Tuesday, May 25, 2010

Juniper seeks to out-virtualize Cisco in data centers

IBM kicks off spending spree with Sterling Commerce | Energy efficiency – The hidden treasure in your IT operations

Network World Data Center

Forward this to a Friend >>>


Juniper seeks to out-virtualize Cisco in data centers
Juniper Networks' announcement this week of switches and routers designed to flatten and simplify legacy networks is the latest sign that this company has no intention of backing off in the face of ever stiffer data center competition from Cisco, HP and others. Read More


RESOURCE COMPLIMENTS OF: CDW

Need to optimize your data center?
CDW has the experts and solutions that can help. Click to continue

WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

IBM kicks off spending spree with Sterling Commerce
IBM has $20 billion earmarked for acquisitions, according to CEO Sam Palmisano. IBM's first big purchase of 2010 is $1.4 billion for AT&T's Sterling Commerce. Read More


WEBCAST: 3Com

Close the Network Architecture Gap
Join Robert Whiteley, V.P. and Research Director at Forrester Research, for this Webcast on transforming your data center. Robert will discuss the critical networking trends that will affect the way you build your data center and provide a 3 step transformation formula. View Now

Energy efficiency – The hidden treasure in your IT operations
When does green technology move from feel-good marketing-speak to something more actionable? When it turns into the kind of green that feels good in your wallet. Read More


WEBCAST: Webroot

Anatomy of a Complete Security Solution
Today's malware threats use any number of guises - viruses, phishing scams, network propagation, USB infection - but their motive is usually the same. Steal sensitive information. Attend this webinar to find out how to protect your organization against today's complex malware threats. Register now!

Dell profit up 52 percent on improved corporate sales
Dell reported its first increase in quarterly profits for two years on Thursday, helped by an uptick in commercial spending and its ongoing efforts to reduce costs. Read More

Judge rules EMC founder concocted 'sham' $62M tax-shelter
It's difficult to recall a judge using more damning language in a white-collar case, so consider the depth of premeditated wrongdoing necessary to elicit these words from U.S. District Judge Dennis Saylor in describing what he found to be an illegal $62-million tax shelter erected by the late founder of EMC, Richard Egan, in conjunction with family members and advisers. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Car hackers can kill brakes, engine, and more
Researchers at the University of Washington and UC San Diego have taken a close look at the computer systems used to run today's cars and discovered new ways to hack into them, sometimes with frightening results.

20 Crazy Concept Phones
From snake phones to handsets that look like hockey pucks, these hopelessly impractical devices are the coolest-looking phones you'll never want to own.

MOST-READ STORIES

  1. Cisco's NAC goes off track, customers taken aback
  2. Seagate invents new type of laptop hard drive
  3. HP recalls batteries that post a fire hazard
  4. NAC: What went wrong?
  5. Apple reverses its 'No cash for iPad' policy
  6. Your old computer, born again
  7. IBM red-faced after handing out infected USB drives
  8. Google's Pac-Man 30th birthday present: Free game forever
  9. Black duck eggs and other secrets of Chinese hackers
  10. Be careful using VMotion over the WAN

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_data_center_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: