Tuesday, August 23, 2011

'Year of the Cache' at Flash Memory Summit

Health insurer encrypts all stored data | First look: VMware vSphere 5 looms large

Network World Storage

Forward this to a Friend >>>


Flash Memory Summit 2011 called 'Year of the Cache'
Starting with the announcement the prior week by STEC of its new Kronos PCIe Solid State Drive and EnhanceIO caching software and on the same day the announcement Fusion-IO's acquisition of caching software provider IOTurbine, the Flash Memory Summit last week was already buzzing with cache software discussion on its opening day. Read More


WHITE PAPER: Akamai Technologies, Inc.

Taming the Cloud
This whitepaper explores the components of the cloud computing ecosystem, demonstrates how Akamai is delivering services for cloud optimization, and looks forward into the evolution of this dynamic and growing market. Read now

WHITE PAPER: Quantum

Data Deduplication for Dummies
What does data deduplication really mean? This 2nd edition of the book "Data Deduplication for Dummies" takes an in-depth look of the advantages of data deduplication. Learn exactly how data deduplication works, the pros and cons of various approaches, determining the right data deduplication ratio and answers to the most common dedupe questions. Read More

Health insurer encrypts all stored data
BlueCross BlueShield of Tennessee, responding to the theft of 57 hard drives in 2009, has completed a $6 million project to encrypt all of its stored data. Read More

First look: VMware vSphere 5 looms large
Automated host deployment, revamped HA, large-scale VM support, and storage automation features rev up vSphere for big shops. Read More

Dell unveils next-gen EqualLogic arrays
Dell announced new versions of its midrange EqualLogic SAN arras, the PS4100 and PS6100, which are now qualified with VMware's vSphere v5.0 and offer the use of 2.5-in drives and solid state drives. Read More


WHITE PAPER: Kaseya

How to Launch a Successful IT Automation Initiative
In this paper, we'll look at IT automation from the corporation's perspective, and discuss the steps organizations should take before launching such an initiative. We'll hear from companies that successfully implemented computer automation platforms, what their early steps were and what they would do differently if they could repeat the process. Read now

Big businesses take a small bite of the Apple
On the surface, USAA looks like a prime example of how Apple is making new inroads into large enterprises. The financial services company has deployed more than 500 iPhones and 300 iPads, has about 200 Macintosh computers, and it's considering bringing in more Macs to displace some of its Windows desktops. Read More

Thunderbolt accessories strike
Storage, video editing and other peripherals exploiting Intel's new high-speed Thunderbolt connection have started to emerge, initially for use with Apple products Read More

MP3tunes wins some, loses some in EMI suit
In a decision that has implications for online locker services, a federal judge in New York gave on Monday a partial victory to MP3tunes, a company that runs an online music storage service. Read More


WHITE PAPER: CA Technologies

Three steps to agile change
Comprehensive IT change configuration and release management (CCRM) continues to confound and frustrate both IT and the business units for which it provides services. But by first instituting the appropriate foundational processes and supporting tools, many enterprises are experiencing renewed CCRM success. Read Now

Cisco announces plan to buy Axioss management software
Cisco Systems has agreed to acquire service fulfillment software assets from the UK subsidiary of Comptel, in an effort to help operators speed up the launch of new services, the networking company says. Read More

The real 'investment protection' story of the Cisco 6500
Cisco recently announced the Supervisor 2T, extending the lifespan of the much loved platform. This continues Cisco's marketing message of investment protection around the 6500. The problem is, that the 'investment protection' story told here is simply false. Read More

AT&T expands its mobile app services
AT&T has expanded its mobile application services for businesses, offering up a fully-managed service for building apps on various mobile platforms and storage of the apps in AT&T's cloud. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

Tips and tricks for protecting Android devices
Android doesn't rival BlackBerry when it comes to security and enterprise support. But Android devices can still be reasonably secure. Here are some tips to help you protect your investment, privacy, and data.

MOST-READ STORIES

  1. HP's webOS crashes under Apple, Android pressure
  2. Torvalds says, "Virtualization is evil"
  3. Linus Torvalds: ARM has a lot to learn from the PC
  4. With SSL, who can you really trust?
  5. The collar bomber's explosive tech gaffe
  6. HP PC spin-off puts pressure on Microsoft to nail Windows 8
  7. HP plans PC spinoff, $10 billion Autonomy buy
  8. HP kills tablets, confirms PC spin-off plans
  9. Dropbox cloud was a haven for data thieves, researchers say
  10. NSTIC director: 'We're trying to get rid of passwords'

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_storage_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment