TOP STORIES - May 31, 2011 | | | | | iPad 2, LinkedIn IPO, Microsoft Azure Steal Tech Spotlight During the past six months, the IT world has seen how one device--Apple's iPad 2--could not only redefine the mobile market but also change the way we access our applications. The IT market also saw the re-emergence of the hot IPO and the growing reach of the cloud. It's been quite a year so far and a perfect time for a recap. READ MORE >> IE Flaw Lets Attackers Steal Cookies, Access User Accounts An independent security consultant demonstrated a "cookiejacking" technique to show how attackers can steal Web cookies to access user accounts online. READ MORE >> Sponsored by Symantec.cloud Visit the new Security Solution Center on eWEEK.com for the latest IT security news, reviews, videos, and resources. Go to the Security Solution Center | | Health Care IT Industry Shies Away from Cloud Adoption: CDW Privacy concerns may be keeping health care IT from adopting a comprehensive cloud computing roadmap, according to a new CDW report. READ MORE >> EMC, Citrix in Deal to Run XenDesktop on VNX Storage Systems The partnership with EMC enables users of VNX storage systems to scale out their XenDesktop deployments to as many as 1,000 virtual desktops per server/storage array. READ MORE >> AT&T, T-Mobile Deal Faces More Scrutiny, Debate California, following Louisiana, may be the second state to open an inquiry into AT&T's proposed $39 billion purchase of T-Mobile. READ MORE >> | | | |
| Best Practices for Virtual Machine Backups to the Cloud Jun 16, 2011 at 2:00 p.m. Eastern / 11:00 a.m. Pacific (60 minutes) To resolve this conflict some businesses have embraced legacy agent and tape-based approaches that over time become too costly to manage and can fail to meet service level requirements. For many organizations new approaches such as backup and archive to cloud storage solves the dilemma. REGISTER >> What Can Identity Management Do for You? Jun 15, 2011 at 1:00 p.m. Eastern / 10:00 a.m. Pacific (60 minutes) Register today for this online event to hear industry experts compare and contrast different architectures such as synchronization-based and event-based models. Executives will discuss the common problems most enterprises face when they address identity management, and give you valuable insight into how identity management can become the center of most, if not all, of your IT-management policies. REGISTER >> | | | | | | |
No comments:
Post a Comment