Wednesday, June 8, 2011

When the worst happens: SharePoint recovery

  Mobile payment systems: A disaster waiting to happen | Lockheed Martin acknowledges 'significant' cyberattack
 
  Computerworld Disaster Recovery

Forward this to a Friend >>>


When the worst happens: SharePoint recovery
SharePoint has become vital to the business infrastructure and, in many companies, it's even used as the company's face to the world: its public-facing Web site. Because of this dependency and high visibility, a well-thought-out disaster recovery strategy for SharePoint is imperative. Read More


WHITE PAPER: Websense, Inc.

Need for Unified Content Security
This first paper, in a three-part series, provides a high-level description and summary of benefits to consider when looking at content security solutions. Learn more.

RESOURCE COMPLIMENTS OF: Microsoft

Is Microsoft Desktop Virtualization for you?
Desktop Virtualization provides a comprehensive suite of solutions that enables companies to give their employees flexibility to work everywhere; simplifying compliance and management through a centralized and unified infrastructure. Learn how IT is empowering users with Desktop Virtualization with this on-demand roundtable. Click to continue

Mobile payment systems: A disaster waiting to happen
The apps may be well thought out, but until security improves in the underlying security of the devices they run on, look out. Read More

Lockheed Martin acknowledges 'significant' cyberattack
Lockheed Martin acknowledged that it its information systems network had been the target of a "significant and tenacious attack," but said that its security team detected the intrusion "almost immediately and took aggressive actions to protect all systems and data." Read More

Sony Pictures falls victim to major data breach
LulzSec, a hacking group that recently made news for hacking into PBS, claimed that it has broken into several Sony Pictures Web sites and accessed unencrypted personal information about over 1 million people. Read More


WHITE PAPER: Iron Mountain

The IT Manager's Role in Proactive Information Retention
This IDC White Paper discusses the practical approaches the IT organization must consider so that it can effectively execute on the corporation's compliance and eDiscovery objectives while still meeting the IT organization's budget, application performance, and service-level objectives. Read Now

Richi Jennings: RSA SecurID: Egg meets face
In the case of the SecurID hack three months ago, RSA's strategy -- to deny anything was worrisome -- has come back to bite it. Hard. The company is having to learn some of the oldest lessons in security -- and in PR. (Insider content - free registration required.)) Read More

Develop a cloud computing error-logging strategy
Error handling and trace logs are as old as the hills. Of course this is handled in the clouds, right? Keep laughing... Read More

Sharky: Credit? We'll take it
It's a few decades ago, and this pilot fish is responsible for a freshly installed warehouse IT system -- and mostly, it's working flawlessly. But one night there's a problem -- and before fish can fix it, the users are back online in the morning. Read More

Risk's rewards: Organizational models for ERM
Do you know the butterfly effect? Well, there are billions of butterflies in the world, and you want to keep an eye on the ones that, according to the chaos theory, are about to flap their wings and start a chain of events that will eventually result in a hurricane half a world away. The bigger the organization, the more butterflies there are to worry about. Read More

 
 
 

CAST YOUR VOTE IN OUR LATEST QUICKPOLL

Should Apple be forced to show Samsung its next iPhone and iPad?

SHARK TANK OF THE DAY

Keeping busy

At this small college, the three-person IT department is also responsible for the on-campus analog telephone system, so when a dean's phone goes haywire, that's who he calls.

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_disaster_recovery as jonsan3511@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 

 

 

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:59 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive