If you have trouble viewing this email, read the online version. |
|
Friday, May 25, 2012 |
TOP STORY All-Flash Systems Vs. SSD Appliances By George Crump EMC World draws attention to the many solid-state disk deployment options available. MUST READ Ciena's Virtual WANs Offer Bandwidth For Cloud Apps Ciena at EMC World 2012 demonstrates simulated hybrid cloud designed to provide bandwidth-on-demand services for data-intensive cloud applications. EMC Partners Ride Upgrade Cycle VCE, Infineta, and Vello Systems use EMC World 2012 to highlight their efforts to augment and enhance EMC's product lines. Facebook's Tech-Snarled IPO: What We Know Four lawsuits have arisen following Facebook's troubled initial public offering. NASDAQ's trading systems are not the first to suffer IPO day technical woes. VMware Buys Wanova: Watch Out, Citrix VMware makes another move indicating it intends to catch up to Citrix in the desktop virtualization market. Wanova's technology brings VMware a number of advantages. VMware Claims It's Cheaper Than Microsoft VMware-commissioned study claims advanced management capabilities make VMware less expensive than Microsoft virtualization products when you factor in admin time. But beware the red flags. EMC World: Storage News Wrap-Up EMC announces upgrades to Symmetrix VMAX, VNX, Isilon, Data Domain, Isilon storage arrays and appliances, and new management software at EMC World 2012. |
|
DOWNLOAD INFORMATIONWEEK HEALTHCARE'S MAY 21 DIGITAL ISSUE Get the new, all-digital issue of InformationWeek Healthcare featuring the InformationWeek Healthcare CIO 25. It's our second annual honor roll of the health IT leaders driving healthcare's transformation. ALSO THIS ISSUE: EHR Unreadiness; Implanted UIs DOWNLOAD NOW FREE (Registration Required) |
| FEATURED WHITEPAPERS Seven Steps for Building Security in the Cloud from the Ground Up If you are considering a leap to the cloud, you are no doubt figuring out how to extend security to the new environment. Despite potential savings, security is still the number one barrier. Download this white paper to review seven steps to help you build security into your cloud applications. DOWNLOAD NOW (REGISTRATION REQUIRED) MORE WHITEPAPERS |
MOST POPULAR STORIES
Military Transformers: 20 Innovative Defense Technologies
Department of Defense technologies under development, from brainy microchips to battlefield transformer vehicles, promise to make the U.S. military more nimble. Here's a visual tour of 20 breakthrough ideas.
10 Wearable Devices To Keep Patients Healthy
Wearable devices equipped with sensors, Web connections, or both, help consumers and healthcare providers track health and fitness. Take a look at what's possible now.
10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.
Why Google's Nexus Plan Makes Sense
Google is preparing to revamp how "pure Android" smartphones are sold in a move that will surely appeal to diehard Android users.
Google Drive: 10 Alternatives To See
Dropbox, Box, iCloud, and now, Google Drive, have the most familiar names. But many alternative services satisfy a variety of storage, backup, and file-sharing needs.
Military Transformers: 20 Innovative Defense Technologies
Department of Defense technologies under development, from brainy microchips to battlefield transformer vehicles, promise to make the U.S. military more nimble. Here's a visual tour of 20 breakthrough ideas.
10 Wearable Devices To Keep Patients Healthy
Wearable devices equipped with sensors, Web connections, or both, help consumers and healthcare providers track health and fitness. Take a look at what's possible now.
10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.
Why Google's Nexus Plan Makes Sense
Google is preparing to revamp how "pure Android" smartphones are sold in a move that will surely appeal to diehard Android users.
Google Drive: 10 Alternatives To See
Dropbox, Box, iCloud, and now, Google Drive, have the most familiar names. But many alternative services satisfy a variety of storage, backup, and file-sharing needs.
No comments:
Post a Comment