Thursday, September 29, 2011

10 identity management metrics that matter

  OCZ's Synapse SSD to boost hard drive performance by auto-caching | Violin releases two new flash memory arrays
 
  Computerworld Storage

Forward this to a Friend >>>


10 identity management metrics that matter
Within the IT security community, identity- and access-management (IAM) initiatives are considered high value, but are notoriously problematic to deploy. Yet despite IAM's complexity, it represents 30 percent or more of the total information security budget of most large institutions, according to IDC (a sister company to CSO's publisher). Read More


WHITE PAPER: SEPATON and Hitachi Data Systems

Data Growth and Protection: Addressing the Challenge
How does your organization deal with the data deluge? This white paper explores new research that gets to the heart of the challenges of protecting and managing the data you already deal with and preparing for the ever-increasing volumes of data to come. And, it discusses how a single, scaleable solution can address these issues. Read now

WEBCAST: IBM

Deploy Server Virtualization with Data Storage
Virtualization has changed the dynamics in today's data center. Having visibility to the constant changes being experienced in a virtualized environment is key to understanding how to maximize virtualization in your data center. Learn how IBM Tivoli Productivity Center can provide that visibility. View now

OCZ's Synapse SSD to boost hard drive performance by auto-caching
OCZ's latest SSD, the Synapse, works in conjunction with a computer's regular hard drive to boost performance. Read More

Violin releases two new flash memory arrays
Violin Memory released an upgrade to an all-flash memory array, doubling the capacity, as well as a new higher-end line of arrays that store up to 20TB per 3U shelf with an aggregate of 4GBps throughput. Read More

QLogic unveils upgrades to converged network products
QLogic today announced upgrades to its line of converged network adapters, as well as a new switch and router product that can consolidate LAN traffic. Read More

Big News from BoxWorks '11
Today is the inaugural Box.net conference for customers and developers--BoxWorks. Box.net CEO and co-founder used the event to announce a slew of new features and updates, as well as a few key partnerships. Read More


WHITE PAPER: IBM

Driving Down Enterprise Storage TCO
The IBM XIV Storage System series is designed to address each of these cost concerns. Click here to find out how the XIV system's unique architecture and approach to storage enable it to accomplish a better bottom line for you and your business. Read Now

How to Sync Your PC, Smartphone, and Tablet
A few years ago businesspeople carried a laptop on the road, used a desktop PC in the office, and worked on another PC at home. Maybe they had a BlackBerry, too--but only if they were real big shots. Read More

Useful Sites for Small Business
Whether you're running a business out of your den or from a penthouse in the sky, you don't have time or money to waste on second-rate tools. These well-designed services and resources are among the best the Web offers for small and midsize businesses. Some include apps for smartphones and downloads for your desktop, but all of them provide the bulk of their features within a Web browser. Read More

Sharky: Unclear on the whole 'push' concept
This IT pilot fish really appreciates software installations that can be pushed out to users over the network because techs don't have to physically touch each workstation. But one software vendor's version of "push" challenges that concept. Read More

Darlene Storm: How long does your mobile phone provider store data for law enforcement access?
The ACLU has the previously unreleased dirt on how long your cell phone company is holding onto to your data. The Justice Department handed over a revealing chart meant to help law enforcement obtain mobile phone provider records. The data held by cellular companies ranges from text messages, pictures, IP addresses, browsing history, cell towers used and call logs. Read More

 
 
 

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Can Microsoft and Intel's marriage be saved?

SHARK TANK OF THE DAY

Unclear on the whole 'push' concept

This IT pilot fish really appreciates software installations that can be pushed out to users over the network because techs don't have to physically touch each workstation. But one software vendor's version of "push" challenges that concept.

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_storage as jonsan3511@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 

 

 

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:26 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive