TOP STORIES - June 3, 2011 | | | | | Security Obstacles Remain for Data Center Virtualization Organizations need to think about virtualization-specific security technology when upgrading their data centers instead of relying on existing measures, such as the trust firewall. READ MORE >> SanDisk Demos Tiny SATA III SSDs for Tablets, Notebooks The new SSD U100 and iSSD i100 drives can transfer data to and from a PC at roughly twice the speed of the standard SanDisk P4 drives they are intended to replace. READ MORE >> Sponsored by Symantec.cloud Visit the new Security Solution Center on eWEEK.com for the latest IT security news, reviews, videos, and resources. Go to the Security Solution Center | | NetApp, CommVault Team for Automated Snapshot-Based Backup The new OEM agreement enables Tier 2 disk backup and Tier 3 tape archiving, for example, to be managed and provisioned in a single application. READ MORE >> Intel, VMWare, EMC Supply Infrastructure for NYSE Cloud NYSE announced a "community" cloud infrastructure based on Intel blade servers, VMWare vShield and EMC's VNS unified storage for capital markets. READ MORE >> Hardware Encryption Makes Non-Volatile Main Memory Ultra-Secure While non-volatile main memory boots faster and has higher capacities than dynamic random access memory, its security risk has proved to be a major setback. A new hardware encryption system could bring both faster start times and high security to the next generation of computers. READ MORE >> | | | |
| Best Practices for Virtual Machine Backups to the Cloud Jun 16, 2011 at 2:00 p.m. Eastern / 11:00 a.m. Pacific (60 minutes) To resolve this conflict some businesses have embraced legacy agent and tape-based approaches that over time become too costly to manage and can fail to meet service level requirements. For many organizations new approaches such as backup and archive to cloud storage solves the dilemma. REGISTER >> What Can Identity Management Do for You? Jun 15, 2011 at 1:00 p.m. Eastern / 10:00 a.m. Pacific (60 minutes) Register today for this online event to hear industry experts compare and contrast different architectures such as synchronization-based and event-based models. Executives will discuss the common problems most enterprises face when they address identity management, and give you valuable insight into how identity management can become the center of most, if not all, of your IT-management policies. REGISTER >> | | | | | | |
No comments:
Post a Comment