Thursday, October 22, 2015

Dell and Microsoft announce 'Azure in a box' for $9,000 a month

The sun will soon set on HP's Helion Public Cloud | First look: AWS Mobile Hub fixes previous issues

Network World Cloud Computing

Dell and Microsoft announce 'Azure in a box' for $9,000 a month
Dell and Microsoft have teamed up to sell a converged system that combines servers, storage and software in an integrated box which they say can connect easily to Microsoft's Azure cloud services. Read More


RESOURCE COMPLIMENTS OF: Ciena

Think Big. Scale Fast. TRANSFORM. Enter Blue Planet.
With Network Functions Virtualization (NFV), network operators are reducing their dependence on single-purpose appliances, enabling more programmability in the network and greatly reducing the complexity and time associated with introducing new services. Learn More

WHITE PAPER: IBM

IBM Point of View: Internet of Things Security
IBM is helping create and use the Internet of Things (IoT) by leveraging cloud, analytics, mobile, social and security technologies. The connectivity of 'things' presents a broad set of security challenges. This document describes IBM's view of security and privacy for IoT systems. Learn More

The sun will soon set on HP's Helion Public Cloud
Earlier this year HP let slip that the public cloud may not be a place it wants to compete, and on Wednesday it followed through on that suggestion with an announcement that it will shutter its Helion Public Cloud for good. Read More

INSIDER
First look: AWS Mobile Hub fixes previous issues
Developing mobile apps on the Amazon cloud is now significantly easier, at least for iOS and Android clients. (Insider Story) Read More

How higher ed IT is staying ahead of the cloud computing curve
Signs that cloud computing is for real are piling up around Carnegie Mellon University's Tom Dugas, but nothing else brings this home like the fact that the renowned Pittsburgh research school has posted a job opening for its first-ever cloud architect. Read More


WHITE PAPER: ManagedMethods Inc

Shadow IT: Discover What's Hiding in you in Your Cloud
It's no secret that enterprise use of cloud apps is on the rise, causing intensified cloud security risks and the rise of Shadow IT. This white paper focuses on the importance of discovering all the cloud apps running in your company and how you can efficiently monitor and control their use. Learn More

Amazon's case for running containers in its cloud
Like many vendors across the cloud computing and hosting market, Amazon Web Services is evolving its platform in an attempt to convince customers that its cloud is the best place to run application containers. Read More

Docker's acquisition aims to improve application container management
Docker containers have spread like wildfire across the technology industry, and now one of the biggest companies behind the movement has taken a big step toward making it easier to manage application containers across various infrastructure environments. Read More

Dell targets hyperscale wannabes with new line of bare-bones servers
Dell has released a new family of servers aimed at companies that want some of the cost savings of using custom-built hardware but without having to do as much of the engineering work. Read More


WHITE PAPER: IBM

How are Developers Using Cloud to Develop IoT Services?
The Internet of Things (IoT) is set to become one of the most transformative technological and commercial opportunities yet, with a range of IoT services already hitting the market. Learn more in this study from IBM and Business Cloud News. Learn More

EMC and VMware create Virtustream-based cloud business unit
EMC and VMware today announced the creation of a new cloud computing business unit that will sell technology from both companies, and products from Virtustream, a company EMC bought for $1.2 billion earlier this year. Read More

Akamai's CDN is coming to Azure thanks to expanded partnership
Azure users have already had access to the homegrown content delivery network services Microsoft offers in both standard and premium versions, but thanks to a newly expanded partnership, they'll soon be able to tap CDN services from Akamai as well. Read More

How a tea kettle can kill your cloud
In a statement that speaks volume about the safety of the Internet of Things (IoT), it was revealed today (link via SlashDot) that Really Bad Software on a connected tea kettle was exploited to reveal Gmail passwords and other fun items. There's even a YouTube Video demonstrating how fun it can be. Read More

Inside the Amazon Dash Button hack and how to make it useful
How to find a Dash Button's MAC address using simple Python code and what else you might do with it. Read More


SLIDESHOWS

10 key moments in the history of Apple and Microsoft

Apple and Microsoft recently renewed their alliance with the goal of tackling the enterprise market, but the latest partnership is just the most recent turning point in the two companies' intertwined histories. Here are the defining moments that led up to the new pact.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. China reportedly tries to hack U.S. businesses the day after agreeing not to

2. Dell targets hyperscale wannabes with new line of bare-bones servers

3. Tricky new malware replaces your entire browser with a dangerous Chrome lookalike

4. 19 free cloud storage options

5. Leaked Dell ad gets Black Friday tech bargain train rolling

6. 2015 technology industry graveyard

7. Is it still possible to do phone phreaking? Yes, with Android on LTE

8. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac

9. Target's newest security problem: Pranksters taking over PA to blast X-rated audio

10. Crypto researchers: Time to use something better than 1024-bit encryption


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cloud_computing_alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


ads

Ditulis Oleh : Angelisa Vivian Hari: 6:30 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive