Search This Blog

Monday, December 24, 2012

2012: The year cloud computing took a bite out of IT

  IT shifts from owning to outsourcing data center space | Mozilla compromises on x64 Firefox after user backlash
 
  Network World Network/Systems Management

Forward this to a Friend >>>


2012: The year cloud computing took a bite out of IT
As new public cloud plays leap in and the private cloud slowly evolves, we're on the brink of a shift to cloud computing for critical business workloads Read More


RESOURCE COMPLIMENTS OF: SolarWinds, Inc.

SolarWinds Web Help Desk Software - Awesomely Affordably
Web-based ticketing, change management, IT asset management & more! SolarWinds Web Help Desk is an affordable, feature-rich, easy-to-use tool that goes beyond simple trouble ticket solutions. Automatically convert user emails into tickets, update tickets, inventory assets & more. Get all of the help desk features you need at an incredible price! Download a fully functional, 30-day free trial today and discover how easy and affordable help desk software can be!

WHITE PAPER: Quest Software

5 Questions for Buying a 2-Factor Authentication Solution
You've decided to implement two-factor authentication, but how do you know which solution is right for your organization? In this brief, discover the top five questions that you should ask before purchasing a two-factor authentication solution, and how Dell's solution addresses each question. Read Now!

IT shifts from owning to outsourcing data center space
Demand is increasing for data center space in multi-tenant facilities, driven by a number of trends, according to a new report. Read More

Mozilla compromises on x64 Firefox after user backlash
Mozilla on Friday backtracked from a decision to suspend all work on a 64-bit version of Firefox for Windows, acknowledging that user criticism had changed its mind. Read More

iPad Mini grinch strikes: UPS guy caught on camera taking rather than delivering
UPS has reportedly fired a seasonal delivery man after he was caught on camera swiping an iPad mini at a home where FedEx delivered it earlier in the day. Read More

Cisco IP phones buggy
All of Cisco's IP phones are vulnerable to complete control by hackers, including the ability to access audio data at any time even if a phone call is not in progress. This is the finding of computer scientists at Columbia University, according to this report in IEEE Spectrum. Read More


RESOURCE COMPLIMENTS OF: DameWare, part of the SolarWinds Family

DameWare Remote Support Software – Easy, Fast & Affordable
Remotely manage servers, desktops and laptops in minutes! With DameWare you can remotely manage key elements of your infrastructure - domains, workstations, disk drives, & event logs. You need to resolve Windows, Mac & Linux problems for your end-users quickly, and DameWare lets you perform various critical system management tasks – remotely! Download a fully functional, free trial today and discover why thousands of system administrators use DameWare every day!

Is there a greater risk of cyber attack over the holidays?
With Christmas only a few days a way, most businesses will be shutting down for a holiday break at the close of business today. It should be a time of peace and relaxation--a time to reflect on the year that has slipped away, and to envision goals for the year to come. But, it seems a majority of IT admins and security professionals will still be losing sleep over potential cyber attacks. Read More

2012's 10 most-read Buzzblog posts
I will be on vacation until Wednesday, Jan. 2. To fill the resultant gaping void in your lives, here is a list of the 10 most-read Buzzblog posts of 2012, as voted on by you, the readers of Buzzblog: Read More

The best business mobile products of 2012
The highest rated must-haves for serious mobile users. Read More

6 Steps IT Can Take to Bring Business Into Tablet Decisions
The IT department should stop dominating the decision-making process for tablet projects, Forrester analysts say. Read More


WEBCAST: Meru Networks

Impact of 802.11ac on WLAN
In this webinar, industry expert Craig Mathias and Robert Crisp from Meru Networks will discuss the impact 802.11ac will have on enterprise WLAN networks and how to best prepare for it. Learn more.

INSIDER
How a Homegrown Mobile System Helps Police Bust Gang Members
A local police force built a mobile-data system to quickly access the records officers need to make arrests. Read More

10 Resolutions for CIOs to Kick-Start the New Year
Michael Friedenberg shares his top 10 resolutions for CIOs, including losing weight (the legacy IT kind) and lowering your handicap (professional weaknesses). Read More

Tech 2013: 10 headlines from the future
As 2013 unfolds, you probably won't be surprised to encounter battles over who can access your personal data, new gaming consoles, big developments from Microsoft, and the perhaps the death of a once-proud smartphone superstar. Admittedly, predicting the future is a tricky business—especially in the volatile world of consumer technology—but we're always inspired to give it a try. Read More

E-waste firm convicted of falsely promising to recycle in the US
Electronic waste recycling firm Executive Recycling has been convicted of multiple crimes, including environmental violations related to illegal disposal of e-waste overseas, mail and wire fraud, and smuggling and obstruction, the U.S. Department of Justice announced. Read More

 
 
 

SLIDESHOWS

10 technologies that disappointed in 2012
Here are 10 technologies that fell short of expectations in 2012.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. MIT research shows new magnetic state that could aid quantum computing
  2. iPhone 6 rumor rollup for the week ending Dec. 21
  3. Give the gift of Gigabit WiFi: 802.11ac product sampler
  4. VMware patches 'critical' vulnerability
  5. Cisco uses LISP to articulate programmability
  6. Cisco sacrificing one for another?
  7. This year in tech: Biggest fails, flops and faux pas
  8. Boeing uses 20,000 pounds of potatoes to check aircraft wireless network signals
  9. The Mayans really predicted the release of E17
  10. 15 free security tools you should try
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: