Tuesday, August 26, 2014

Data centers are the new polluters

  REVIEW: RHEL 7 anchors enterprise-focused ecosystem | Tech CEOs' first jobs: Licorice maker, housekeeper, scuba diver and more

 
  Network World Data Center  

Data centers are the new polluters
U.S. data centers are using more electricity than they need. It takes 34 power plants, each capable of generating 500 megawatts (MW) of electricity, to power all the data centers in operation today. By 2020, the nation will need another 17 similarly sized power plants to meet projected data center energy demands as economic activity becomes increasingly digital. Read More
 


WEBCAST: Cisco Systems

Evaluating Leading Breach Detection Systems
Today's constantly evolving advanced malware and Advanced Persistent Threats (APTs) can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to confront these advanced threats before, during and after attacks. Learn more >>

WEBCAST: BMC Software

Increase Your Data Center IQ
Discover how to improve network efficiency, lower IT costs and more proactively manage your physical, virtual and cloud environments. Join BMC Software and partners, Entuity and Sentry Software, to learn how to build data center success with a comprehensive performance monitoring solution. Learn More

 

INSIDER
REVIEW: RHEL 7 anchors enterprise-focused ecosystem
Red Hat Enterprise Linux 7 is more proof that operating systems aren't dead, they're becoming vessels for containerized applications. RHEL 7 performed well in our testing, but it's worth noting that this no longer just a simple OS – it's an increasingly abstracted component in the larger Red Hat ecosystem. Read More

 

Tech CEOs' first jobs: Licorice maker, housekeeper, scuba diver and more
Before their corporate jobs, many tech CEOs got their hands dirty, scrubbing oils stains off asphalt, cleaning bathrooms, and shoveling monkey cages. Here are their stories. Read More
 


WEBCAST: Venafi

Responding to New SSL Cybersecurity Threat
The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. Learn More

VMware prepares OpenStack for enterprise use
  VMware wants to bring enterprise-class reliability to OpenStack by releasing a distribution of cloud hosting software that runs on top of the virtualization stack. Read More
 

Netcore, Netis routers have hardcoded password, Trend Micro says
A line of routers from a China-based manufacturer has a serious flaw that could allow a hacker to monitor someone's Internet traffic, according to research from Trend Micro. Read More
 


WHITE PAPER: Spanning

Warning: Cloud Data at Risk
Experts agree that relying on SaaS vendors to backup and restore your data is dangerous. Yet that's exactly what huge portions of the business world are doing, according to the results of an exclusive new survey from IDG Research. Learn More

10 things you need to know about Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 7 is more proof that operating systems aren't dead, they're becoming vessels for containerized applications. Read More
 

Tokenization is the way to prevent e-commerce security breaches
Tokenization is the one-way process of converting a credit card number into a unique value that by itself holds no value. Tokenization can be used to prevent actual credit card data from ever touching a retailer's server, where the majority of data breaches occur. Read More
 

VMware's OpenStack strategy: Keep your friends close and your enemies closer
Two years ago the news that VMware would be embracing OpenStack as a major headlining item on the first day of its major US conference would have been borderline unimaginable. Read More
 

 

SLIDESHOWS

12 oddball odes to open-source

Hey, I just met you / and this is crazy / but here's my pub key / so msg me maybe.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Is massive DNS hack responsible for Charter Internet outage?

2. Is Wi-Fi killing us...slowly?

3. Internet of Overwhelming Things

4. Ten tech products that died on arrival

5. Why TCP/IP is on the way out

6. Hottest IT Certification

7. Apple iWatch release may be pushed back to 2015

8. The top 14 hidden features in Windows, iOS, and Android

9. Top 5 things to watch for at VMWorld 2014

10. Hacking traffic lights with a laptop is easy

JOIN THE IDG CONTRIBUTOR NETWORK

The IDG Contributor Network is a collection of blogs written by YOU -- leading IT practitioners -- about the technology, business opportunities and challenges you face everyday. We invite you to become a contributor or participate by joining the conversations your peers spark.

Apply now to become a member


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_data_center_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment