Search This Blog

Wednesday, December 19, 2012

10 technologies that disappointed in 2012

  Citrix: What kind of company is it anyway? | Prediction time: 2013 will not be the year of SDN
 
  Network World Network/Systems Management

Forward this to a Friend >>>


10 technologies that disappointed in 2012
Sure, 2012 saw its share of innovation and technological breakthroughs. But not every technology or product lives up to the hype they generate when they're first announced. Here are 10 technologies that fell short of expectations in 2012. Read More


WHITE PAPER: Coyote Point

MS Exchange Deployment Guide
This Deployment Guide provides detailed instruction for running Exchange 2010 with Coyote Point's Equalizer®, a qualified hardware vendor for load balancing Exchange Server 2010 View Now

WHITE PAPER: HP

Extend the Life of Your Storage
Leveraging deduplication in backup environments yields significant advantages. The cost savings in reducing disk capacity requirements change the economics of disk-based backup. Read Now!

INSIDER
Citrix: What kind of company is it anyway?
Citrix is many different things to many people. It's a cloud company, it's a virtualization player, it's a mobile technologies vendor and it's a collaboration products provider. But according to Mark Templeton, Citrix CEO since 2001, all of that blends together and fits with where enterprise IT shops are headed. Here, speaking with IDG Enterprise Chief Content Officer John Gallant, Templeton dishes on Citrix's overall strategy, its relationships with Cisco, Microsoft and Apple, its rivalry with VMware, and its controversial take on open source cloud computing. Read More

Prediction time: 2013 will not be the year of SDN
Well, it's hard to believe but the year is almost up and there are only a mere couple of weeks until we ring in the New Year. So that makes it prediction time for us industry analysts and I'd like to share mine with you. So, drum roll please… Read More

Fiscal cliff or not, it's already rough for federal IT vendors
If Congress doesn't avert the fiscal impasse, automatic budget cuts could reduce federal IT spending by $66 billion in the fiscal year that began Oct. 1, according to an analysis by the industry group CompTIA. Read More


WHITE PAPER: Quest Software

The Right Way to Prove Identity and Establish Trust
Right now, someone's logging into your network and accessing proprietary data. Do you know who it is? Ensuring the identity of the person(s) trying to access your network is harder than ever. This Quest technical brief explains why two-factor authentication is superior to password authentication. Read Now!

Holiday cooking brings major traffic spike to Allrecipes.com
It's the busy time of year for Allrecipes.com, which gets 700 million visitors annually, and to accommodate the surge of recipe-seekers, it's necessary to cook up some serious network changes in the data center. Read More

Dell buying data-protection vendor Credant
Dell has made a deal to acquire data-protection vendor Credant Technologies and plans to add the company's technology to its enterprise IT security offerings. Read More

10 of the most useful cloud databases
Big data is becoming a big deal and cloud providers want to be the place where enterprises databases live. Read More


WEBCAST: Ipswitch, Inc

Establishing an IT Infrastructure Baseline
In today's dynamic environment how do you: • Keep track of what's on your network, how it's all connected and the dependencies between devices? • Quickly isolate and resolve availability and performance problems? • Assess the impact of changes to network designs and device configurations? • Assess the impact of changes in network traffic? Register now.

Amazon allows users to spread workloads more broadly now
Amazon Web Services announced a new feature that allows users to replicate block storage volumes across regions of the world, which will make it easier for systems to stay up in case of a cloud outage. Read More

5 tips to retain great security talent
You want the best on your security team. And once you've got them, you want to keep them happy and keep them in your organization. Read More

Kaiser plans to hire 500 for new IT center in Colorado
Health care provider Kaiser Permanente has begun hiring about 500 IT professionals to staff its new information technology campus in Englewood, Colo. Read More

Executive management is becoming more engaged in information security
Dealing with business and executive managers has been a persistent occupational hazard for security professionals. Business managers didn't want policy enforcement to get in the way of business productivity. CEOs and CFOs tended to eschew "good security" for "good enough security." The biggest role they played here was that of budget cutter. Read More

 
 
 

SLIDESHOWS

10 technologies that disappointed in 2012
Here are 10 technologies that fell short of expectations in 2012.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 16 of the most useful cloud management tools
  2. Blue Coat second company to buy Crossbeam Systems in recent weeks
  3. Ray Ozzie seeks encore to Lotus Notes, Microsoft triumphs
  4. How removing 386 support in Linux will destroy the world
  5. Microsoft's antivirus is a starting point, not the final stop
  6. iPhone 6 rumor rollup for the week ending Dec. 14
  7. IBM: In the next 5 years computers will learn, mimic the human senses
  8. Cisco reportedly shopping Linksys division
  9. Facebook vs. Fastbook: Developers offended by Zuckerberg knock on HTML5 make clone app
  10. Riverbed announces three releases for the Steelhead Mobile Controller appliance
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: