RefBan

Referral Banners

Wednesday, May 25, 2011

Inside Intel's Processor Plans for 2011-12; How to Recognize, Fight and Stop Phishing Attacks

Don't miss a single issue of eWEEK.com Enterprise Applications Update. Add newsletters@response.eweek.com to your address book. View newsletter in a browser
eWEEK.com Infrastructure Update Infrastructure Update
HOME NEWS REVIEWS OPINIONS BLOGS VIDEOS PODCASTS SUBSCRIBE
Storage | Security | Channel | Infrastructure | CIO | ALL TOPICS
TOP STORIES - May 25, 2011
Inside Intel's Processor Plans for 2011-12
How to Recognize, Fight and Stop Phishing Attacks
IPv6 Transition Still a Low Priority for Most Organizations
Smart Algorithm Untangles Network Snarls
AMD's Latest Embedded Processors Feature 5.5-, 6.4-Watt TDPs
SPOTLIGHT
Teardown: Covert FBI GPS Auto-Tracker
iFixit cracked open a GPS device capable of constantly tracking location that FBI agents have installed underneath some vehicles.
READ MORE >>
BEST OF eWEEK
Hands-On with Samsung's Chromebook
Windows' Unbreakable Market Dominance
Top 10 Features Microsoft Project 2010
Smart Cable Adds On 3D-Like Depth
FEATURED VIDEO
From Virtualization to Cloud
We bring you tips and strategies to smoothly evolve existing virtualization.
WATCH NOW >>
MOST READ STORIES
Reasons to Adopt Adobe CS 5.5
Why Motorola Delayed the Droid Bionic
Affordable, Portable Storage Drives
Chromebooks Steal Show at Google I/O
IN THIS ISSUE
Inside Intel's Processor Plans for 2011-12
Intel won't be coming out with smartphones in 2011, but it will be investing more R&D into processors for data center equipment and a new line of MIC processors that take the multi-core concept to a whole new level. Get an inside look at what Intel has in store.
READ MORE >>

How to Recognize, Fight and Stop Phishing Attacks
Thanks to several high-profile data breaches and personal information thefts at Epsilon and Sony, the number of phishing attacks is bound to increase significantly during the next several months. However, there are a number of ways both individuals and IT security managers can recognize and ultimately fight against these types of phishing attacks. eWEEK offers some pointers and advice.
READ MORE >>

Sponsored by Symantec


Examine the factors driving interest in desktop virtualization and the seven keys to selecting the right storage architecture for enterprise VDI deployments. See how Symantec VirtualStore satisfies these seven key requirements.
Click here
ADVERTISEMENT
IPv6 Transition Still a Low Priority for Most Organizations
As the World IPv6 Day approaches, recent research reports show that a majority of organizations are still treating the IPv6 migration as something for the future and not an immediate priority.
READ MORE >>

Smart Algorithm Untangles Network Snarls
As the complexity of networks skyrockets, managers have been hard-pressed to come up with analytic tools that can cope, but now researchers claim to have a general-purpose technique that unsnarls nearly any network.
READ MORE >>

AMD's Latest Embedded Processors Feature 5.5-, 6.4-Watt TDPs
AMD announced the availability of two new Embedded G-Series processors with TDP ratings of 5.5 and 6.4 watts, said to be up to 39 percent more power efficient than an earlier 1.2GHz G-Series processor.
READ MORE >>

Featured White Papers
The Hardest Problems in Data Management
Modern hardware trends and economics combined with cloud/virtualization technology are radically reshaping today's data management landscape, ushering in a new era where many machine, many core, memory-based computing topologies can be dynamically assembled from existing IT resources and pay-as-you-go clouds.
DOWNLOAD NOW >>

Enterprise LAN: The Magic Quadrant
The LAN switching market is mature; however, it continues to evolve, as enterprises move toward a secure, collaborative workplace. Ethernet is used in more environments beyond traditional IT systems (such as process control, building automation and security), as Ethernet switching functionality is integrated into more data center infrastructures.
DOWNLOAD NOW >>


Featured Webcasts
Best Practices for Virtual Machine Backups to the Cloud
Jun 16, 2011 at 2:00 p.m. Eastern / 11:00 a.m. Pacific (60 minutes)
To resolve this conflict some businesses have embraced legacy agent and tape-based approaches that over time become too costly to manage and can fail to meet service level requirements. For many organizations new approaches such as backup and archive to cloud storage solves the dilemma.
REGISTER >>

What Can Identity Management Do for You?
Jun 15, 2011 at 1:00 p.m. Eastern / 10:00 a.m. Pacific (60 minutes)
Register today for this online event to hear industry experts compare and contrast different architectures such as synchronization-based and event-based models. Executives will discuss the common problems most enterprises face when they address identity management, and give you valuable insight into how identity management can become the center of most, if not all, of your IT-management policies.
REGISTER >>


Sign up for complimentary digital subscriptions to eWEEK, CIO Insight and Baseline magazines and receive a 360 view of today's technology arena. eWEEK gives you expert products reviews that help you choose the best technologies for your organization. CIO Insight provides a high-level look at technologies and processes, that enable you to design IT strategies that support your entire enterprise. And Baseline takes you to the front lines, with in-depth case studies of how your peers in other companies integrate technology with business and bring real value to their organizations. Sign Up Today.

eWEEK Newsletter Information
You are currently subscribed to the eWEEK.com Infrastructure Update newsletter as: dwyld.kwu.wyldside@blogger.com
If you no longer wish to receive eWEEK.com Infrastructure Update, unsubscribe here

Ziff Davis Enterprise
28 East 28th Street
New York, New York 10016
Privacy Policy

No comments: