Tuesday, September 16, 2014

How network virtualization is used as a security tool

Network World Data Center - Newsletter - networkworld.com
  Facebook open sources its mcrouter data-caching tool | Brocade buys NFV mobile analytics assets

 
  Network World Data Center  

How network virtualization is used as a security tool
As VMware sells its network virtualization software, it's finding that security is a big driver for adoption. Read More
 




: Riverbed | Orange

A CIO's Guide to Better Network Performance
IT consolidation is putting significant strains on the traditional network paradigm. The videos in this Knowledge Vault provide executive overviews of how to meet branch consolidation goals with an eye to a seamless hybrid networking architecture that is application-aware, simple to manage, and leverages application visibility and WAN optimization. Learn More

Facebook open sources its mcrouter data-caching tool
The software is designed to make caches across multiple data centers more reliable and efficient Read More
 

Brocade buys NFV mobile analytics assets
Vistapointe software virtualizes probes for mobile network operators Read More
 

World's hot alternative energy projects
From hydrogen to solar and wood there are tons of ongoing cool alternative energy projects across the globe Read More
 


WHITE PAPER: Coresite

4 Advantages of Multi-Tenant Data Centers
Increasing demands on IT are forcing organizations to rethink their data center options. For many organizations, that means turning to the flexibility afforded them by outsourced cloud solutions, which can provide exponential cost savings. Learn More >>

New products of the eek 09.15.14
Our roundup of intriguing new products from companies such as Lenovo and Good Technology Read More
 

HP buys cloud provider Eucalyptus, Marten Mickos to lead HP Cloud
Eucalyptus CEO Marten Mickos will head HP's Helion cloud services and software Read More
 

SDN market could hit $18B by 2018
Almost 200% growth in 2013 in in-use and SDN-capable gear. Read More
 


WEBCAST: HP

Preparing for Zero-Days and Emerging Threats
Staying ahead of the bad guys requires two things: a good plan and a good partner. Your security plan must be robust, flexible, and responsive. Your partner must do the heavy lifting, so your team can concentrate to what matters most to your business. Learn More

The curious histories of 10 common computer messages
You may know what these messages mean, but do you know where they came from in the first place? Read More
 

Dense server battle to heat up with Intel's Xeon D next year
Intel's first Broadwell server chip, Xeon D, will be in servers next year Read More
 

Netflix looking to hire a 'Chaos Engineer'
Here's a job offering you don't see every day (asterisks mine): "Netflix is hiring a 'Chaos Engineer' … Basically, somebody to go in and f**k s**t up to prove we can recover. Ping me for details!"The "recruiter" in this case is Dan Woods, a senior software engineer at Netflix, and the "listing" was in the form of a tweet, which elicited a string of wisecracks – and a few expressions of interest -- from the Twitter crowd: Netflix is no stranger to chaos. In 2012 the company released the source code for Chaos Monkey, the first of its Simian Army collection of cloud testing tools.To read this article in full or to leave a comment, please click here Read More
 

Clippy saw this one coming
The image above is making the rounds on Twitter this morning. And while it would seem to be commentary on the official announcement that Microsoft is buying the maker of Minecraft for $2.5 billion, it was actually published on a site called Dorkly two  years ago.Author unknown but prescient. To read this article in full or to leave a comment, please click here Read More
 

 

SLIDESHOWS

Sneak Peek: New features coming to Internet Explorer

Microsoft's new Developer Channel offers glimpse into upcoming features of IE.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. What would you do if you lost access to your Gmail

2. Internet of Overwhelming Things

3. How to avoid online scams when selling your old iPhone or iPad

4. The curious histories of 10 common computer messages

5. Funny videos about iPhone 6 and Apple Watch

6. VMware and Cisco patch vulnerabilities in data-center gear and software

7. 20 cool things you can do with a Raspberry Pi

8. Top IT vendors reveal their IoT strategies

9. Apple bungles iPhone 6 pre-orders

10. Zero-day opens the way to hack back against fake Microsoft tech support scammers


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_data_center_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

 

No comments: