Tuesday, October 20, 2009

Internal clouds are more than just virtualization; cloud security concerns; the CIA's cloud initiative

Secure telework without a VPN; IDC: Use cloud as 'stop-gap' measure in recession
Network World logo

Cloud Computing

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Citrix Systems
rule

The Power of Virtualized Web Application Delivery
The increased dependency on Web applications has created greater complexity in the environment making availability, performance and security of Web applications an imperative. This white paper discusses how any size organization can tune its Web application delivery services with a virtualized solution that will meet the unique characteristics of each individual application.

Read More

rule

Spotlight Story
Internal clouds are more than just virtualization

Less than 2% of enterprises have deployed internal cloud computing networks, and vendors are just beginning to provide the proper tools necessary to build them. Read full story

Related News:

Secure telework without a VPN
Toronto brokerage firm Octagon Capital ended up choosing an unusual hardware-and-cloud service from Route1 to secure its telework environment.

IDC: Use cloud as 'stop-gap' measure in recession
Businesses should only use cloud computing as a "stop-gap" measure to help them survive the cost pressures of the recession.

Storage pros worry about putting data in the cloud
Cloud storage platforms need to mature before they are enterprise-ready, particularly for customers in highly regulated industries.

CIA building secure cloud-based system
The secretive CIA, one of the U.S. government's strongest advocates of cloud computing, believes an internal cloud can make the agency's IT environments more flexible and secure.

6 questions to ask your cloud vendor
Recent incidents surrounding the safety and security of cloud data storage (T-Mobile/Danger, etc.) has many concerned about the overall stability of the cloud computing concept. Keith Shaw speaks with Ian Huynh from HubSpan about questions that CIOs and IT managers need to ask their cloud vendor when thinking about moving data or applications to the cloud. (14:51)

Is cloud storage ready for the enterprise?
The "cloud" may be the future of enterprise storage, but can it lay claim to the present as well?

Five problems keeping legacy apps out of the cloud
Did you think all those legacy apps would just float up into someone else's cloud infrastructure? Management, licensing and migration concerns highlight the list of troubles that vendors are now trying to address.

What kind of cloud computing project would you build with $32M?
The US Department of Energy will spend $32 million on a project that will deploy a large cloud computing test bed with thousands of Intel Nehalem CPU cores and explore the work of commercial cloud offerings from Amazon, Microsoft and Google.

Sidekick's lessons: Why backup for mobile phones is crucial
After the Sidekick near-disaster, mobile phone users might be wondering if they should ever trust any cloud services to protect their vital data.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Cell towers in disguise
Cell towersSome of the cell towers that dwell among us are cleverly hidden; others, not so much.

The ultimate smartphone
SmartphonesWhat if you could combine the best parts of every phone out there?

Addressing Web Threats
Recent research among senior IT managers reveals that, although organizations are taking steps to protect against Web-related threats to the enterprise, significant vulnerabilities still exist. This white paper provides specific considerations for addressing Web security liabilities.
Read More


5-Steps For Lowering Mobile Employee TCO
The rise of employee-owned BlackBerry, iPhone and other smartphones has created significant IT management and compliance challenges. This report recommends a 5-Step Mobility Management approach used by IT execs at best-in-class companies to cut mobility TCO, reduce risk and increase productivity.
Learn more.

 

October 20, 2009

MOST-READ STORIES

  1. Verizon fires shots across iPhone's bow with Droid smartphone
  2. Mozilla blocks Microsoft's sneaky Firefox plug-in
  3. 10 things you need to know about Windows 7
  4. Ethernet everywhere!
  5. Symantec calls 'SpywareGuard', 'Antivirus' top scareware threats
  6. The 'Net's most heinous hoaxes
  7. Missing dot drops Sweden off the Internet
  8. Husband, wife team arrested for allegedly stealing from Cisco
  9. How to royally foul-up an IT outsourcing project
  10. The Internet has shifted under our feet

Improving Application Performance Troubleshooting
Dramatically reduce downtime with the right tools. This whitepaper explains the four key features your application performance management toolset should include. Look for automation, intuitive analysis, real-time support and proactive problem solving.
Read More



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: