Posts

Showing posts from November 8, 2009

finally, 3Com acquired by HP -- who's next?

I received this email below:
To all 3Com Partners,As a valued member of our 3Com Focus Partner Program, I wanted to share
with you some exciting news that I believe will help generate even more
momentum for our joint efforts in selling to enterprise accounts. Together,
we've set our sights on disrupting the networking market with our
"China Out" strategy by leveraging our market leadership in China to offer
customers a best-in-class price/performance advantage with a lower TCO,
a broad, modern product portfolio and a new level of customer
relationships.Yesterday on November 11, 2009, we announced our plans to accelerate our
strategy by signing a definitive agreement to be acquired by HP. This is an
exciting opportunity to form a powerhouse that will disrupt the industry by
offering customers an unprecedented option for data center and network
infrastructure solutions. Never before has there been a networking company
with such a broad and modern, open standards-based product portfolio…

HP's buyout of 3Com continues IT convergence push

By Mark Fontecchio, News Writer
12 Nov 2009 | SearchDataCenter.com

IT infrastructure news
Digg This! StumbleUpon Toolbar StumbleUpon Bookmark with Delicious Del.icio.us Add to Google

IT pros say Hewlett-Packard Co.'s surprise decision to buy networking company 3Com continues vendor consolidation in the IT industry, which may be a good--and a bad--thing.


It could provide economies of scale and greater integration of IT gear but also consolidates more IT firepower in fewer vendor hands and that may not be advantageous for IT customers.

"I suppose there are a couple ways to look at mergers like these," said Clive Greenall, IT facilities manager at the Standard Bank of South Africa. "The companies are consolidating skills under one roof, which may be a good thing if you're looking for a one-stop solution, and presumably they'll keep the best skills from the consolidation.

"The other side of the coin could be price fixing as a result of less competition, c…

Sudah coba XenServer Citrix ??

XenServer HighlightsTransform your datacenter into a more dynamic server workload delivery center – free – with Citrix XenServer.• XenServer is based on Xen® – the open source hypervisor that’s supported by Intel, AMD, HP and more than forty other organizations.• XenServer is easy to deploy, and its wizard-based controls and advanced capabilities mean more servers per administrator and zero-downtime for upgrades.• XenMotion enables the live migration of any type of workload to any server with zero downtime and maximum resource utilization.• XenServer is ideal for I/O intensive workloads like Citrix XenApp™, Microsoft SQL Server and Microsoft Exchange.
Citrix Essentials HighlightsWith XenServer, you get unmatched enterprise-class features – for free. And when you’re ready for advanced virtualization management, just add Citrix Essentials for XenServer. By doing so, you’ll benefit from:• Automated lab management streamlines the process of building, testing, sharing and delivering througho…

Defining an Enterprise Security Strategy (ctoEdge)

Defining an Enterprise Security Strategy
Security | How-To | Shaun Hummel, Saturday, October 17, 2009
Tags: anti-virus solutions, Authentication Systems, Cisco Systems, Cybercrime, IBM, Intrusion-Prevention Systems, network security, security policy, usage management and monitoring, VPN, Vulnerability Assessment

There are five primary security groups that should be considered with any enterprise security model. These include security policy, perimeter, network, transaction and monitoring security. These are all part of any effective company security strategy.
Any enterprise network has a perimeter that represents all equipment and circuits that connect to external networks, both public and private. The internal network is comprised of all the servers, applications, data, and devices used for company operations. The demilitarized zone (DMZ) represents a location between the internal network and the perimeter comprised of firewalls and public servers. It allows some access for external user…

Defining an Enterprise Security Strategy (ctoEdge)

Defining an Enterprise Security Strategy (ctoEdge)