Monday, September 15, 2014

County set to rip and replace troubled SAP software system

DDoS attack victims need to involve police, says Verisign CSO | CIO of Defense Department Agency Cautions Against Rush to Cloud

Network World IT Best Practices

County set to rip and replace troubled SAP software system
SAP's software is used successfully by thousands of government agencies, a spokesman maintains Read More


WHITE PAPER: Fortinet

Security Concerns in the C-Suite
Next-generation firewall technology (NGFW) addresses the most prevalent security issues. Fortinet's FortiGate NGFW integrates five crucial security protections, including strong authentication, antimalware and APT detection. View Now>>

WHITE PAPER: Citrix Systems

Defend Web Properties with Citrix NetScaler
Today, defending your organization's web properties means more than just protecting a handful of enterprise web applications from advanced malware. Learn more on the complexity and challenges of defending against today's modern threats and discover how Citrix NetScaler application delivery controller (ADC) is an ideal defense solution. Learn more

DDoS attack victims need to involve police, says Verisign CSO
With DDoS reflection attacks growing into mammoth events with unforeseen consequences, mitigation firm Verisign believes a radical new approach is needed to head off a pile of trouble - go after the "guys behind the keyboards."In any other part of the security industry, Verisign's recommendation that victims on the receiving end of major DDoS incidents make the effort to work out who attacked them would now be seen as best practice but this is an industry built on mitigation - blocking - rather than investing in deterrence.To read this article in full or to leave a comment, please click here Read More

CIO of Defense Department Agency Cautions Against Rush to Cloud
The Defense Information Systems Agency's David Bennett calls the cloud 'viable' for certain government operations, but he warns that some applications and data must remain within the secure agency network. Read More


WHITE PAPER: Cloudera

Western Union Implements Enterprise Data Hub
For an implementation of its size, Western Union anticipated going from "zero to Hadoop" in about a year. Exceeding expectations, "We had our first production-ready Cloudera system up within just five months," commented Saraf. "We were actually leveraging it for some of our transactional processing, and saw immediate value." View now

INSIDER
How to lure tech talent with employee benefits, perks
Companies are vying for IT talent, and they’re using benefits and perks to help attract the best and brightest. So what are IT pros looking for?To read this article in full or to leave a comment, please click here(Insider Story) Read More

Security tops CIO worries; IT budgets, turnover on the rise
Enterprises' five largest IT investments are analytics and business intelligence, data center infrastructure, ERP, software development, and cloud computing. Read More


WEBCAST: EMC

The Need for a New Approach to Provisioning
Lines of business are being asked to move faster and get access provisioned more quickly, yet organizations have to be more mindful of the risk around managing access, and still enterprises want a simpler, more lightweight approach to provisioning. Learn More>>

New survey raises questions about net neutrality regulation, advocacy group says
More than two-thirds of U.S. respondents in a new survey say that decades-old telephone regulations should not apply to the Internet, which suggests that the U.S. Federal Communications Commission should stay away from reclassifying broadband as a regulated public utility, an advocacy group said.Many groups calling for the FCC to pass strong net neutrality rules have called on the agency to reclassify broadband as a regulated common carrier, similar to long-standing regulations governing the telephone system, but California-based tech advocacy CALinnovates pointed to a survey the group commissioned that it said suggests many U.S. residents are wary of heavy-handed regulations for the Internet.To read this article in full or to leave a comment, please click here Read More

Build it or buy it: Questions to ask about your metro data center network infrastructure
Enterprises need to evolve from traditional metro-regional/long-haul net designs toward a user-to-content model where the programmable network can dynamically allocate resources, connecting users to the content and bandwidth they want whenever they want it. Read More

Enterprise Annexation of Endpoint Security
Malware detection, prevention, and response activities are quickly bringing endpoint and network security together Read More


SLIDESHOWS

7 sexy smartphone technologies coming your way

A slew of new technological features are (or could be) coming to future smartphones. Here are seven that have been in the news over the last few years.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Windows 9 to users: I'm listening

2. Five million Gmail addresses and passwords dumped online

3. Internet of Overwhelming Things

4. What online news looked like on 9/11

5. Man arrested on drug charges after butt-dialing 911

6. The Linux desktop-a-week review: ratpoison

7. iPhone 6, Apple Watch features: Android's been there, done that

8. 5 questions to ask before you take a tech job

9. Last-minute iPhone 6 rumors: Release date, water proof, shatter proof and more

10. First Look: iPhone 6 and iPhone 6 Plus


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment