TOP STORIES - June 6, 2011 | | | | | Why HP's TouchPad Might Be iPad's Top Challenger News Analysis: HP's TouchPad is still a few months away from release, but it has the features and design points that could make this tablet the biggest threat to the iPad yet. READ MORE >> Google Apps Phases Out Older IE, Firefox, Safari Versions Google said it is phasing out support for Firefox 3.5, Internet Explorer 7, Safari 3 and their predecessors in Google Apps in favor of Chrome and other browsers that handle HTML5. READ MORE >> Sponsored by APC APC's PowerChute Business Edition 9.0 moves beyond APC's safe system shutdown and UPS management to help customers understand their power consumption with fact-based energy, cost and CO2 emissions reporting on a per Smart-UPS basis. Learn more. | | Traditional Security Can't Stop New APTs, Zero-Day Threats A security vendor warned that firewalls, antivirus, filters and intrusion prevention systems are not enough to stop cyber-attackers from getting into the network. READ MORE >> Google, Bing, Yahoo Start Schema.org for Content Markup Google and rivals Bing and Yahoo teamed to improve Web content markup information for Website publishers with the new schema.org initiative. READ MORE >> Most Websites Regularly Leak Sensitive, Personal Data Apparently, third-party Facebook apps aren't the only ones guilty of accidentally leaking user data to third-party networks and advertisers. A study claimed most Websites do it, too. READ MORE >> | | | |
| Best Practices for Virtual Machine Backups to the Cloud Jun 16, 2011 at 2:00 p.m. Eastern / 11:00 a.m. Pacific (60 minutes) To resolve this conflict some businesses have embraced legacy agent and tape-based approaches that over time become too costly to manage and can fail to meet service level requirements. For many organizations new approaches such as backup and archive to cloud storage solves the dilemma. REGISTER >> What Can Identity Management Do for You? Jun 15, 2011 at 1:00 p.m. Eastern / 10:00 a.m. Pacific (60 minutes) Register today for this online event to hear industry experts compare and contrast different architectures such as synchronization-based and event-based models. Executives will discuss the common problems most enterprises face when they address identity management, and give you valuable insight into how identity management can become the center of most, if not all, of your IT-management policies. REGISTER >> | | | | | | |
No comments:
Post a Comment