TOP STORIES - May 25, 2011 | | | | | How to Recognize, Fight and Stop Phishing Attacks Thanks to several high-profile data breaches and personal information thefts at Epsilon and Sony, the number of phishing attacks is bound to increase significantly during the next several months. However, there are a number of ways you can recognize and ultimately fight against these types of attacks. READ MORE >> Microsoft, Google Cloud Competition Gets Vicious Microsoft is looking to re-establish itself as a software maker that can deliver cloud-based services and applications. However, that means Microsoft finds itself in an increasingly vicious competition with Google, which is also seeking a large chunk of the up-and-coming cloud-computing market for itself. READ MORE >> Sponsored by Novell Introducing Novell Vibe, a place where enterprise teams can work socially to achieve better results. Combining real-time social networking, online document co-editing and file sharing - all with enterprise-level security and control. It's 'Social Getworking.' Get Novell Vibe for free, now. | | 10 Secrets to Apple Retail Stores' Success News Analysis: Apple's retail stores have celebrated their 10th anniversary. Now they feature a new look aimed at keeping the shoppers flowing in. What has made them so popular over the years? READ MORE >> Windows 8 Rumors Swirl After Ballmer Statement Windows 8 will arrive in 2012, according to a statement made by Microsoft CEO Steve Ballmer. But Microsoft could be trying to clamp down on that news. READ MORE >> iPhone Can't Ignore Android Price, Market Share Challenge News Analysis: There are two reasons why Android phones are outselling everything else. They're ubiquitous and they're cheap. There is no reason why Apple can't make and sell a smartphone that's just as cheap. READ MORE >> | | | |
| Best Practices for Virtual Machine Backups to the Cloud Jun 16, 2011 at 2:00 p.m. Eastern / 11:00 a.m. Pacific (60 minutes) To resolve this conflict some businesses have embraced legacy agent and tape-based approaches that over time become too costly to manage and can fail to meet service level requirements. For many organizations new approaches such as backup and archive to cloud storage solves the dilemma. REGISTER >> What Can Identity Management Do for You? Jun 15, 2011 at 1:00 p.m. Eastern / 10:00 a.m. Pacific (60 minutes) Register today for this online event to hear industry experts compare and contrast different architectures such as synchronization-based and event-based models. Executives will discuss the common problems most enterprises face when they address identity management, and give you valuable insight into how identity management can become the center of most, if not all, of your IT-management policies. REGISTER >> | | | | | | |
No comments:
Post a Comment