Tuesday, June 17, 2014

SanDisk to buy enterprise flash storage specialist Fusion-io for $1.1 billion

  Box just bought real-world equivalent of Pied Piper | Hacked Synology NAS systems used in high-profit cryptocurrency mining operation

  Network World Storage

Forward this to a Friend >>>

SanDisk to buy enterprise flash storage specialist Fusion-io for $1.1 billion
SanDisk is looking to shore up its position in the enterprise flash storage market by purchasing Fusion-io for US$1.1 billion in an all-cash deal.The acquisition, which was announced Monday, is expected to close in SanDisk's third fiscal quarter."Fusion-io will accelerate our efforts to enable the flash-transformed data center, helping companies better manage increasingly heavy data workloads at a lower total cost of ownership," SanDisk CEO Sanjay Mehrotra said in a statement.+ ALSO ON NETWORK WORLD Top tech M&As of 2014 +To read this article in full or to leave a comment, please click here Read More


Need to justify a storage refresh? Get SMART, get started.
Storage modernization unlocks the full potential of your data center. It increases capacity, boosts performance, and reduces costs per gigabyte. Take an educated look at storage with our three-level S.M.A.R.T. methodology. Learn how to create a cost effective model with unrivaled flexibility with our Storage Modernization and Refresh Toolkit. Click to continue

IT Friction and Your Organization
This report outlines key issues that cause friction between business users and IT. Learn More

Box just bought real-world equivalent of Pied Piper
Cloud storage provider Box announced today that it has acquired Streem, a small startup with some impressive technology in that area, for an undisclosed fee. Streem's technology is designed to make the personal cloud as seamless as possible – Streem embeds itself in the local operating system, allowing the cloud storage to function as an extension of the existing hard drive, and uses secret sauce to speed up media playback. +ALSO ON NETWORK WORLD: Level 3 buying TW Telecom for $5.7 billion to upgrade metro coverage | Waratek tackles Java application security +To read this article in full or to leave a comment, please click here Read More


Who does NSS Labs "Recommend" for NGFW?
In 2012, NSS Labs found that most available NGFW solutions "fell short in performance and security effectiveness." In 2013 NSS Labs noted "marked improvement" and bestowed their "recommended" rating on 6 vendors. Click here to find out who they were. Learn more >>

Hacked Synology NAS systems used in high-profit cryptocurrency mining operation
A hacker exploited publicly known vulnerabilities to install malware on network-attached storage systems manufactured by Synology and used their computing power to generate Dogecoins, a type of cryptocurrency.The operation took place during the first months of the year and is likely the most profitable of its kind to date, earning the attacker over US$600,000 according to a recent analysis by researchers from Dell SecureWorks.Using CPUs and GPUs to solve cryptographic problems as part of cryptocurrency systems is an activity referred to as mining. Those who perform it—typically using their own systems—are automatically rewarded by the system with units or subunits of that respective currency.To read this article in full or to leave a comment, please click here Read More


Analytics in the Hands of Everyone Who Needs It
Right-sized for individuals, workgroups or enterprises, each Cognos family member offers BI and performance management to address your company's needs. Read Now

How to maximize storage space on your Windows tablet
One of the unfortunate hallmarks of affordable Windows-based tablets is limited storage space. It is not uncommon for low-priced tablets to come with only 32GB or 64GB drives.A large chunk of that space is taken up by the Windows operating system and any preinstalled applications. Luckily, there are plenty of things you can do to rid Windows tablets of unneeded data to stretch that storage space as far as possible.Delete Temp File and Prefetch Data Windows accumulates temporary and cache files like it's in an episode of Hoarders, filling your limited storage with old items you probably don't need. Performing a disk cleanup will delete a good chunk of the junk data stored in the Windows temp folder. To get rid of it all though, you'll have to delete it manually.To read this article in full or to leave a comment, please click here Read More

Amazon AWS continues to use TrueCrypt despite project's demise
TrueCrypt remains the only option for securely importing and exporting data to and from the Amazon Simple Storage Service (S3) two weeks after the popular encryption software was abruptly discontinued by its creators, supposedly for security reasons. According to Amazon Web Services (AWS) online documentation, "TrueCrypt is the only device encryption supported by AWS Import/Export." On a separate page about AWS security, Amazon says that: "AWS only ships devices out of AWS facilities if the device is completely erased or the device only contains data encrypted by AWS. For import jobs, we erase devices after job completion. For export jobs, we will always encrypt the data being exported onto the device. We use TrueCrypt software for encryption."To read this article in full or to leave a comment, please click here Read More

The SAN is dead! Long live the storage fabric!
Prior to my days as an analyst I spent many years toiling away in corporate IT. The area within IT that I had the most interest and passion in was the network. It's a little like when Spock said to Captain Kirk that "commanding a starship was his first, best destiny." Sure, Kirk might go and try being a diplomat, but at the end of the day he finds his way back to the bridge. Similarly, I might go dabble with servers, applications or other areas, but I always looked at things through the network lens. Sometimes that's helpful, like when yanking out that old, legacy PBX in favor of a VoIP system is a no-brainer. However, sometimes the networking thought process could make you look for problems that aren't there.To read this article in full or to leave a comment, please click here Read More



Network World's 2014 State of the Network survey

Exclusive research from Network World shows that cloud and mobility are gaining in importance.


As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn


1. Need to move to IPv6 highlighted as Microsoft runs out of US address space

2. What Is Going Wrong With BYOD?

3. iPhone 6 rumor rollup for the week ending June 13

4. Chambers to retire this fall?

5. Behind the Great Firewall: What it's really like to log on from China

6. Comcast's latest bad idea turns your Wi-Fi into everybody's Wi-Fi

7. The 12 biggest gaffes by high-tech execs

8. What's the best approach to building next-generation data center networks?

9. Meru's new WLAN controller is perfect for SMBs

10. You won't believe what programming language this Wall Street firm uses


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_storage_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: