Showing posts with label Reasons why Enterprises are Moving to Broadband Their WAN. Show all posts
Showing posts with label Reasons why Enterprises are Moving to Broadband Their WAN. Show all posts

Tuesday, July 7, 2015

World Issue highlights

Issue highlights

White Paper: Silver Peak Systems Inc

5 Reasons why Enterprises are Moving to Broadband Their WAN

The WAN has always been about connecting users to applications and moving data, but the playing field has now changed with datacenters migrating to the cloud along with missioncritical applications. Ultimately the way that enterprises and their users do business has changed - and so must their approach to connectivity. Learn more >>

Ouster of Kubuntu founder leaves its future in doubt

A disagreement between the founder of Kubuntu and the Ubuntu Community Council has roiled the Linux community and left the project rudderless, as Jonathan Riddell left Kubuntu’s governing body late last month.A month before, Riddell was forced out of his post as the de facto head of the governance committee of Kubuntu, the Linux distribution he helped to found in... READ MORE

‘Dancing baby’ DMCA case is taking a lifetime

A toddler when his star turn in a homemade YouTube video incurred the legal wrath of Universal Studios and Prince, the “Dancing Baby” at the heart of an important copyright case is likely nine years old today.Which means the wheels of justice have been grinding on this one for eight years.  And they may grind on for who knows how... READ MORE

EMC sells Syncplicity to focus on core storage business

EMC is selling its Syncplicity file-sharing and collaboration business to private investment company Skyview Capital for an undisclosed sum.EMC bought Syncplicity in May 2012 in response to the growth of mobile computing and bring-your-own-device policies in enterprises. Syncplicity is one of a host of cloud-based file services, including Box, Dropbox and Google Drive, that have emerged in the past few... READ MORE

Cloud to consume almost half of IT infrastructure sales by 2019

Yesterday, I wrote that "Nearly one-third of all IT infrastructure spending is now devoted to cloud." That sounded like a lot, but IDC, the source for those numbers, is now saying that's only the beginning.According to the research firm's latest announcement, cloud IT infrastructure spending is expected to grow 15.6% a year and represent 46.5% of the total IT infrastructure... READ MORE
White Paper: IBM

How to Develop & Maintain Fast and Always-On Apps with Ease

People expect instantaneous response and 24x7 uptime from today’s digital applications. But the complexity, velocity, and volume of data in these applications often bring traditional database servers to their knees or send costs through the roof. Read this whitepaper to learn how to develop and maintain your apps with ease. Learn More

Verisign introduces new cloud-based DNS firewall

Protecting an enterprise from cyberattacks is a task that is becoming increasingly tough. Just when one thinks the problem is solved, new attack surfaces are created that open the door to new threats. When there was but a single ingress/egress point into the network, a firewall could protect the organization. However, hackers have become more sophisticated and have been circumventing... READ MORE

Ex-attorney general Holder hints at possible DOJ plea deal with Snowden

The “possibility exists” for Edward Snowden to strike a plea deal with the US Justice Department and return to the USA. At least it does according what former Attorney General Eric Holder told Yahoo News; but he’s the same guy who previously filed a criminal complaint against Snowden for three felony violations of the Espionage Act. Notice the “former” in... READ MORE

Microsoft security tool fails malware detection test

There are many great choices out there for malware protection and detection. Unfortunately, Microsoft's offering isn't one of them. In recent tests by AV Test, the German lab that is pretty much the de facto standard in malware testing, Microsoft came in a distant last place.AV Test's most recent experiment pitted 30,000 known samples of malware against Windows 7 AV... READ MORE

8 penetration testing tools that will do the job

If the probability of your assets being prodded by attackers foreign and domestic doesn’t scare the bejesus out of you, don’t read this article. If you’re operating in the same realm of reality as the rest of us, here’s your shot at redemption via some solid preventive pen testing advice from a genuine pro.CSO speaks with pen test tool designer/programmer/aficionado,... READ MORE
White Paper: IBM

WebSphere Portal Version 8.0 Reviewer's Guide

Read an in-depth view of new WebSphere Portal features and product capabilities. Learn More

Cisco buys cloud-based contract administrator

Cisco this week announced intentions to acquire privately held MaintenanceNet, a provider of cloud-based software to manage recurring customer contracts.Cisco will pay $139 million in cash and retention based incentives to acquire MaintenanceNet.+MORE ON NETWORK WORLD: Cisco to buy OpenDNS to boost Security Everywhere initiative+Cisco says the acquisition will help it simplify contract renewal processes and help sales partners capture... READ MORE

Hacking Team hack reveals why you shouldn't jailbreak your iPhone

An Italian firm with the appropriate name Hacking Team suffered a massive breach in its company data Sunday, and 400GB of internal documents so far have been released and are being analyzed by reporters and security researchers. Hacking Team’s customers are government agencies, including both law enforcement and national security, and the ostensibly legal software it sells to help them... READ MORE

How Office 365 balances IT control with user satisfaction

At the end of 2014, Microsoft bought Acompli, creators of a popular email app that it quickly rebranded as Outlook. The familiar name doubtless drew in more users, but it also gave IT teams a set of expectations about the security and management options a product called Outlook would have.Given that Acompli's slogan was “Loved by users, and trusted by... READ MORE

How analytics and the Internet of Things raise the stakes for IT

This in-depth story, available for download as a PDF, examines the impact of IoT-generated big data and analytics on organizations and illustrates some of the major business implications of IoT data.(computerworld.com)To read this article in full or to leave a comment, please click here READ MORE

IDG Contributor Network: Don't be mad at ransomware attackers, be grateful

You're minding your own business, sitting at your office computer. Suddenly, a pop-up appears – with the logo of the FBI – warning that you're under investigation for trafficking in child pornography. Your computer locks up. The message also instructs you to pay a fine with a gift card or money order, or risk being arrested. In return for the... READ MORE
INSIDER

Hiring recent college grads: 5 strategies that work

This year’s STEM grads know what they want and are more prepared for the workforce than ever. According to a new report from Accenture, the class of 2015 is skilled, motivated and loyal — and anxious to join the ranks of IT.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE
: Red Hat

How to Use DevOps For Competitive Advantage

DevOps is showing promise as the way to achieve faster delivery of applications and services. Learn how DevOps can help transform your organization into one that can stay relevant in today's disruptive business environment. Learn more >>
SLIDESHOWS
MOOCs from EdX, Coursera and newcomer Kadenze tackle superheroes, science of cooking, alien worlds and more.
JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
MOST-READ STORIES
Join the IDG Contributor Network
The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.