Search This Blog

Monday, June 27, 2011

Zenoss aims to deliver cloud service assurances

Network World Network/Systems Management - Newsletter - networkworld.com
The 10 worst cloud outages (and what we can learn from them) | Enterprise IT unhappy with Firefox 4's quick demise

Network World Network/Systems Management

Forward this to a Friend >>>


Zenoss aims to deliver cloud service assurances
As IT organizations approach a cloud computing model, many tend to be a bit skittish -- not knowing how one change might affect the cloud infrastructure and services can be unnerving. Read More


WHITE PAPER: Diskeeper Corporation

Best Practices for Data Performance on Storage Area Networks
Because SANs work at a storage layer underneath the operating system's file system, SAN is unaware of file fragmentation and uable to solve this issue. Performance suffers. This white paper details in clear terms how, where and why Diskeeper data performance technology should be used to ensure maximum SAN performance and optimum data response time. Read more.

WHITE PAPER: BMC

Moving to a Cloud-based Delivery Model
Help Desk software as a service is attractive to many IT departments. It offers the same benefits of traditional IT help desk solutions, in addition to reducing capital expenses, accelerating implementation, and providing easier upgrades. This paper explores considerations for implementing IT service management in-house or as a service. Read Now!

The 10 worst cloud outages (and what we can learn from them)
Sending your IT business to the cloud comes with risk, as those affected by these 10 colossal cloud outages can attest. Read More

Enterprise IT unhappy with Firefox 4's quick demise
Some corporate IT managers are unhappy with Mozilla's decision to push out new editions of Firefox every six weeks with its new rapid-release program. Read More

SaaS and IaaS: Expert guide
Two types of cloud computing - software as a service (SaaS) and infrastructure as a service (IaaS) – promise to bring great changes to the role of IT in the enterprise. IT professionals really need to learn how to talk the talk when it comes to SaaS and IaaS if they want to stay ahead of the trends. Read More


WHITE PAPER: Dell

Mobility KnowledgeVault
The resources in this Mobility KnowledgeVault provide expert guidance, peer advice, survey results and best practices to help you protect your mobile infrastructure. From determining a policy for employee-owned devices and data encryption to supporting the six major mobile operating systems, securing mobile devices and data is a top priority. View now

Security concerns aside, consumer IT takes over enterprises
To mitigate the risks associated with these technologies, organizations are moving away from a "trust-only" approach and deploying three-layer security and compliance strategies that include a combination of trust, policy and technology, the study says. Read More

Too much access to the Internet?
After the President of the United States announced that Osama Bin Laden had been killed, published reports revealed how the terrorist leader accessed the Internet to send e-mails without being intercepted by U.S. intelligence services. Adam Goldman and Matt Apuzzo of the Associated Press wrote that "Bin Laden's system …. left behind an extensive archive of email exchanges for the U.S. to scour." Read More

Gartner: How to get a handle on mobile device management
It was only a few years ago that mobile device management was as simple as using Research in Motion's BlackBerry Enterprise Server as the hub for all your devices. Read More


WHITE PAPER: Raritan

Best Practices: KVM Smart Card Authentication Systems
Selecting a smart card-enabled KVM system? Choose one that supports PKI authentication to multiple servers from a single location and makes the necessary KVM feature adjustments to enable seamless use of the reader. This White Paper examines best practices when evaluating a Smart Card solution. Learn More

Are all spectrum analyzers created equal?
The past couple of years have seen a rash of spectrum analyzers built into wireless LAN infrastructure equipment, key tools for identifying those pesky sources of interference that screw up our wireless connections and application performance. How important are they in the overall collection of interference-fighting ammo that Wi-Fi vendors have in their arsenals? Read More

Key questions to ask your service provider about security
Back in March, IT services provider Avanade Inc. conducted a global study of 573 business leaders, asking them about their primary IT focus areas for the next 12 months. It comes as no surprise that cloud computing, security and IT consolidation topped the charts. While 60% of the companies surveyed said cloud computing is a top IT priority for the next year, 75% of the C-level executives in those companies place it at the top of the priority list. Read More

'Curse you, users' redux
An old friend weighs in on the topics of users and usability. Read More

Survey shows enterprise open source usage ubiquitous
In the past several years, open source has gone mainstream. A new survey by OpenLogic shows that virtually every enterprise is using open source software. More importantly, open source code is no longer just coming in the "back door" through unsanctioned downloads by enterprises developers. Instead, open source software is being welcomed in through the front door of the enterprise as an equal. Read More

Zenprise cloud service manages corporate mobile device surge
Zenprise deploys its mobile device management application in third-party data centers to offer a cloud-based service aimed at small- to medium-size businesses. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

The 7 worst tech merger ideas ever
In this slideshow, we'll take a look at seven proposed mergers that we hope will never see the light of day, as their consummation would likely mean the end of the entire tech industry and possibly even the entire world.

MOST-READ STORIES

  1. CFOs lack faith in CIOs and IT teams, survey shows
  2. Oh Cyberthugs... Run, run as fast as you can. FBI on victorious roll
  3. Cisco's core share holds steady
  4. Startup touting data center fabric that will put a scare into Cisco, Juniper
  5. Gartner: New security demands arising for virtualization, cloud computing
  6. The data breach quiz
  7. Why I dumped my 4G Android for an iPhone
  8. The iPhone 5 rumor rollup for the week of June 24
  9. Gartner: How to get a handle on mobile device management
  10. Cisco upgrades, broadens Quad

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: