Tuesday, August 02, 2011

Oracle announces expansion rack for Exadata

Symantec releases next-gen email archiving software | Who's stealing your data?

Network World Storage

Forward this to a Friend >>>


Oracle announces expansion rack for Exadata
Oracle recently announced the Oracle Exadata Storage Expansion Rack, a monster storage device for supporting its Oracle Exadata Database Machine. The rack allows storing of structured and unstructured data, backups of Oracle Exadata Database Machine, weblogs and historical relational data. Read More


WHITE PAPER: Kaseya

How to Launch a Successful IT Automation Initiative
In this paper, we'll look at IT automation from the corporation's perspective, and discuss the steps organizations should take before launching such an initiative. We'll hear from companies that successfully implemented computer automation platforms, what their early steps were and what they would do differently if they could repeat the process. Read now

WHITE PAPER: CA Technologies

Three steps to agile change
Comprehensive IT change configuration and release management (CCRM) continues to confound and frustrate both IT and the business units for which it provides services. But by first instituting the appropriate foundational processes and supporting tools, many enterprises are experiencing renewed CCRM success. Read Now

Symantec releases next-gen email archiving software
Symantec today unveiled the latest version of its email archiving software, which can now automatically classify email and assign it to the appropriate tier of storage. Read More

Who's stealing your data?
In a number of recent newsletters we've looked at spear-phishing and how it can make your employees, customers, clients and users into unwitting dupes of the crackers and malfeasants who are trying to steal the "family jewels" of your organization. Just ask the folks at RSA (who insist that they are the "security division" of EMC). Read More


WHITE PAPER: Citrix Systems

Case study: Getting started with desktop virtualization
The promise of virtualized desktops is widely recognized and desktop virtualization is topping most IT departments' priority lists. But while the "why" of desktop virtualization is clear, it's the "how" that is most challenging. Follow one customer's journey to a more agile and secure business environment. Learn more.>>

Dell warranties servers for 'fresh-air cooling'
Dell said Thursday it will warranty servers to run at 113 degrees Fahrenheit (40 degrees Celsius) for parts of the year, so that customers can make wider use of "fresh-air cooling" in their data centers. Read More

A10 countersues Brocade over patents
A10 Networks said it is countersuing Brocade for patent infringement and seeking to bar sales of its competitor's products in response to a motion filed this week by Brocade to bar sales of A10 products. Read More


WHITE PAPER: F5 Networks

Magic Quadrant for Application Delivery Controllers, 2010
The market for ADCs is consolidating. However, innovation continues, especially among some select smaller players. Although there are clear leaders in the ADC market, enterprises should focus their buying decisions on a vendor's ability to support specific application requirements. Learn more!

ENIAC Still Influencing Enterprise IT 68 Years Later
Sixty-eight years ago this month, construction began quietly on ENIAC, the first electronic computer that was built for the U.S. Army to speed up the calculation of ordnance trajectories for soldiers in wartime. Read More

Fake Apple Stores?
If the retail outlet says "Apple Stoer," it probably isn't run by Apple. Read More

Skype for iPad finally arrives, then quickly disappears
Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

The Geekiest iPad Apps Ever
We scoured the App Store to find the "geekiest" apps out there for the true purveyor of all things geek.

MOST-READ STORIES

  1. 10 technologies that will change the world in the next 10 years
  2. 'War texting' lets hackers unlock car doors via SMS
  3. iPhone 5 rumor roll-up for the week ending July 29
  4. Why I was banned on Google+ (and how I redeemed myself)
  5. E-commerce sites based on open source code under attack
  6. Say what? GNU Emacs violate the GPL
  7. How to survive Black Hat and Defcon without getting hacked
  8. Black Hat roundup: Let the electric-shock craziness begin
  9. Happy SysAdmin Day. Are you feeling thankful?
  10. New cases suggest iPhone 5 will be thinner, wider and longer than iPhone 4

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_storage_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment