Tuesday, September 29, 2015

How AWS needs to reinvent its cloud

Juniper unites the enterprise | Google, Cisco, Adidas snare product design awards

Network World Cloud Computing

How AWS needs to reinvent its cloud
Amazon Web Services has experienced meteoric growth during the past decade. But now analysts are starting to question: Can the company keep it going? It will be a big question at the company's annual re:Invent conference next week in Las Vegas. Read More


RESOURCE COMPLIMENTS OF: CYREN

Webinar: Results of New NWW Survey on Web Security
In July and August 2015, Network World conducted a survey of information security professionals to gain a deeper understanding of how they plan to deliver their Internet security strategy. The results are compelling and will be shared in this live webinar event. Can't attend? Register anyways to receive the on-demand recording post-event. Join us as we discuss the findings of the Network World survey and provide a step-by-step plan to providing world-class web security. Register now!

WHITE PAPER: Windstream Communications

The Path to Value in the Cloud
The Path to Value in the Cloud, by Oxford Economics and Windstream, brings together the latest insights, tactics and strategies C-suite respondents are using to make the cloud work for them. Learn More

Juniper unites the enterprise
Juniper Networks this week unveiled a reference architecture for enterprise networks intended to assist in the transition to cloud computing. Called Unite, the architecture is embodied in the company's Junos operating system software and encompasses a handful of new and existing Juniper products. Read More

Google, Cisco, Adidas snare product design awards
Tech products stood out at the Red Dot design competition, which celebrated its 60th anniversary this year. Here are some of the most eye-catching winners. Read More

The cloud needs a new type of network optimization
Cloud computing took off like a rocket and has stayed on that high growth trajectory for years. The cloud has had a profound impact on the entire IT industry – from the way we build data centers to the way we procure and pay for services. In fact, it's changed the way network equipment providers build the underlying technology that powers the cloud and gave rise to a number of new companies in a very mature industry. Read More


WHITE PAPER: Windstream Communications

The Rising Popularity of Unified Communications in the Cloud
Discover top trends and best practices for moving UC to the cloud in this Nemertes Report. Learn More

Oracle services help you mix cloud and on-premises software
For all the talk about cloud computing, it's a rare enterprise that doesn't still use at least some on-premises software. With that reality in mind, Oracle on Monday rolled out two new services designed to help companies integrate the diverse pieces of those mixed environments. Read More

Cloudera unveils in-memory store, security layer for Hadoop
Just ahead of the opening of Strata + Hadoop World in New York City tomorrow, Cloudera today unveiled a new open source project to enable real-time analytic applications in Hadoop and an open source security layer for unified access control enforcement in Hadoop. Read More

After pushing malware, ad networks also used for DDoS
Rogue online advertisements that infect computers with malware have become a common occurrence on the Internet. But now, it appears, hackers have also figured out how to launch crippling distributed denial-of-service (DDoS) attacks through ad networks. Read More


WHITE PAPER: Iron Mountain

When the Cloud Evaporates
Recent research reveals that while SaaS adoption is high, there are relevant reasons to worry about its risks - and to have a contingency plan. This white paper shares insights from the survey about the ongoing proliferation of SaaS, the potential risks of relying on cloud applications, and the actions companies are taking to mitigate those risks. Learn More

Keep out ahead of shadow IT
It's time to face a cold, hard fact: The shadow IT parade is passing you by, and if you don't get out in front of it and lead it where you want it to go, you might get run over. Read More

Is BYOK the key to secure cloud computing?
Thanks to Edward Snowden's revelations about the NSA, the comprehensive hacking of Sony, and on-going legal battles over whether email stored in the cloud belongs to the people sending it or the service hosting it, more and more cloud services have moved to encrypt data. Some are going even further, offering Bring Your Own Key (BYOK) options, where the user holds the encryption keys for their own cloud data. Read More

Rightscale extends its cloud manager to control bare metal
RightScale, which has a SaaS-based tool for managing multiple different types of public clouds can now also control bare metal servers sitting on customers premises. Read More

Authentic8's browser-in-a-cloud insulates users from Web-borne threats
The browser has become the most important application people use, whether for accessing business applications or leisure purposes. 451 Research says three out of every four applications will be delivered via the cloud by 2017, and of course the browser is the front end to all those apps. Unfortunately, today's browsers are inherently insecure. Read More


SLIDESHOWS

Celebrating 25 years of wacky Ig Nobel Prize brilliance

Honoring research that makes you laugh AND think.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. ARIN Finally Runs Out of IPv4 Addresses

2. Here's what you can expect to see at Google's Nexus announcement

3. China's Linux-based replacement for Windows XP looks an awful lot like Windows XP

4. The 25 most powerful enterprise networking companies

5. 19 free cloud storage options

6. The World We Leave Our Children: How I became a free software extremist

7. How Cisco's new ONE Software pricing model will affect customers

8. US rank drops to 55th in 4G LTE speeds

9. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac

10. How to watch football: A guide to streaming the 2015 NFL, college football season


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cloud_computing_alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


ads

Ditulis Oleh : Angelisa Vivian Hari: 7:54 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive