Home

From Wikibon

(Difference between revisions)
Jump to: navigation, search
Line 1: Line 1:
__NOTOC__
__NOTOC__
-
'''''<u>Latest Peer Incites</u>:
+
'''''<u>Latest Peer Incites</u>:'''''
-
Six Wikibon experts break down EMC's recent analyst event'''''
+
'''''Six Wikibon experts break down EMC's recent analyst event'''''
{{Click||image=Icon_listen.gif|link= Media:12-16-08_EMC_Peer_Incite_mashup.mp3 | width=67px|height=16px}}  
{{Click||image=Icon_listen.gif|link= Media:12-16-08_EMC_Peer_Incite_mashup.mp3 | width=67px|height=16px}}  

Revision as of 03:59, 23 December 2008


Latest Peer Incites:

Six Wikibon experts break down EMC's recent analyst event

Media:12-16-08_EMC_Peer_Incite_mashup.mp3


Grant, a Sr. Storage Admin at a large bank discusses how heterogeneous storage virtualization can help reduce the budget for 2009.

Media:11-18-08_Peer_Incite_mashup.mp3‎

Wikitip

Portal:Information Security

Welcome to the Wikibon Information Security Portal.

The Information Security Portal is a new resource from The Wikibon Project for business and technology professionals interested in learning from peers and sharing knowledge about challenges in the industry, trends, emerging technologies, and best in class practices.

The Wikibon Project invites comments from industry practitioners, technology, services, and content providers on the Information Security Agenda: 2010- common threats faced as global community and the priorities shared by all industry sectors for solutions. The goal of the Wikibon Project is to provide an open, quality peer research and dialog platform, and through this platform, establish industry extensions and interactions that enable a collective effort to advance a common information security agenda for end-users and technologies in 2010 and beyond.

Wikitip

Move security investments to the data

Storage vendors will increasingly attempt to lead in the data security business as a natural extension of existing franchises. Users should evaluate solutions not only on their ability to protect the castle's perimeter (with moats and walls) but also on other techniques to protect the king when he's beyond the safety of the castle.

View Another Wikitip

Browse all Information Security Wikitips

Featured Research

Data Encryption Strategies

As the amount of digital data grows, so does the exposure to data loss. It is difficult to find a day when there hasn’t been a high-profile data security incident. The risk has reached such a level that data encryption is being implemented for stored data and mobile data, in addition to the traditional use of encrypting data in transit via the network.

read more...

Template:Information Security professional alerts

Featured How-to Note

Implementing Storage Network Security

In the early days of the computer industry, storage systems were physically large and resided within the confines of a controlled data center environment. Storage systems have evolved into lightweight devices and are easily accessible over corporate networks, making them more vulnerable to security breaches. Fueled by the growing costs of recovering from intrusions, public concerns over privacy and identity theft, and increased government regulations, businesses are spending more time and money to develop or improve storage network security systems.

read more...

Action Item:

Footnotes:

View Another Wikitip

Featured Case Study

Virtualization Energizes Cal State University

John Charles is the CIO of California State University, East Bay (CSUEB) and Rich Avila is Director, Server & Network Operations. In late 2007 they were both looking down the barrel of a gun. The total amount of power being used in the data center was 67KVA. The maximum power from the current plant was 75kVA. PG&E had informed them that no more power could be delivered. They would be out of power in less than six months. A new data center was planned, but would not be available for two years.

read more...

Storage Professional Alerts


Featured How-To Note

Storage Virtualization Design and Deployment

A main impediment to storage virtualization is the lack of multiple storage vendor (heterogeneous) support within available virtualization technologies. This inhibits deployment across a data center. The only practical approach is either to implement a single vendor solution across the whole of the data center (practical only for small and some medium size data centers) or to implement virtualization in one or more of the largest storage pools within a data center.

read more...






























Personal tools