Thursday, June 27, 2013

EMC's Syncplicity lets enterprises lock down data sharing

  Western Digital to acquire sTec to expand in enterprise SSDs | Fusion-io updates ioTurbine to aid more types of on-server caching
 
  Computerworld Storage

Forward this to a Friend >>>


EMC's Syncplicity lets enterprises lock down data sharing
EMC is giving enterprises greater control over how corporate data gets distributed and to whom, plus more mobile capabilities, with the latest update to its Syncplicity service. Read More


WHITE PAPER: EMC Corporation

EMC Storage Resource Management Suite
Learn how you can visualize applications to storage dependencies, analyze configurations and capacity growth, and optimize your environment to improve storage management efficiency. Learn more.

WHITE PAPER: EMC Corporation

EMC Best Practices in Data Protection Monitoring
Whether you consider your domain to be a private cloud, a hybrid cloud, or a public cloud, you are providing data protection as a service. According to ESG's 2013 IT Spending Intentions Survey, improving data backup and recovery was the number two-most important IT priority selected by respondents (27%). Learn more.

Western Digital to acquire sTec to expand in enterprise SSDs
Western Digital plans to acquire sTec to boost its presence in the market for enterprise solid-state drives. Read More

Fusion-io updates ioTurbine to aid more types of on-server caching
Fusion-io is updating its ioTurbine caching software to help more types of enterprises integrate flash-based cache into virtualized computing environments. Read More


WHITE PAPER: EMC Corporation

EMC Service Assurance Suite
Discover how you can get visibility into virtualized environments, the cloud and software-defined date centers, analyze availability and performance, optimize the environment and control costs with end-to-end performance, capacity management and reporting. Learn more.

Spy-proof enterprise encryption is possible, but daunting
Data encryption could help enterprises protect their sensitive information against mass surveillance by governments, as well as guard against unauthorized access by ill-intended third parties. But the correct implementation and use of data encryption technologies is not an easy task, according to security experts. Read More

NSA can retain encrypted communications of Americans possibly indefinitely
The National Security Agency can retain communications of U.S. citizens or residents potentially indefinitely if those communications are encrypted, according to a newly leaked secret government document. Read More

A dozen clever cloud tools for devs and ops
Look to these automation, orchestration and configuration management tools to keep your server farms running smoothly Read More

 

DIGITAL SPOTLIGHT: CLOUD COMPUTING

In our in-depth report on cloud computing, we take a closer look at platform-as-a-service, security-as-a-service and back-end-as-a-service, weighing the benefits and challenges of each service and sharing tips from early adopters.

This free, 12-page magazine-style report is available now [Registration required]

To read the report, click here.

CALL FOR NOMINATIONS: PREMIER 100 IT LEADERS

Now's your chance to get a worthy CIO or other top IT executive nominated for next year's Premier 100 IT Leaders awards! Deadline is Friday, Aug. 30.

To make a nomination, click here.

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile hardware, mobile apps, enterprise apps and IT trends related to consumerization. We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization affects IT. Stay up to date with news, reviews and in-depth coverage.

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Although the National Security Agency's secretly collecting phone records of millions of Verizon customers may be nothing new, the current scope of the data collection is "breathtaking." Do you think the U.S. government be allowed to collect phone records and mine Internet data on citizens?

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.

 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_storage as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 

 

 

ads

Ditulis Oleh : Angelisa Vivian Hari: 8:19 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive