Expert Analysis
Content posted in August 2010
<<   <   Page 5 / 5
What Comes After Dedupe?
Commentary  |  8/4/2010  | 
There has been a lot written about deduplication. It has become commonplace in backup and is quickly becoming a requirement in primary storage. Once every system has in some form and deduplication is broadly available, what do we do next to optimize storage? After all, storage growth isn't going to stop and while deduplication and compression will slow some of that growth we know that files will continue to get larger and the number of files that are created will increase.
Symantec Report Chronicles Sloppy Data Retention Practices
News  |  8/3/2010  | 
A study by Symantec shows that while most businesses believe in the value of a data retention plan, fewer than half follow one, resulting in increased expense and reduced efficiency as they basically follow a "save everything" policy in practice. The Symantec Information Management Health Check, the result of a global survey of 1,680 businesses in 26 countries, shows that while 87 percent of respondents believe in the value of a formal information retention plan, only 46 percent actually have on
Blood Center Draws On Flow Technology To Monitor IT Performance
News  |  8/3/2010  | 
It wasn't that long ago that Puget Sound Blood Center (PSBC) had to pore through various system logs to uncover problems and determine whether the trouble was with its network or its applications. But now, the Washington nonprofit blood center can check bandwidth, network performance, link utilization and more in real time--all in an effort to ensure its services such as transfusions and transplantation support are available to the more than 200 hospitals and clinics it serves across the Northwe
SonicWall Launches New SSL VPN Appliance
News  |  8/3/2010  | 
SonicWall has announced the Secure Remote Access (SRA) 1200 SSL VPN appliance, which fits between the SRA 200 and SRA 4200 models. The SRA 1200 is intended for use in SMBs, and at branch offices of larger companies, supporting between five and fifty concurrent remote users. The SRA creates SSL VPN connections for remote access to a corporate Web portal, allowing employees secure access while working remotely. It can also be used to provide controlled secure access by contractors, customers, supp
Cleversafe: Making Information Safe Inside And Outside The Cloud
Commentary  |  8/3/2010  | 
Cloud computing attracts a lot of attention, but it is also being examined closely for whether it meets specific business requirements. Data security tops executive concerns, but other issues such as availability and scalability are often mentioned as well. Cleversafe has come up with a very interesting approach that addresses these and other issues. Founded in 2004, Cleversafe is a small (about 40 employees) company headquartered in Chicago. The focus of its hardware is on data protection with
MonkeyBrains: Silly Name, Serious Broadband
News  |  8/3/2010  | 
A three-man ISP in San Francisco's Mission District is providing Internet broadband that's two to three times faster than the U.S. average for less than $40 per month.
Security Specialists Support Cyberwarfare
News  |  8/3/2010  | 
Two-thirds of information security aficionados back government-promulgated online spying, hacking, or surreptitious malware installs, finds Sophos.
Windows 7 Surpasses Vista, But XP Still Dominates
News  |  8/2/2010  | 
Windows 7 in July surpassed its predecessor Vista in global usage share, but the older XP continued to dominate by a wide margin, an analysis firm says. At the end of last month, Windows 7 had a 14.46% share, while Vista fell to 14.34 percent, according to NetApplications. When Microsoft released Windows 7 to retail in October 2009, Vista had an 18.83 percent share.
Wholesaler Builds A Private Cloud With Virtual I/O
News  |  8/2/2010  | 
Supplies Network, a privately-owned wholesaler of IT products, decided to roll out a virtual I/O product as part of its ongoing efforts to modernize its data center. The company has virtualized all its servers and is building out a private cloud infrastructure. The goal of this modernization is to boost scalability and performance while cutting costs and complexity, so the last thing the St. Louis-based company wanted was a complicated, expensive cabling infrastructure to connect its private clo
Mobile Broadband Predicted To Reach 1 Billion Connections
News  |  8/2/2010  | 
Use of mobile data is growing exponentially, but data revenue is lagging with compound annual growth rates projected to be 55% and 42%, respectively, according to ABI Research.
IT Admins Say Web 2.0 Undermines Enterprise Security
News  |  8/2/2010  | 
Spending on Internet security technology lags perceived risk, finds Check Point-sponsored study from Ponemon Institute.
NTT DoCoMo To Acquire PacketVideo
News  |  8/2/2010  | 
Japanese carrier, which previously purchased 35% stake, will buy out rest of PacketVideo for $116 million.
Check Point Announces New Software To Control Facebook, Other Web Apps
News  |  8/2/2010  | 
Employees have access to thousands of Web applications, from productive business tools to benign time-wasters to apps that represent serious security threats. Wildly popular Web 2.0 apps such as Facebook can fit into any one of those categories, which makes it difficult for enterprises to define and enforce policies that protect the business without stifling legitimate activity. Check Point Software Technologies aims to help with new software that provides policy-based application control. The C
<<   <   Page 5 / 5


Cartoon
White Papers
Register for Network Computing Newsletters
Current Issue
2014 State of Unified Communications
2014 State of Unified Communications
If you thought consumerization killed UC, think again: 70% of our 488 respondents have or plan to put systems in place. Of those, 34% will roll UC out to 76% or more of their user base. And there’s some good news for UCaaS providers.
Video
Slideshows
Twitter Feed