Friday, 12 July 2013

Pick your hardware vision: Open Compute Project vs. data centers in a box

Geeks and leaks: Top 10 tech whistleblowers of all-time

Buyback program intensifies Aryaka/Riverbed rivalry

Network World Daily News PM
July 12, 2013
Share this email

Pick your hardware vision: Open Compute Project vs. data centers in a box

There are two trends happening in the IT hardware market, each gaining momentum but offering very different ways of outfitting data centers.

READ MORE
 

Issue highlights

1. Geeks and leaks: Top 10 tech whistleblowers of all-time

2. Buyback program intensifies Aryaka/Riverbed rivalry

3. iPad 5 rumor rollup for the week ending July 11

4. India's telegram service is dead … not so the telegram

5. Goodbye NAC, Hello EVAS (Endpoint visibility, access, and security)

6. Microsoft to pay first IE 11 Preview bug bounty to BlueHat security contest finalist

7. Ballmer pushes 'family of devices' as Microsoft's new mantra

8. Authentify xFA provides simple, secure primary authentication using digital certificates and voice biometrics

9. IT Increases Application Outsourcing Despite Disappointing Strategic Value

10. Image gallery: 8 apps to keep your car rolling

WHITE PAPER: Condusiv Technologies

Guide to 50% Faster VMs - No Hardware Required

For administrators seeking to increase performance in their virtual environment without investing in more hardware, this white paper outlines how I/O optimization technologies deliver performance at a fraction of the cost of hardware for applications with the heaviest workloads. Read more. Read Now!

Geeks and leaks: Top 10 tech whistleblowers of all-time

Traitors or patriots? Heroes or villains? These 10 engineers, academics, and scientists became famous for blowing the whistle on dubious practices READ MORE

Buyback program intensifies Aryaka/Riverbed rivalry

WAN optimization-as-a-service provider Aryaka has announced an aggressive buyback program that targets competitor Riverbed's customers, adding a new point of contention to an already heated rivalry. READ MORE

iPad 5 rumor rollup for the week ending July 11

With real information about iPad 5 and iPad mini 2 almost non-existent, the iOSsphere seized on the dregs, most of them provided by anonymous Asian supply chain sources. READ MORE

WEBCAST: IBM

Boost Profitability with Better Planning & Mobile Reporting

This session will discuss how Ashurst, a top-tier legal service provider for private and public sector clients worldwide, was able to effectively manage organizational change and improve their profitability using IBM Business Analytics. Learn More.

India's telegram service is dead … not so the telegram

No matter how often my press colleagues predict this or that technology will be a "killer" of this or that one, the fact is that technologies as a rule do not die sudden or violent deaths, they fade away, sometimes over a very, very long time. READ MORE

Goodbye NAC, Hello EVAS (Endpoint visibility, access, and security)

Around 2004, Cisco introduced a new technology initiative called Network Admission Control (now commonly referred to as Network Access Control or NAC). Back then, NAC was really in response to the recent wave of Internet worms where one compromised user PC could log on to the corporate network and subsequently infect the whole enchilada. NAC was seen as a way to alleviate this threat by authenticating... READ MORE

Microsoft to pay first IE 11 Preview bug bounty to BlueHat security contest finalist

Microsoft has already received several vulnerability reports that qualify for monetary rewards as part of the company's bug bounty program launched in June for the preview version of Internet Explorer 11. READ MORE

WHITE PAPER: FICO (Fair Isaac)

Cloud Analytics for the Masses

Learn the best practices in building applications that can leverage volume, variety and velocity of Big Data for organizations of any size. Learn more.

Ballmer pushes 'family of devices' as Microsoft's new mantra

If Steve Ballmer's words mean anything, Microsoft is about to dramatically expand the number -- and type -- of devices it makes in-house. READ MORE

Authentify xFA provides simple, secure primary authentication using digital certificates and voice biometrics

Forget about those highly vulnerable usernames and passwords. Authentify has just announced a new primary authentication method that is built upon a complete digital certificate PKI underpinning, but neither the enterprise nor the end user sees any of the complexity of the solution. READ MORE

IT Increases Application Outsourcing Despite Disappointing Strategic Value

Five out of 10 outsourcing buyers will up their bets on applications outsourcing, according to a joint survey from KPMG and HfS Research, but they continue to be disappointed by providers' analytical capabilities and innovation. READ MORE

Image gallery: 8 apps to keep your car rolling

These 8 apps for iPhones, iPads and Android devices can help you maintain your car, save money on gas, avoid accidents and make life on the road easier. READ MORE

WHITE PAPER: HP

Driving End-to-End Mobile Application Life-Cycle Management

Application deployment complexity and an explosion of business reliance on mobile applications are driving demand for targeted, collaborative, and agile application life-cycle management (ALM). Read Now!

SLIDESHOWS

6 rising open source stars

Names you'll want to know in the free software/open-source world.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 6 highest/lowest paid IT jobs

2. Best college tech majors for landing a top starting salary

3. How to solve Windows 8 crashes in less than a minute

4. Cisco impresses with first crack at next-gen firewall

5. 8 hot mobile startups to watch

6. 10 biggest home networking mistakes (and how to fix them)

7. Meet the next open-source stars

8. The worst cloud outages of 2013 (so far)

9. The biggest security snafus of 2013

10. A look at 22 Linux Foundation newbies

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as buzzhairs@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment