Thursday, February 20, 2014

The surprise power hog for mobile storage: software

 

Computerworld Storage - Newsletter - computerworld.com

  John Martin: The future of storage is software-defined | Microsoft kills SkyDrive, launches OneDrive

 
  Computerworld Storage

Forward this to a Friend >>>


The surprise power hog for mobile storage: software
Flash storage can be a big power consumer in mobile devices, but it's not the flash that sucks up all that energy, it's the software that goes with it, according to researchers from the University of California at San Diego and Microsoft. Read More
 


WHITE PAPER: Tintri

ESG Lab Validation Report: VMware Horizon View with Tintri
This report documents the results of ESG Lab's hands-on testing of VMware Horizon View 5.1 with the Tintri VMstore platform. Testing focused on performance in the context of the end-user experience in a 1,000 seat virtual desktop environment. Read now!

WHITE PAPER: Druva

Top 10 Endpoint Backup Mistakes
When considering endpoint backup options, be sure you're making the right decisions. Protecting data on endpoints has become more challenging because of recent trends like exponential data growth, the rise in endpoints, BYOD, and SaaS applications. Read Now!

John Martin: The future of storage is software-defined
The Storage Networking Industry Association recently hosted an industry summit, "The Future of Computing – The Convergence of Memory and Storage through Non-Volatile Memory (NVM)." For a glimpse into the future, from some of the industry's true thought leaders, check out the presentations and audio recordings. This view into the rapid developments in flash memory and other NVM technologies has given me a new-found appreciation for the concept of a software-defined data center (SDDC). Read More
 

Microsoft kills SkyDrive, launches OneDrive
Three weeks after announcing OneDrive as the new label for SkyDrive, Microsoft today activated the renamed storage service, and offered some new incentives that give customers more space. Read More
 


WEBCAST: IBM

Tame the data explosion with IBM Real-time Compression
Learn about IBM's unique Real-time Compression technology that can enable storing up to 5x as much data in the same storage space. Learn More

RSA Preview: Machine-learning analytics and cloud encryption
Keith Shaw chats with Kevin Conklin from Prelert and Elad Yoran from Vaultive about some security trends expected at the 2014 RSA Conference in San Francisco. Read More
 

Dozens of rogue self-signed SSL certificates used to impersonate high-profile sites
Dozens of self-signed SSL certificates created to impersonate banking, e-commerce and social networking websites have been found on the Web. The certificates don't pose a big threat to browser users, but could be used to launch man-in-the-middle attacks against users of many mobile apps, according to researchers from Internet services firm Netcraft who found the certificates. Read More
 

Database attack exposes personal data at University of Maryland
Personal records for more than 309,000 students and staff were exposed this week in a "sophisticated" database attack at the University of Maryland, the university said Wednesday. Read More
 

 

FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it gets published, you get a sharp Shark shirt. Shark Tank FAQ

DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY
 

In our in-depth report, we chronicle how Android is exploding in the enterprise, document how mobile device management is morphing to meet new demands, reflect on the ways Google has developed into a surprisingly powerful ecosystem for end users, and share observations on BYOD's role in spawning a new army of empowered workers.

This free, 28-page magazine-style report is available now. [Registration required]

To read the report, click here.

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile hardware, mobile apps, enterprise apps and IT trends related to consumerization. We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization affects IT. Stay up to date with news, reviews and in-depth coverage.

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
  A recent survey found that 40% of tech support workers had to remove malware from devices after employees visited adult content sites. Is this a problem at your company?

NEW COMPUTERWORLD JOB BOARD
  Search multiple listings now and get new job alerts as they are posted.


 

Get more IT peer perspective online:
  LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_storage as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy
 
  If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **



 

 

 

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:56 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive