Thursday, October 31, 2013

Microsoft's Windows Azure cloud hit by worldwide management interruption

Outlook.com calendar maintenance enters its second week | Baidu's profit flat on growing investments in mobile

ITworld Enterprise Networking

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


Microsoft's Windows Azure cloud hit by worldwide management interruption
Microsoft's Windows Azure suffered from an issue on Wednesday that affected a management feature in the compute section of the public cloud, and remained unsolved Thursday morning. Read More


WEBCAST: HP

HP Webcast: Mobile Application Development
More than 50% of custom mobile apps have been deployed by business units without IT oversight. The results of this Mobile App Development Survey highlight the responses of 208 IT leaders surveyed by IDC. Hear how your peers are grappling with app testing processes, cross-platform development approaches, performance and security concerns. View Now

WEBCAST: BMC Software

Be Ready for Big Data
Big Data Analytics has become synonymous with Hadoop. As with any new technology, there is many times a lack of expertise – and at a minimum a learning curve. Learn about the choices you have for implementing a Big Data environment. Metascale, a Big Data service provider, manages all of Sears Big Data processing along with other companies. View Now

Outlook.com calendar maintenance enters its second week
Maintenance work on Outlook.com's calendar application is now in its second week, and the lengthy, ongoing tune-up could be causing problems for users. Read More

Baidu's profit flat on growing investments in mobile
Chinese search giant Baidu's profit was flat in the third quarter because of expenses on marketing its mobile services and investing in research. Read More

Windows Phone 8.0 smartphones may not be upgradeable to 8.1
Nokia issues differing statements, while Microsoft is mum on device upgrade question. Read More


WHITE PAPER: VMware

The Clear Path to Cloud Security, Compliance, & Cost Control
Both customers and IT decision makers are concerned about cloud security, according to recent research. How can you negotiate this barrier to realize the benefits of cloud computing? Read this paper to learn about the techniques, tools, and technologies that will enable you to capitalize on the cloud safely and cost-effectively. Read Now

HHS head says she's responsible for troubled HealthCare.gov
Security problems reported at the U.S. government's troubled HealthCare.gov are overblown because security testing has been ongoing for months, the secretary of the U.S. Department of Health and Human Services said Wednesday. Read More

Cloud-based SMB network startup adds app store for services
Startup Pertino plans to flesh out its cloud-based network service with additional services such as security and deep-packet inspection, which it will sell through an online app store. Read More

Safari 7 review: Mavericks browser saves battery life, brings further refinements
The new OS X Mavericks seems to offer far better performance and power management--but its programs often pack fewer features and less elegant interfaces. The same holds true on both counts for Safari 7. It's as fast as its predecessor in rendering HTML, and far zippier with Javascript, but the changes to its look and feel aren't all improvements. Read More

Sophos takes first step in rolling out cloud security strategy
Sophos today leapt forward with a cloud strategy under which it will deliver integrated management and policy enforcement for its endpoint security software and unified threat management (UTM) firewall through a cloud-based console for both its enterprise customers and industry partners. Read More


BOOK GIVEAWAY:

The drawings end October 31. Enter now for your chance to win one of these two new books!

The Official Ubuntu Server Book, 3rd Ed.
Written by leading members of the Ubuntu community, The Official Ubuntu Server Book, Third Edition, covers all you need to know to make the most of Ubuntu Server, whether you're a beginner or a battle-hardened senior systems administrator.

The Practice of Network Security Monitoring
Learn how to deploy, build, and run a network security monitoring (NSM) operation using open source software and vendor-neutral tools.

DON'T MISS...

Arg! The 9 hardest things programmers have to do

7 tools that help protect you against the NSA and Google

Obsolete! Careers that are being automated into oblivion

15 geeky places to visit before you die

13 unsung women of technology


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_enterprise_networking as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.