Tuesday, February 24, 2015

IBM throws $1B at storage

  Apple plans two European data centers running on renewable energy | Has Equation Group hacked your hard drives? You won't be able to tell.

 
  Network World Storage  

IBM throws $1B at storage
IBM's at it again.This week IBM announced it would pump $1 billion into developing new storage technology. Does Big Blue throwing $1B at something sound familiar? That's because it is. Let's recap IBM's other billion dollar bets: 2013: IBM pledges $1 billion for Linux 2014: IBM commits $1 billion for PaaS 2015: z System Mainframe is result of $1B investment This week: devotes $1 billion for storage software IBM isn't alone either. Tech big-wigs love throwing making grandiose funding statements. We've seen HP and Cisco do it each with cloud computing, for example.To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: BMC Software
 
An Insightful Approach to Optimize Mainframe MLC Spend
This paper, "An Insightful Approach to Optimizing Mainframe MLC Costs," discusses how you can penetrate the complexity of IBM mainframe MLC products and the MLC price model to gain insight into the MLC cost drivers and leverage that insight to optimize MLC spend. Learn More

WHITE PAPER: BMC Software
 
10 Steps to Reduce Mainframe MLC Costs
Monthly license charges (MLC) are rising by 7% or more each year, and account for 30% of total mainframe costs. Yet managing MLC costs is an inexact science. Learn More

Apple plans two European data centers running on renewable energy
With data storage in the European Union, the company will not need to export data to the U.S. or other data protection regimes Read More
 

Has Equation Group hacked your hard drives? You won't be able to tell.
The Equation Group's ability to reprogram hard-drive firmware leaves corporate security pros unable to trust the devices because they can't tell whether disks have been compromised or not."Once the hard drive gets infected with this malicious payload, it's impossible to scan its firmware," says Igor Soumenkov, principal security researcher at Kaspersky Lab. "To put it simply: for most hard drives there are functions to write into the hardware firmware area, but there are no functions to read it back. It means that we are practically blind, and cannot detect hard drives that have been infected by this malware."Beyond that, the tampering Equation Group does with the firmware can survive reformatting the disk and reinstalling the operating system, giving it "extreme persistence," and providing invisible, persistent storage inside the hard drive, according to the Kaspersky report on the Equation Group.To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: NexGen Storage
 
Maximize Your Business Value with NexGen Architecture
Download now and learn how IT professionals can use NexGen storage architecture and software to simplify data priority assignment and management process. Learn More

How a university's data center overhaul makes a green impact
To say that University of Cambridge deployed disparate and diverse data storage and data center infrastructure would be a vast understatement. In a 2013 IT review, data center manager Ian Tasker and his team discovered almost 200 servers across the University's 120 departments. These installations ranged from single servers housed in closets to larger rooms containing 20 to 30 servers, but all contributing to a major drain on power and cooling resources, as well as creating one heck of a management headache."Our IT review is a periodic way for us to look at how we're carrying out the responsibilities of IT, and how to best align IT with the work of the university. What we found was everything was fragmented and each department was doing their own thing when it came to provisioning, storage and management. Where we had a small number of racks, they weren't powered or cooled efficiently, and that was our other mission: to reduce our carbon footprint as a university by about 34 percent by the year 2020," Tasker says.To read this article in full or to leave a comment, please click here Read More
 

IBM puts software and cloud at the center of storage
  The future of storage may not be in storage itself, but in the intelligence to manage it.Major storage vendors and startups alike are now pushing software-defined systems spanning anything from a set of arrays to a whole enterprise. On Tuesday, IBM placed a big bet on this trend, announcing the first product in a portfolio called IBM Spectrum Storage and saying it will invest $1 billion in storage software over the next five years.The strategy will see IBM offer its traditional storage systems in software form so customers can choose to buy them as appliance, software or service. The first Spectrum Storage product out of the gate is IBM Spectrum Accelerate, software that's based on the company's own XIV high-end storage appliance.To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: IBM

5 Tips for Success with Customer Analytics
Discover five tips for success with customer analytics, and how a better understanding of your customers in context increases revenue and deepens loyalty. Learn More

 

INSIDER
You've been hacked. Now what?
What should a company do after it's been hacked? It's a question Target, Home Depot, Sony Pictures Entertainment and others have had to ask over the past year or so. And it's likely that other organizations will be facing the same question over the coming months.To read this article in full or to leave a comment, please click here(Insider Story) Read More

 

 

INSIDER
Learn R for beginners with our PDF
With so much emphasis on getting insight from data these days, it's no wonder that R is rapidly rising in popularity. R was designed from day one to handle statistics and data visualization, it's highly extensible with many new packages aimed at solving real-world problems and it's open source (read "free").To read this article in full or to leave a comment, please click here(Insider Story) Read More

 

 

INSIDER
New weapons offer hope against advanced cyber-attacks
One of the most frightening things about modern cyber-attacks is that a breach can remain undetected within networks for weeks, months or even years. This time gives hackers the luxury of lateral movement within a network, meaning they can acquire better credentials, compromise more systems and search for the most profitable and most damaging information.To read this article in full or to leave a comment, please click here(Insider Story) Read More

 

 

SLIDESHOWS

Top 10 DNS attacks likely to infiltrate your network

DNS-based attacks are on the rise because many organizations don't realize DNS is a threat vector and therefore don't protect it.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Low tech 'visual hacking' successful nine times out of 10

2. 10 Reasons why the Raspberry Pi 2 Model B is a killer product

3. Apple, Linux, not Windows, most vulnerable operating systems in 2014

4. 8 most intriguing gadgets of 2015

5. Is the Samsung Galaxy S6 about to become the coolest Android phone ever?

6. CuBox-i4Pro: A whole lotta Linux or Android for not a whole lotta cash

7. Learn R for beginners with our PDF

8. Hummingboard: Giving Raspberry Pi a run for less money

9. You've been hacked. Now what?

10. With $15 in Radio Shack parts, 14-year-old hacks a car


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_storage_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: