud solutions like AWS allow you to increase operational agility and reduce costs. Now you need a fast and easy way to increase security, improve governance and simplify hybrid cloud management. That's where a cloud management solution comes into play. View Now

IT managers are increasingly replacing servers with SaaS
IT managers want to cut the number of servers they manage, or at least slow the growth, and they may be succeeding, according to new data. Read More

IBM lays plans to be a cloud storage broker
IBM is developing software that will allow organizations to use multiple cloud storage services interchangeably, reducing dependence on any single cloud vendor and ensuring that data remains available even during service outages. Read More

Don't say no to BYOD and personal clouds, but understand the legal risks when you say yes
While you have undoubtedly heard all the gloom and doom stories regarding individuals using personally owned devices or personally controlled cloud services like Dropbox, SkyDrive, Google Drive, Idrive, Evernote and similar services, don't forget the law of unintended consequences. Read More

IT security pros often seen as 'innovation killers,' says ADP's IT security chief
The problem with IT security professionals is they spend too much time stopping business people from trying new things, including cloud services, out of worries about risk when they should really be working directly with business managers to help them innovate by means of security. Read More


SLIDESHOWS

8 tricks to optimize Windows 8.1

Here are eight things we recommend doing to make Windows 8.1 more efficient.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 8 Ethernet predictions for 2014

2. The 21 most powerful enterprise networking companies

3. Microsoft ends Windows 7 retail sales

4. DARPA makes finding software vulnerabilities fun

5. Ubuntu 13.10: The good, the bad and the ugly

6. Cisco sees SDN, Internet of Things in its 2014 crystal ball

7. IT guy gets smacked for stealing $94,493 worth of electronic goodies

8. From Windows from Vista to 8.1, Microsoft Year-end Patch Tuesday hits 'em all

9. Google Compute Engine vs. Amazon Web Services cloud: The battle is on

10. Veeam: Backup, but for virtual machines


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cloud_computing_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: