Thursday, July 11, 2013

EMC battles rogue backups

New disaster recovery pricing system bases charges on how much data is recovered, not backed up | MSFT to developers: Fix Windows app security flaws in 180 days or be kicked from stores

Network World Network Architecture

Forward this to a Friend >>>


EMC battles rogue backups
With a new set of hardware and software releases, EMC is promising to simplify its customers' storage infrastructure by combining different types of operation into a single EMC system. Read More


WHITE PAPER: Salesforce.com

Meet Customers Where They Are eBook
Choose the customer service technologies that are ideal for your company in order to enable customer service through online and offline touch points, establish smart listening, engage your community, and consistently respond to customer issues. Read now

WEBCAST: Sprint

The Network Foundation of an IT-to-ET Transformation
There's an evolutionary process at work that will eventually affect every enterprise IT department. Nemertes Research describes it as a transformation from IT to ET – Enterprise Technology. Learn More

New disaster recovery pricing system bases charges on how much data is recovered, not backed up
There's a dirty little secret in the disaster recovery industry, according to Dave Simpson, who tracks the storage market for the 451 Research Group. Usually, customers require less recovery than industry vendors make them believe, he says. But vendors charge customers based on how much data they back up, when in reality it's rare for an organization to require a complete recovery of all its backed up data. Read More

MSFT to developers: Fix Windows app security flaws in 180 days or be kicked from stores
App developers have no more than 180 days to fix security flaws or Microsoft will kick the vulnerable app from the Windows Store, Windows Phone Store, Office Store, and Azure Marketplace. Microsoft's new security policy for apps states: Read More


WHITE PAPER: Sophos, Inc.

Network protection and UTM Buyers Guide
This buyers guide is designed to help you choose the right solution for your organization. It looks at the factors you should consider when evaluating solutions to ensure you have the protection and functionality you need, both now and as your business evolves. View Now

Hitachi Unified Compute Platform
ESG has been tracking, researching, and speaking with numerous IT customers and vendors about the transition in consumption model from DIY (do-it-yourself) to turnkey approach to infrastructure procurement. The benefits are hard to ignore and the advantages ultimately boil down to a smarter and better way to do IT. Read More

Agency destroys $170K worth of IT gear over non-existent malware threat
The U.S. Department of Commerce's Economic Development Administration (EDA) destroyed about $170,000 worth of IT equipment including computers, printers, keyboards and computer mice last year on the mistaken belief that the systems were irreparably compromised by malware. Read More


WEBCAST: IBM

Becoming An Analytics Driven Organization
Join us on Tuesday, June 18, 2013, 11:00 AM EDT and learn how your agency can create an analytics culture that will enable you to improve budgeting and financial reporting. Learn More. Learn More.

BYOD breeds distrust between workers and IT
Nearly a third of U.S. workers distrust company software on their mobile devices Read More

Hitachi brings high-end flash to midrange HUS VM storage line
Enterprises are gaining the ability to turn existing storage platforms over to flash even as solid-state media remains mostly a tool for caching and for applications with special requirements. Read More

10 Hot Security Startups to Watch
Tablets and smartphones, which employees are bringing into work in "Bring Your Own Device" (BYOD) style, are leading IT managers to ask security questions, starting with whether they should sort out corporate mobile apps and data from personal ones. It's all encouraged a spate of security start-ups to come up with their own answers, and highlighted here are a few that have recently hung out a shingle for mobile security. But it's not just mobile spurring the creation of young security firms out to change the world. Read More


SLIDESHOWS

6 rising open source stars

Names you'll want to know in the free software/open-source world.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 6 highest/lowest paid IT jobs

2. Best college tech majors for landing a top starting salary

3. How to solve Windows 8 crashes in less than a minute

4. Cisco impresses with first crack at next-gen firewall

5. 8 hot mobile startups to watch

6. 10 biggest home networking mistakes (and how to fix them)

7. Meet the next open-source stars

8. The worst cloud outages of 2013 (so far)

9. The biggest security snafus of 2013

10. A look at 22 Linux Foundation newbies


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_architecture_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: