High-tech

High-tech
Light

Tuesday, December 2, 2014

Driving IT efficiency: SDN tools increase WAN efficiency

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Dec 2, 2014 2:19 PM
Subject: Driving IT efficiency: SDN tools increase WAN efficiency
To: <aquarianm@gmail.com>
Cc:

Report: FIN4 hacker tactics and security measures to thwart attacks

BYOD is saving serious money for IT

Network World Daily News PM
December 02, 2014

Driving IT efficiency: SDN tools increase WAN efficiency

Configuring, maintaining and changing WAN infrastructure can be a nightmare given the distributed nature of the beast and all the remote touch points, but emerging Software Defined Networking (SDN) tools promise to make these operations more efficient. Usually touted as a data center tool, SDN can be used to automate and manage WAN operations, says Zeus Kerravala, principal of ZK Research. WAN issues are hard to address because of the dispersed nature of the resources, he says. "There's no perfect way of making changes to the WAN," but "SDN brings automation and orchestration from a centralized location and allows you to react faster."To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. Report: FIN4 hacker tactics and security measures to thwart attacks

2. BYOD is saving serious money for IT

3. Why Apple can't meet its luxury brand expectations for the iPhone

4. HP rolls data analysis tools into the cloud

5. No Ordinary Mobile Attack: The Regin Menace

6. FIRST LOOK: Firefox 34

7. Imagine traveling in an airliner without access to any of your personal electronic devices

8. Report: Startup promises to catch 100% of network attacks with unique detection technology

9. HP sees HP-UX sticking around for 10 years

10. Why there's no open-source standard-bearer for the network

11. How to get the most out of your IT talent

12. Public cloud storage can be efficient, but the potential is still limited

13. How to get more out of your virtualized and cloud environments

14. How UPS uses analytics to drive down costs (and no, it doesn't call it big data)

WEBCAST: Code 42

Enabling Collaboration while Maintaining Data Security

Much to the dismay of IT­—well-meaning knowledge workers are using consumer-grade file sync and share tools, violating security policies and putting mission-critical, corporate data at risk. Learn More

Report: FIN4 hacker tactics and security measures to thwart attacks

FireEye released a report detailing the Wall Street-savvy hacker group dubbed FIN4 that steals insider information in order to gain an advantage in stock trading. Here are the FIN4 tactics and security measures to help thwart attacks from the report. READ MORE

BYOD is saving serious money for IT

Benefits for the Bring Your Own Device (BYOD) phenomenon have been largely anecdotal, but Gartner is starting to find real, measurable dollar savings for companies that have embraced it. READ MORE

Why Apple can't meet its luxury brand expectations for the iPhone

To maintain its course, Apple will have to become the world's biggest luxury brand and outperform top luxury companies like Mercedes and BMW. READ MORE

HP rolls data analysis tools into the cloud

The pool of online data analysis services available for corporate users is about to grow larger, with HP set to offer two of its own, key products as hosted cloud services by early next year.The company's high-performance columnar database, Vertica, will be available as a hosted offering starting early in 2015, as HP Vertica OnDemand.The company will also offer selected functions of its IDOL (Intelligent Data Operating Layer) text processing software as discrete services that can be embedded into mobile and desktop computing applications, in a package called IDOL OnDemand, already available to selected developers.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: PC Connection | EMC

Dual Perspectives on ITaaS

This global survey by IDG Research Services of more than 350 IT and BU directors at enterprises of 1,000 employees or more reveals significant differences in the perception and priorities of business and IT when it comes to many aspects of running IT like a business. Based on a global survey conducted by IDG (CIO), EMC and VMware. View Now

No Ordinary Mobile Attack: The Regin Menace

When you read about security attacks involving mobile network technology, typically they're incidents that target mobile devices used by consumers.All kinds of malware has been found over the years that targets iOS and Android. Isolate the malicious files, wait for antivirus software to acquire signatures a day or so after a zero-day is discovered, run it, reboot your device, you're all set.That's not what Regin is, oh no. Regin is the story of a global cyberattack mechanism on a massive scale. Hold on to your seats, because I'm going to take you on a bumpy ride.To read this article in full or to leave a comment, please click here READ MORE

FIRST LOOK: Firefox 34

Why, Hello thereThe fact that modern browsers update silently and often occasionally takes some of the savor out of a new release. Rapid releases mean new features are deployed in a dribble, rather than in bursts. With Firefox 34, however, Mozilla has bucked the trend, giving us a swath of new features to enjoy all at once. Have a look.To read this article in full or to leave a comment, please click here READ MORE

Imagine traveling in an airliner without access to any of your personal electronic devices

The reason you're being asked to imagine the horror of air travel with no electronics is that counterterrorism officials here and abroad are reportedly considering just such a restriction in response to heightened concerns about bombs in carry-on luggage.That's on top of considering a ban on carry-on luggage.From an NPR story: Another possible remedy: banning electronic devices from the passenger cabin. Officials are discussing whether to require that electronics such as cellphones, iPads and computers be placed in the cargo hold with checked baggage, which goes through a much more rigorous screening process. Detecting a bomb, if there is one, would be more likely.To read this article in full or to leave a comment, please click here READ MORE

Report: Startup promises to catch 100% of network attacks with unique detection technology

Startup TrustPipe is announcing a security platform that categorizes network-based attacks and blocks them. The company claims that in two years of testing the software has never let attackers compromise the systems it has been protecting. As it emerges from three years of stealth mode TrustPipe is announcing – perhaps surprisingly – that its first version, called Trust XP, is written specifically for Windows XP, an operating system Microsoft stopped supporting last spring. But XP is still in use in countless devices – particularly point-of-sale (POS) machines – as well as millions of PCs around the world, especially in China. Trust XP has the potential to address security concerns about these systems and keep them in service longer.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: IBM

Workforce and Customer Experience Assessment

A social business excels at creating highly engaging and personalized connections between people, information, and process. The result are smarter workforces and exceptional customer experiences. Learn More

HP sees HP-UX sticking around for 10 years

Hewlett-Packard isn't making bones about the fact that the Unix OS market is in decline, but the company believes its HP-UX has a long life ahead for customers using its fault-tolerant servers.The company has a road map for HP-UX into 2022, which could possibly expand into 2025, said Randy Meyer, vice president and general manager of Mission Critical Systems at HP's Enterprise Server Business."Clearly there are installed-base customers that want continuity of HP-UX," Meyer said. "We've got a huge customer base we've got to [address]."HP puts HP-UX on its mission-critical servers that run on Intel's Itanium processors, whose future is under question as the Unix market declines. Itanium is being taken over by high-end servers running on Intel's x86 chips, which run both Linux and Windows. Software development around Itanium has also slowed down and Intel has not shared product road maps beyond an upcoming Itanium processor code-named Kittson, which has suffered setbacks.To read this article in full or to leave a comment, please click here READ MORE

Why there's no open-source standard-bearer for the network

Open-source software plays an increasingly prominent role in many areas of modern business IT – it's in servers, databases and even the cloud. Vendors like Red Hat, Canonical and others have managed to graft open-source principles onto a profitable business model. The former company became the first open-source-centered business with $1 billion in annual revenue in 2012.So what about the network? Why isn't there an open-source alternative there?Plenty of reasons, according to experts, including the difficulty of challenging established incumbents, the dangers of getting eaten alive by a large customer and the sheer scale and complexity of managing a heterodox network in an orthodox way.To read this article in full or to leave a comment, please click here READ MORE

How to get the most out of your IT talent

As the spotlight on cost reduction has dimmed, IT has picked up plenty of new directives: to deliver business agility, drive innovation, and increase its value to the business, to name a few. Yet at the same time, IT remains responsible for all the tactical and operational activities it has always performed, such as keeping systems running, delivering new capabilities, and securing intellectual property and corporate data.For CIOs and IT leaders, the management challenge is how to help IT employees break the tactical habit and use their strategic skills more effectively. We asked for advice from three tech professionals with different perspectives on IT talent. Their expertise can help IT leaders who want their teams to work smarter and be more engaged. Some of the tactics can be adopted without a lot of investment, while others require outside help or more significant cultural overhauls.To read this article in full or to leave a comment, please click here READ MORE

Public cloud storage can be efficient, but the potential is still limited

Public cloud storage can be a cost efficient alternative to rolling your own, but observers warn that it isn't a cure all. Price is the lure. Even if you have room in your data center for expansion, in-house storage infrastructure won't ever be as cost-scalable as a public cloud option, says Forrester analyst Henry Baltazar. And cloud storage will always give you more agility, he says: Once you add storage capacity in your data center, it is likely yours for the life cycle of the equipment.To read this article in full or to leave a comment, please click here READ MORE

How to get more out of your virtualized and cloud environments

After Dammions Darden arrived as the new senior systems administrator for the city of Garland, Texas, he knew that the 50 to 60 physical hosts for this 234,000-person city outside of Dallas were not running nearly as efficiently as they could be. Some had excess capacity, others were running way too hot. Traditionally if apps are slow and virtual machines need more memory the easy answer is an unfortunate one: Throw more hardware at the problem. But Darden wasn't satisfied with that. While roaming the expo floor at VMworld two years ago he stumbled across VMTurbo, a company that specializes in analyzing virtual environments.To read this article in full or to leave a comment, please click here READ MORE

How UPS uses analytics to drive down costs (and no, it doesn't call it big data)

When you have an organization the size of UPS – with 99,000 vehicles and 424,000 employees – every single little bit of efficiency that can be squeezed out of daily operations translates into a big deal. UPS has been using analytics to do just that for a long time now, and keeps getting better and better at it. Network World Editor in Chief John Dix caught up with UPS Senior Director of Process Management Jack Levis for an update on their latest achievements. How does UPS use analytics to optimize its operations? Let me take you back 15 years ago and then work our way back to today, and then I'll give you a glimpse into the future. Also, to frame the discussion, let's think of analytics in three forms: descriptive analytics says, "Where am I today?"; predictive analytics says, "With my current trajectory, where will I be headed tomorrow?"; and then at the highest level you have prescriptive analytics, and that's where you say, "Where should I be?"To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: IBM

IBM SmartCloud iNotes Security

SmartCloud iNotes helps protect our customers' information through governance, tools, technology, techniques, and personnel, each of which we discuss in more detail in this white paper. Learn More>>

SLIDESHOWS

14 go-to tools for Mac sysadmins

Mac pro Gerard Allen shares his must-have sysadmin tools for enterprise Apple deployments.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Unreleased Sony movies leak after hack; Sony may suspect North Korea

2. Peeping into 73,000 unsecured security cameras thanks to default passwords

3. Competition in the container market has begun

4. The Linux holiday shopping guide

5. SDN tools increase WAN efficiency

6. How UPS uses analytics to drive down costs (and no, it doesn't call it big data)

7. The Linux desktop-a-week review: Android as a desktop environment

8. How to get the most out of your IT talent

9. Groupware hug: Lotus Notes turning 25

10. CuBox-i4Pro: A whole lotta Linux or Android for not a whole lotta cash

Follow Network World

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment