Sunday, March 18, 2012

10 Must-Read Network World stories for the weekend

What the cloud really means for your IT job | Review: HP, IBM, CA deliver highly scalable network management suites

Network World Daily News AM

Forward this to a Friend >>>


Are these the techiest business cards you've ever seen?
Some examples of how to get creative with an overlooked medium Read More


RESOURCE COMPLIMENTS OF: Microsoft

Try Microsoft Office 365, free
Collaborate in the cloud with Office, Exchange, SharePoint, and Lync videoconferencing. Access, edit, and share documents. Starting at $8/user/month. Try it free.

WEBCAST: Motorola Mobility

Authentication, Certificates and VPNs
MOTODEV for Enterprise can help get you up to speed quickly on key topics such as how to enable secure access to a company intranet from outside the firewall. This webinar provides a clear explanation of terms and technologies and what they can do for your enterprise app development. View Now

What the cloud really means for your IT job
Depending on which survey or story you read, the cloud can be either a good thing for IT workers and their job security, or it can be terrifying. Read More

Review: HP, IBM, CA deliver highly scalable network management suites
A network that measures downtime in millions of dollars per minute (or per second!) needs a serious, enterprise-level network management tool. Nothing less will do. Read More

Judea Pearl, a big brain behind artificial intelligence, wins Turing Award
Judea Pearl, a longtime UCLA professor whose work on artificial intelligence laid the foundation for such inventions as the iPhone's Siri speech recognition technology and Google's driverless cars, has been named the 2011 ACM Turing Award winner. Read More


WEBCAST: Mitel

Real World Perspectives from Real World Practitioners
Join your peers as they discuss Unified Communications and their move to voice virtualization—the business drivers behind their decisions, the benefits they've received and the best practices they've learned along the way. It's a must-see event for joining voice and data on a single virtualized infrastructure. Learn More

7 hot security companies to watch
There's a rush in security startups looking to tackle everything from identity management to encrypting cloud data. Here are some of the latest companies worth keeping an eye on. Read More

Could China easily take down US military's air-refueling logistics in a cyberwar?
A lengthy report prepared for the U.S. government about China's high-tech buildup to prepare for cyberwar includes speculation about how a potential conflict with the U.S. would unfold -- and how it might only take a few freelance Chinese civilian hackers working on behalf of China's People's Liberation Army (PLA) to sow deadly disruptions in the U.S. military logistics supply chain. Read More

Microsoft: Don't hate on IE 10
Microsoft says its latest version of Internet Explorer clears out a lot of clutter and creates a more immersive browser experience when paired with Windows 8's touch environment, and that it can be navigated by mouse and keyboard as well, although from the sounds of it not as elegantly. Read More


WHITE PAPER: IBM

Best Practices to Architect Applications in the IBM Cloud
It's clear that cloud environments are a great way to deliver software—but what are the best ways to use it really well? Read this report to learn how to leverage cloud environments, design applications for successful cloud-based deployments and safeguard your virtual machines. Read Now

New iPad wins rave reviews
The first hands-on reviews of the new iPad make it clear not only that Apple keeps the tablet crown but why it continues to do so. Read More

Alcatel-Lucent switch pushes Cisco, HP at the edge
Alcatel-Lucent this week will unveil a new Ethernet switch for enterprise campus networks that is designed to extend voice, data and video convergence to the wiring closet and access tier. Read More

40% of U.S. government Web sites fail security test
Approximately 40% of federal government agencies are out of compliance with a regulation that requires them to deploy an extra layer of authentication on their Web sites to prevent hackers from hijacking Web traffic and redirecting it to bogus sites. Read More



SLIDESHOWS

Useful security threat data advisory tools
Check out these browser-based tools to keep up on the latest cyber security threats.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Judea Pearl, a big brain behind artificial intelligence, wins Turing Award
  2. China's rare earth stranglehold
  3. Cisco pays $5 billion for video company
  4. New iPad wins rave reviews
  5. Video game art: Smithsonian exhibit celebrates 40 years of creativity
  6. IBM battles dire mainframe myths
  7. Developer cooks up 30-day 'Butter Egg Challenge'
  8. Identity management in the cloud emerges as hot-button issue for CIOs
  9. 40% of U.S. government Web sites fail security test
  10. Kaspersky Lab spots malware signed with stolen digital certificate

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: