Tuesday, April 21, 2015

Go-to storage and disaster recovery products

Google seeks $19.8M tax break in Iowa | Amazon and Microsoft take aim at new workloads with souped up cloud offerings

Network World Storage

Go-to storage and disaster recovery products
LEAF Commercial Capital used to wrestle with tape backups for disaster recovery. Now the equipment leasing and finance company is using a software-based service from Evolve IP for disaster recovery. That's just one example from our Fave Raves 2015 collection of storage and disaster recovery products. To read this article in full or to leave a comment, please click here Read More


What You Need to Know About Connected Storage
Watch this exclusive video webcast with Fred Pinkett, Senior Director of Product Marketing at Nasuni, and learn how to overcome the challenges of the traditional storage stack through "connected storage." Learn More


How to Replace an Old Archive System
Are you looking to retire your legacy archive system? Learn how one organization minimized the cost of their data migration to Symantec Enterprise Vault and kept the migration timeline completely under their control. View now

Google seeks $19.8M tax break in Iowa
Google needs a tax break like Bill Gates needs food stamps, yet that isn’t stopping the search giant from asking for $19.8 million in “economic development incentives” from Iowa to build a $1-billion expansion of its growing data center facility in Council Bluffs.And, well, why not ask? The company has already been given $16.8 million in tax breaks to build out the various stages of the existing Council Bluffs facility, which opened in 2007.According to this Omaha World-Herald report, the latest tax break is expected to be approved by the Iowa Economic Development Authority and the Council Bluffs City Council with little or no opposition.To read this article in full or to leave a comment, please click here Read More

Amazon and Microsoft take aim at new workloads with souped up cloud offerings
Hoping to move new applications to the cloud, Amazon has launched a new virtual server with four high-end GPUs, while Microsoft has made its SSD-based storage offering generally available.Amazon and Microsoft have methodically been launching new services and adding features to EC2 and Azure, respectively, to make the platforms more competitive and a better fit for different applications.The latest addition from Amazon is a new virtual server, or “instance,” that has been customized for graphic intensive workloads such as large scale rendering, machine learning, video encoding, and other server-side workloads that require lots parallel processing power.To read this article in full or to leave a comment, please click here Read More


5 Traits of Next Generation Email Archiving Software
This guide is designed to help understand the best practices associated with email and other migration types–providing best practice guidance from some of the industry's leading migration experts. View now

Fave Raves: 34 tech pros share favorite IT products
Fave Raves 2015We asked, and IT pros answered. Their favorite tech products keep people productive and enterprise assets running safely and efficiently. Check out the must-haves.SEE ALSO: Security pros name their must-have tools | Go-to storage and disaster recovery products | IT pros in retail are sold on these 6 products | Tech pros' favorite tools increase IT efficiency | To read this article in full or to leave a comment, please click here Read More

Dropbox to pay security researchers for bugs
Dropbox said Wednesday it will pay rewards to independent researchers who find software flaws in its applications, joining a growing list companies who see merit in crowdsourcing parts of their security testing. The popular file storage service previously publicly recognized researchers, but did not pay a reward, also sometimes referred to as a bug bounty. "In addition to hiring world class experts, we believe it's important to get all the help we can from the security research community, too," wrote Devdatta Akhawe, a Dropbox security engineer. Facebook, Google, Yahoo and many other large companies pay researchers rewards that are often determined by the seriousness of the software flaw. Running such programs are more efficient than hiring more security engineers since a company's applications are analyzed by a larger number of people with diverse security skills.To read this article in full or to leave a comment, please click here Read More


Next Generation Archive Migration Tools
Data migrations and the products used to perform them have substantially advanced in recent times. This guide is designed to demonstrate the new features of Migrate, and how these features directly benefit data migration customers and providers. View more

Pure Storage CEO promises huge savings with flash
The term 'disruption' gets tossed about a lot -- too often -- in the technology industry. But it isn't always hype. Backed by nearly half a billion dollars in investment, CEO Scott Dietzen and Pure Storage are hard at work disrupting a big chunk of the enterprise storage market owned by the likes NetApp and EMC, which is no stranger to disruption itself, having turned the tables on a previous generation of storage leaders.I had the opportunity to talk to [EMC CEO] Joe Tucci a couple of months back and I asked him about flash. I'm paraphrasing him here, but he describes a world where there's a role for tape, disk, flash. Do customers still buy that?To read this article in full or to leave a comment, please click here(Insider Story) Read More

U.S. business group urges China to loosen data-storage policies
Chinese security policies are threatening to push foreign businesses out of the country’s IT sector by restricting the way data is stored, according to a U.S. lobbying group.On Tuesday, the American Chamber of Commerce in China issued a report urging the country to change the policies. Increasingly, the Chinese government is enacting regulations to address national security concerns at the cost of hampering its own economy, the lobbying group warned.China has been recently reviewing an antiterror law that could require tech companies to give up encryption keys to the authorities.To read this article in full or to leave a comment, please click here Read More

New products of the week 04.20.2015
Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.To read this article in full or to leave a comment, please click here Read More

Enterprises failing to keep up with digital change, EMC study says
At a swanky dinner in San Francisco last week, execs from EMC and the Institute for the Future (IFTF) previewed the company's Information Generation report to a small group of journalists. And EMC President Jeremy Burton made it clear how the trends identified in the report played into the kinds of technology decisions made by his company's customers.Rachel Maguire, research director for the IFTF in Palo Alto, California, explained that the survey of 3,600 business leaders in 18 countries across 10 industries revealed the top business attributes essential for success over the next 5 to 10 years:To read this article in full or to leave a comment, please click here Read More


Spaced out tech auction: 8 vintage space items go on the block

Incredible space memorabilia that will make you geek out!


As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn


1. Thieves using a $17 power amplifier to break into cars with remote keyless systems

2. iPhone 7 rumor rollup: Killer camera on the way?

3. What has changed now that Microsoft's Lync is Skype for Business?

4. Anonymous aims cyberattacks at depraved animal cruelty websites

5. Cisco router feature open to exploit

6. Fave Raves: 34 tech pros share favorite IT products

7. Shortage of security pros worsens

8. Google's Project Loon close to launching thousands of balloons

9. Security pros name their must-have tools

10. Will containers kill the virtual machine?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_storage_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

No comments: