Thursday, August 21, 2014

VMware acquires CloudVolumes for faster virtual app delivery

The top 14 hidden features in Windows, iOS, and Android | How Michael Gregoire plans to put CA back on track

Network World Cloud Computing

Forward this to a Friend >>>


VMware acquires CloudVolumes for faster virtual app delivery
Extending its desktop virtualization stack, VMware has acquired CloudVolumes, a 3-year-old startup that developed software for delivering virtualized applications on the fly. Read More


WHITE PAPER: IBM

Forrester 2014 Dynamic Case Management Wave
Forrester has released its 2014 Dynamic Case Management Wave, and for the second consecutive time, IBM is a leader. View Now>>

WEBCAST: IBM

ING Transforms DevOps to Reduce Cost and Speed Delivery
ING, one of the largest banks in Europe needed to reduce the high cost of isolated, inefficient application development. They chose IBM PureApplication System to move their IT infrastructure to a cloud-based shared service model. In this Webcast, ING executive, Mark Willemse, shares the lessons ING learned from this strategic initiative. Learn more

The top 14 hidden features in Windows, iOS, and Android
Betcha don't know all these nifty tricks and time-saving tips to boost your productivity. Whichever OS you use, there's something here for you. Read More

How Michael Gregoire plans to put CA back on track
What's new at CA Technologies? Turns out the company has been quietly trying to reinvent itself as a top provider of enterprise products for managing cloud services and mobile devices, extending its expertise beyond in-house IT management. It's a tough challenge for CEO Michael Gregoire, who took charge of CA in 2010 to transform the company for this new age. Read More

VC investors hot for the cloud, mobile and robots
Venture capital fundraising has picked up steam in the U.S., with cloud computing, mobile technology and robotics getting solid backing. Read More


WHITE PAPER: Dropbox

The Truth About Cloud Security
"Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception? Keeping data close to home, on premises, makes business and IT leaders feel inherently more secure. But the truth is, cloud solutions can offer companies real, tangible security advantages. Learn more!

The 6 best tablets for getting work done in 2014
A few years ago, it was easy to scoff at the idea of using tablets for productivity. The hardware was too weak, and the software was too limited, so turning a tablet into a work device made sense only for a few fringe users. But things have changed since Apple released the first iPad in 2010. Read More

Cloud BI: Going where the data lives
Even though cloud-based business intelligence has been around for nearly a decade, a recent trend is driving renewed interest: Companies are generating and storing more data in the cloud. Read More

Ahead of VMWorld, VMware promotes Casado to lead NSX
Days ahead of the show the company has promoted some of its top brass to new positions, signaling their continued commitment to the areas of network virtualization and cloud computing. Read More


WHITE PAPER: Skyhigh Networks

Checklist for Selecting Enterprise-Ready Cloud Applications
To minimize risk, organizations must employ a methodology to identify and select enterprise-ready cloud services. This 21 step checklist includes the five categories of attribute to evaluate and an audit framework from the Cloud Security Alliance View Now>>

Google brings robust cluster scheduling to its cloud
Google is drawing from the work of the open-source community to offer its cloud customers a service to better manage their clusters of virtual servers. Read More

Amazon strikes deal in China to offer more imported goods
Amazon.com is hoping to attract more consumers from China, with a new agreement that will let the U.S. e-commerce company bring millions of products from its international sites to the country as imported goods. Read More

Start-up fights ambush attacks on SDN, virtual machine networks
Start-up GuardiCore is working on a security product that works through a 'honeypot' approach to detect and block stealthy attacks on software-defined networks (SDN) and multi-vendor virtual-machine infrastructures for enterprise customers as well as cloud-service providers. Read More


SLIDESHOWS

Top techs the CIA thinks are hot

Through its investment firm called In-Q-Tel, the CIA funds companies, mostly start-ups, to push forward technologies deemed useful to government intelligence agencies.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Munich reverses course, may ditch Linux for Microsoft

2. 5 cool new security research breakthroughs

3. Top 5 things to watch for at VMWorld 2014

4. The Samsung Z is dead: Is Tizen next?

5. 2014's Hottest IT Certification

6. New Microsoft same as the old Microsoft

7. The 5 most anticipated smartphone launches coming in September

8. Why TCP/IP is on the way out

9. Best and funniest Apple iWatch design concepts

10. Google wraps its trans-Pacific fiber cables in Kevlar to prevent against shark attacks

JOIN THE IDG CONTRIBUTOR NETWORK

The IDG Contributor Network is a collection of blogs written by YOU -- leading IT practitioners -- about the technology, business opportunities and challenges you face everyday. We invite you to become a contributor or participate by joining the conversations your peers spark.

Apply now to become a member


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cloud_computing_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: