Here's how WAN optimization appliances and app delivery controllers can deliver what you need. Find out about that and more in Network Computing's first digital issue, part of InformationWeek's Green Initiative to reduce our carbon footprint.
This issue sponsored by Citrix:
Latest Resources from the Desktop Virtualization Center:
- Three Easy Steps to a Better Desktop
- Desktop Virtualization: Overcome Five Real-World Challenges
- Top Three IT Moves in '09: Reduce IT Costs
- Your Desktop: Reimagined http://tinyurl.com/car73o
Best Practices for Disaster Recovery and Continuity
Do you know how to plan, implement and execute a quick recovery strategy for local accidents and natural disasters? Read more about what you need to think about and the services and resources you'll need to put into place to ensure your company's survival. Download Now
Combining Deduplication and VMWare Disaster Recovery
Cost savings created by using deduplication can make DR feasible in situations in which it may have otherwise been cost prohibitive. Learn what it takes to implement deduplication with VMware DR and how to leverage the replicated data in your DR environment for DR testing and other purposes. Get the white paper today. Download Now
FEATURED BLOG BlackHat, Kinda: 'Real' Black Hats Hack Security Experts Posted by Sara Peters On Tuesday a hacking group released details of a number of successful attacks they conducted, apparently with the principal purpose of embarrassing some of the security industry's most well-known experts. The group claims that they collected about 75,000 passwords, including those of a few security experts speaking at the BlackHat Briefings Wednesday and Thursday.
The Top 50 Global Enterprise App Vendors Posted by Bob Evans Quick: in 2008, in the category of global enterprise apps, whose revenue was almost twice that of its rival's - SAP or Oracle? And if I offered to bet you a year's salary that Sage Group generated more revenue from global enterprise apps than did Microsoft and Salesforce.com combined in 2008, would you take the bet? AMR's list of the Top 50 app vendors offers the answers.
Veiled: A Browser-based Darknet - Not for Porn, Says HP Posted By Adam Ely
For those living in a box, Black Hat is currently underway in Las Vegas. The first talk of the day I attended was by Bill Hoffman and Matt Wood from HP's Security Labs. They discussed their browser-based darknet called Veiled. Billy is best known for his web security research while working for SPI Dynamics, acquired by HP, and authoring a book on AJAX security. Matt leads development on HP's Scwaler and SWFScan security tools.
Android Finally Getting Facebook App: Report Posted By Eric Zeman
One of the things Google talked about recently was the need to make its Android mobile operating system more social. It looks like Android is about to take its first step in the "more social" direction with the arrival of a dedicated Facebook app.
Black Hat Podcast: Popularity of Social Nets Puts Spotlight On Dangers Of Cross-Site Request Forgeries Posted By David Berlind
Today is the first day of the infamous Black Hat Briefings taking place at the Black Hat Conference in Las Vegas and most of what the attendees will hear today is being presented publicly for the first time by the various researchers in the building. Today, for example, is the day that many researchers reveal their discoveries and exploits but in some cases, they hold back on the tools or details needed to replicate their research until the impacted vendors and organizations have an opportunity to address the vulnerabilities. Case in point: a team of researchers used NewsWeek.com as an example of a site that's vulnerable to dynamic cross site request forgeries.
SaaS Under A Cloud Of FUD Posted By Michael Hickins
Cloud computing is still a long way from becoming a mainstream technology because of persistent fears about security and reliability that are stoked by entrenched vendors at every opportunity.
VoiceCon San Francisco
IP telephony is being integrated with a new generation of unified communications technologies, services, and applications that will transform how your enterprise does business. Only VoiceCon will help you create the road map for migrating to the next plateau and help you maximize your investment in enterprise communications. Registration is now open for the leading enterprise communications event.
More Info And Registration
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.