Monday 6 June 2011

You can't manage what you can't see: gaining visibility

Facebook's CIO Shares IT Innovation Successes and Failures | The Two Biggest Lies About Cloud Security

Network World IT Best Practices

Forward this to a Friend >>>


You can't manage what you can't see: gaining visibility
One of the biggest problems that security professionals and system administrators face is lack of visibility. While blind spots have always existed, technologies like virtualization and cloud computing are making the need to see into their operations even more critical. Read More


WHITE PAPER: Dell

Converged Communications: People and Applications in Synch
Most small and midsize organizations find implementing unified communications a daunting task, between lack of in-house expertise and complex integration issues, it's easy to back burner this project. Find out how to implement a communications strategy in this Collaboration KnowledgeVault. Learn more

WHITE PAPER: Cisco Systems

Reinvent Network Access
Combine wireless, wired, and security technologies in a Unified Access systems approach. Download Design Guide. Learn More

Facebook's CIO Shares IT Innovation Successes and Failures
Roam the open, warehouse-style headquarters of Facebook in Palo Alto, Calif., and you'll see posters on nearly every wall encouraging innovation. One in particular reads, "Move fast and break things"--a principle that Facebook CIO Tim Campos says is core to the success of his 65-person IT team. Read More


WHITE PAPER: BMC

Seven Standards of Cloud Computing Service Delivery
This paper outlines best practices for selecting cloud-computing solutions. Learn more!

The Two Biggest Lies About Cloud Security
Survey after survey note that security is the biggest concern potential users have with respect to public cloud computing. Here, for example, is a survey from April 2010, indicating that 45 percent of respondents felt the risks of cloud computing outweigh its benefits. CA and the Ponemon Institute conducted a survey and found similar concerns. But they also found that deployment had occurred despite these worries. And similar surveys and results continue to be published, indicating the mistrust about security persists. Read More


WHITE PAPER: Avaya

Independent Lab Comparative Review
MierConsulting engineers conducted an hands-on, comparative review of three leading contact center packages, focusing on these products' multimedia, mixed voice and text-based contacts - capabilities. Read Now

Turning Cool IT Ideas Into Revenue
CIO entrepreneurs tell how they're creating new businesses with internal IT Read More

Top security nightmares: Privately owned iPhones, iPads and other mobile devices
IPhones, iPads and other employee-owned mobile gear are the most risky devices that can be connected to corporate networks, according to a new survey by ISACA, an international user group devoted to providing benchmarks and guidance for technology best practices. Read More

The 20 Best Gadgets of 2011--So Far
It's been a good year for tech toys, and it'll probably get better, but here are some of the best gadgets we've seen in the first half of 2011. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Microsoft Subnet: A set of classes for a Microsoft Cert from Webucator and Polycom videoconferencing system. Enter here.

SLIDESHOWS

4G Faceoff: ThunderBolt vs. Galaxy
We tested the Verizon Wireless HTC ThunderBolt and T-Mobile's Samsung Galaxy S 4G. Here are three things we liked/disliked about each product.

MOST-READ STORIES

  1. First look at Windows 8
  2. Clueless can hack Facebook in seconds over Wi-Fi
  3. Top 10 things every taxpayer should know about identity theft
  4. Cisco resorting to intimidation tactics
  5. Battle looms over securing virtualized systems
  6. Worst hackers ever?
  7. RSA's INsecurID
  8. 8 security considerations for IPv6 deployment
  9. Developers find a lot to love in Windows Phone 7 Mango
  10. Apple reportedly cracking down on iPad, iPhone giveaways

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment