Thursday, November 14, 2013

Dropbox makes its play for business users

  The waiting ends for EMC's XtremIO all-flash storage array | The best data security offense is a good defense

 
  Computerworld Storage

Forward this to a Friend >>>


Dropbox makes its play for business users
Dropbox is hoping to capitalize on the growing use of its file hosting service among businesses with a new product built from scratch that is designed to help companies improve workflow processes. Read More
 


WHITE PAPER: Boundary, Inc.
 
Benefits of Consolidated Operations Management
Points of failure are now more distributed than ever. Organizations have to manage hybrid on-premise and cloud applications. Pulling this information together in one place has been almost impossible. Read now!

WHITE PAPER: Exablox

How to Leverage New Storage Strategies
This ebook covers some of the key challenges organizations are encountering with storage management, data protection and cost containment. It also shows how IT organizations can effectively address these difficulties while getting the most out of their valuable information assets. Read now!

The waiting ends for EMC's XtremIO all-flash storage array
EMC's long-awaited entry into all-flash storage arrays will finally get a full-fledged rollout next week, possibly setting the terms for mastery of the fledgling product category along the way. Read More
 

 

INSIDER
The best data security offense is a good defense
After several missed security audits, the IT team at the Pennsylvania Department of Public Welfare built an ambitious security risk framework so audit reports could be prepared in a timely fashion. Insider (registration required) Read More

 

Jonny Evans: Quick guide: How to improve Siri in iOS 7
We spent the evening trying to get sense out of Siri last night, which kept my girlfriend briefly entertained before she grew frustrated it wouldn't pronounce her name. Here's how to train Siri. Read More
 


WHITE PAPER: CDW

Cloud Storage and Backup
The proliferation of cloud computing options has begun to change the way storage is thought about, procured and used. IT managers and departments need to think through how cloud options might fit into and complement their onsite data infrastructures. Read Now

Steve Pate: Virtualized environments. Real risk.
It's not always obvious when you've been hacked. New reports from security investigators are estimating that the recent Adobe breach may in fact be the biggest known breach of all time – with more than 152 million user accounts stolen. With today's virtualized infrastructure, an unprecedented amount of data can exist in one place, making it a virtual treasure trove. Virtualized environments pose very real risks, but with the right knowledge, you can address these risks and take full advantage of the benefits. Read More
 

Andrew Litt: Why integrating EMRs and digital images is an ethical and practical imperative
We've all been there. Following an injury, you or a family member gets an X-ray or MRI but when you follow up with a specialist a few weeks later, he or she can't access the study. In this age of rapid-fast information sharing, it's hard to understand why this still happens. Do we have the technology to solve the problem? Read More
 

Microsoft Patch Tuesday advisories urge ditching old, weak crypto algorithms
Microsoft patched serious vulnerabilities Tuesday in Windows, Internet Explorer and Office, but also urged customers to stop using the aging RC4 cipher and SHA-1 hashing function in their systems and services. Read More
 

 

FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it gets published, you get a sharp Shark shirt.

COMPUTERWORLD'S 2014 SALARY SURVEY
 

How will your salary compare with your IT peers? Computerworld's 28th Annual Salary Survey will feature the latest IT salary trends and advice on where to find the best-paying jobs. This year's survey participants can enter a drawing to win 1 of 3 American Express gift cards for $500 each! The drawing is open to legal U.S. residents, age 18 or older.

Take our annual Salary Surveytoday!

DIGITAL SPOTLIGHT: SECURITY
 

In our in-depth report on security, we take a closer look at mobile security and the tricky balancing act that comes when you want to give employees greater access to data but also need to keep corporate information safe. Also, we look at how companies are using new technologies to lock down their supply chains, and how one state agency dealt with thousands of security mandates by building a risk framework from the ground up.

This free, 28-page magazine-style report is available now [Registration required]

To read the report, click here.

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile hardware, mobile apps, enterprise apps and IT trends related to consumerization. We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization affects IT. Stay up to date with news, reviews and in-depth coverage.

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
A recent survey shows that 90% of drivers would consider using an autonomous car if it would cut their insurance rates. Are you one of them?

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


 
 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_storage as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 


 

ads

Ditulis Oleh : Angelisa Vivian Hari: 9:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive