Portal:Storage

From Wikibon

(Difference between revisions)
Jump to: navigation, search
Line 7: Line 7:
'''[http://www.linkedin.com/groups?gid=835317&trk=hb_side_g >>Join our Group]'''
'''[http://www.linkedin.com/groups?gid=835317&trk=hb_side_g >>Join our Group]'''
-
 
[[Image:twitter.jpg|right|100px]]
[[Image:twitter.jpg|right|100px]]
'''[http://twitter.com/wikibon >>Follow @Wikibon]'''
'''[http://twitter.com/wikibon >>Follow @Wikibon]'''
-
 
[[Image:facebook.jpeg|right|100px]]
[[Image:facebook.jpeg|right|100px]]

Revision as of 00:22, 1 October 2009

The Wikibon Data Storage Portal contains data storage industry research, articles, expert opinion, case studies, and data storage company profiles.

>>Join our Group

>>Follow @Wikibon

>>Become a Fan


Wikitip

Do Businesses Take Information Security Seriously?

As more and more businesses use email as their preferred means of communication they open themselves up to the risk of their data ending up in the hands of the wrong recipient. A large majority of companies don’t have the correct security measures in place to enable them to encrypt any emails which contain sensitive information. This means that a) their data could end up in the hands of the wrong recipient, or b) they could face a large fine from the ICO for losing the data, as many health organizations and local councils have done this year.

A study that was recently carried out stated that many businesses were going to put a higher proportion of their budget into their online security in 2013, however one senior source claims that businesses are over reacting to information security. They have suggested that when a business decides to implement a plan to help bolster their online information they have a rather ‘gun ho’ approach whereby they secure each and every single piece of information rather than just selecting the most important details to secure – his argument is that many companies make it too complicated, when it could actually be fairly simple.

Whatever your approach, one thing is for sure, and that’s the fact that businesses do need to consider the very real threat of their data being hacked, and they need to ensure that the right measures are in place to prevent their information ending up with the wrong person. There has been lots of talk about information security lately, with many businesses now pledging to put more money into their businesses' information security due to many high-profile data breaches that have occurred just this year. Information assurance specialists, SBL, have further information on their website about the various information security solutions available.


View Another Wikitip

Featured Case Study

Virtualization Energizes Cal State University

John Charles is the CIO of California State University, East Bay (CSUEB) and Rich Avila is Director, Server & Network Operations. In late 2007 they were both looking down the barrel of a gun. The total amount of power being used in the data center was 67KVA. The maximum power from the current plant was 75kVA. PG&E had informed them that no more power could be delivered. They would be out of power in less than six months. A new data center was planned, but would not be available for two years.

read more...

Storage Professional Alerts


Featured How-To Note

Storage Virtualization Design and Deployment

A main impediment to storage virtualization is the lack of multiple storage vendor (heterogeneous) support within available virtualization technologies. This inhibits deployment across a data center. The only practical approach is either to implement a single vendor solution across the whole of the data center (practical only for small and some medium size data centers) or to implement virtualization in one or more of the largest storage pools within a data center.

read more...

Personal tools