Tuesday, August 14, 2012

HP aims three-part effort at network virtualization

Flash storage can help some IT operations, despite cost | IBM claims spintronics memory breakthrough

Network World Storage

Forward this to a Friend >>>


HP aims three-part effort at network virtualization
Hewlett-Packard is readying three new software capabilities that are designed to help enterprises pool their computing and storage resources across a network. Read More


WHITE PAPER: Attachmate Luminet

The Cost of Insider Fraud and Abuse
Examine different types of insider abuse, such as fraud and privacy breaches, and their cost to businesses. We also briefly describe the basic requirements for effective insider abuse monitoring, such as the need to monitor multiple types of systems and correlate events across those systems. Learn More!

RESOURCE COMPLIMENTS OF: SolarWinds

Quickly Identify Misconfigured Active Directory Permissions
What users have access to sensitive files or directories? Find out without tedious manual effort. Troubleshoot permissions issues both locally and on remote shares with SolarWinds free tool, Permissions Analyzer for Active Directory. Easily see what permissions a user or group of users has for an object and why. Get a complete hierarchical view of the effective permission and access rights for a specific file folder or share drive today by downloading the free tool. Get Permissions Analyzer for Active Directory >>

Flash storage can help some IT operations, despite cost
A small but growing universe of enterprise IT shops are adopting -- or at least evaluating -- flash storage technology, and they're finding that it can be cost-effective in spite of its high price tag. Read More

IBM claims spintronics memory breakthrough
In a paper to be published in the scientific journal Nature this week, IBM researchers claim to have had a huge breakthrough in spintronics, a technology that could significantly boost capacity and lower power use over today's memory and storage devices. Read More


WHITE PAPER: Silver Peak Systems, Inc.

WAN Optimization eGuide
In this eGuide, articles from Network World examine the maturing WAN optimization market, collect advice from experts and users on how best to implement these products, and look at new trends. Read on to discover how to make the most of WAN optimization in enterprise networks. Read now.

Is Insieme inserting Cisco into storage?
Everyone outside of Cisco and Insieme is still speculating on what the Cisco spin-in is developing to augment its parent's programmable network strategy. Some of the speculation had Insieme building the next-generation Nexus boxes with programmable hooks to a Layer 4-7 controller... Read More

SSD array maker Nimble releases scale-out arrays
The new line of CS400 and ES-series arrays are being targeted at users running performance-intensive applications such as OLTP and VDI. Read More


WHITE PAPER: Blue Coat Systems

Optimize and Secure Cloud, SaaS, BYOD, and Social Media
Today's threat landscape has migrated to the web causing many security professionals to prevent direct Internet access at the branch. But with new cloud-based security solutions from Blue Coat you can re-architect your network to embrace the Internet – safely – and optimize application performance. Learn more.

25 Awesome Gadgets for $50 or Less
We scoured the Web for the best deals on 25 gadgets you might actually want to buy. All you have to do is sit back and click through the slideshow. Read More

United Airlines 'loses' 10-year-old girl, torments parents
Read More



SLIDESHOWS

9 ex-Googlers on the move
Former Google employees continue to make their mark on the tech world.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 9 'everything-as-a-service' (XaaS) companies to watch
  2. RTM builds of Windows 8 reveal Microsoft blocked any bypassing of the Metro desktop
  3. 25 essential business apps for Android
  4. Is EVERYTHING made in China?
  5. Swiss scientists develop algorithm to sniff out the source of malware and spam attacks
  6. iPhone 5 to come with much smaller 8-pin dock connector
  7. 10 trends driving big data in financial services
  8. WikiLeaks dumps Stratfor email dirt on TrapWire, a CIA-connected global spying system
  9. RTM builds of Windows 8 reveal Microsoft blocked any bypassing of the Metro desktop
  10. Cisco readying a new Nexus switch

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_storage_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: