TOP STORIES - May 25, 2011 | | | | | Inside Intel's Processor Plans for 2011-12 Intel won't be coming out with smartphones in 2011, but it will be investing more R&D into processors for data center equipment and a new line of MIC processors that take the multi-core concept to a whole new level. Get an inside look at what Intel has in store. READ MORE >> How to Recognize, Fight and Stop Phishing Attacks Thanks to several high-profile data breaches and personal information thefts at Epsilon and Sony, the number of phishing attacks is bound to increase significantly during the next several months. However, there are a number of ways both individuals and IT security managers can recognize and ultimately fight against these types of phishing attacks. eWEEK offers some pointers and advice. READ MORE >> Sponsored by Symantec Examine the factors driving interest in desktop virtualization and the seven keys to selecting the right storage architecture for enterprise VDI deployments. See how Symantec VirtualStore satisfies these seven key requirements. Click here | | IPv6 Transition Still a Low Priority for Most Organizations As the World IPv6 Day approaches, recent research reports show that a majority of organizations are still treating the IPv6 migration as something for the future and not an immediate priority. READ MORE >> Smart Algorithm Untangles Network Snarls As the complexity of networks skyrockets, managers have been hard-pressed to come up with analytic tools that can cope, but now researchers claim to have a general-purpose technique that unsnarls nearly any network. READ MORE >> AMD's Latest Embedded Processors Feature 5.5-, 6.4-Watt TDPs AMD announced the availability of two new Embedded G-Series processors with TDP ratings of 5.5 and 6.4 watts, said to be up to 39 percent more power efficient than an earlier 1.2GHz G-Series processor. READ MORE >> | | | The Hardest Problems in Data Management Modern hardware trends and economics combined with cloud/virtualization technology are radically reshaping today's data management landscape, ushering in a new era where many machine, many core, memory-based computing topologies can be dynamically assembled from existing IT resources and pay-as-you-go clouds. DOWNLOAD NOW >> Enterprise LAN: The Magic Quadrant The LAN switching market is mature; however, it continues to evolve, as enterprises move toward a secure, collaborative workplace. Ethernet is used in more environments beyond traditional IT systems (such as process control, building automation and security), as Ethernet switching functionality is integrated into more data center infrastructures. DOWNLOAD NOW >> | |
| Best Practices for Virtual Machine Backups to the Cloud Jun 16, 2011 at 2:00 p.m. Eastern / 11:00 a.m. Pacific (60 minutes) To resolve this conflict some businesses have embraced legacy agent and tape-based approaches that over time become too costly to manage and can fail to meet service level requirements. For many organizations new approaches such as backup and archive to cloud storage solves the dilemma. REGISTER >> What Can Identity Management Do for You? Jun 15, 2011 at 1:00 p.m. Eastern / 10:00 a.m. Pacific (60 minutes) Register today for this online event to hear industry experts compare and contrast different architectures such as synchronization-based and event-based models. Executives will discuss the common problems most enterprises face when they address identity management, and give you valuable insight into how identity management can become the center of most, if not all, of your IT-management policies. REGISTER >> | | | | | | |
No comments:
Post a Comment