| How to Recognize, Fight and Stop Phishing Attacks Thanks to several high-profile data breaches and personal information thefts at Epsilon and Sony, the number of phishing attacks is bound to increase significantly during the next several months. However, there are a number of ways both individuals and IT security managers can recognize and ultimately fight against these types of phishing attacks. eWEEK offers some pointers and advice. READ MORE >> Google Wants to Be Your Wallet Slated for a summer release, Google Wallet is a free mobile application that will let owners of Samsung Nexus S 4G smartphones from Sprint use their phone as a wallet at some 20 retailers and restaurants. READ MORE >> Sponsored by Insight With Insight, you have an experienced partner to help you gain the most value from Cisco's innovative data center solutions. Don't delay - talk to an Insight expert today. Click here | | PayPal Sues Google Wallet Execs over Trade Secrets Google executives are being sued by PayPal for taking trade secrets from their former company and using them to build the new Android-based Google Wallet mobile payment service. READ MORE >> Square Debuts Point-of-Sale Support for the iPad Startup Square has developed an application that turns Apple's iPad, iPhone and Android-powered devices into point-of-sale terminals. READ MORE >> Brisk Tablet Sales Starting to Hurt HDD Market At $28.1 billion, overall HDD revenue is 4.1 percent higher than the $27 billion reported in 2010, but is only about half the 7 percent expansion posted by the industry in 2010. READ MORE >> | | | |
| Best Practices for Virtual Machine Backups to the Cloud Jun 16, 2011 at 2:00 p.m. Eastern / 11:00 a.m. Pacific (60 minutes) To resolve this conflict some businesses have embraced legacy agent and tape-based approaches that over time become too costly to manage and can fail to meet service level requirements. For many organizations new approaches such as backup and archive to cloud storage solves the dilemma. REGISTER >> What Can Identity Management Do for You? Jun 15, 2011 at 1:00 p.m. Eastern / 10:00 a.m. Pacific (60 minutes) Register today for this online event to hear industry experts compare and contrast different architectures such as synchronization-based and event-based models. Executives will discuss the common problems most enterprises face when they address identity management, and give you valuable insight into how identity management can become the center of most, if not all, of your IT-management policies. REGISTER >> | | | | |
No comments:
Post a Comment