Peer Incite archive
From Wikibon
Line 30: | Line 30: | ||
|06-15-10||[[From Tape to the Cloud: Data backup strategies for SMBs]]||||00:00||{{Click||image=Icon_listen.gif|link= Media:06-15-10_Peer_Incite_-_mashup.mp3|width=67px|height=16px}}||53:52 | |06-15-10||[[From Tape to the Cloud: Data backup strategies for SMBs]]||||00:00||{{Click||image=Icon_listen.gif|link= Media:06-15-10_Peer_Incite_-_mashup.mp3|width=67px|height=16px}}||53:52 | ||
|- | |- | ||
- | |06-08-10||[[Primary Storage Optimization: Making Deduplication Invisible]]|| | + | |06-08-10||[[Primary Storage Optimization: Making Deduplication Invisible]]||||00:00||{{Click||image=Icon_listen.gif|link= Media:06-08-10_Peer_Incite.mp3|width=67px|height=16px}}||56:49 |
|- | |- | ||
- | |05-04-10||[[Disaster recovery, achieving zero data loss using asynchronous infrastructure]]|| | + | |05-04-10||[[Disaster recovery, achieving zero data loss using asynchronous infrastructure]]||||00:00||{{Click||image=Icon_listen.gif|link= Media:05-04-10_Peer_Incite.mp3|width=67px|height=16px}}||59:18 |
|- | |- | ||
- | |04-27-10||[[What's Next in VMware Backup]]|| | + | |04-27-10||[[What's Next in VMware Backup]]||||00:00||{{Click||image=Icon_listen.gif|link= Media:04-27-10_Peer_Incite.mp3|width=67px|height=16px}}||58:30 |
|- | |- | ||
- | |04-06-10||[[Common sense approaches to improving data center efficiency]]|| | + | |04-06-10||[[Common sense approaches to improving data center efficiency]]||||00:00||{{Click||image=Icon_listen.gif|link= Media:04-06-10_Peer_Incite.mp3|width=67px|height=16px}}||59:59 |
|- | |- | ||
- | |03-23-10||[[Should Function Reside in the Infrastructure or Application Stacks]]|| | + | |03-23-10||[[Should Function Reside in the Infrastructure or Application Stacks]]||||00:00||{{Click||image=Icon_listen.gif|link= Media:03-23-10_Peer_Incite.mp3|width=67px|height=16px}}||59:47 |
|- | |- | ||
- | |03-02-10||[[How Virtualization and Cloud Computing Change Business Continuity and Disaster Recovery]]|| | + | |03-02-10||[[How Virtualization and Cloud Computing Change Business Continuity and Disaster Recovery]]||||00:00||{{Click||image=Icon_listen.gif|link= Media:03-02-10_Peer_Incite.mp3|width=67px|height=16px}}||1:00:07 |
|- | |- | ||
- | |02-16-10||[[Information Governance and Transparency though Records Management]]|| | + | |02-16-10||[[Information Governance and Transparency though Records Management]]||||00:00||{{Click||image=Icon_listen.gif|link= Media:02-16-10_Peer_Incite.mp3|width=67px|height=16px}}||1:00:31 |
|- | |- | ||
- | |02-02-10||[[FCoE: Fact versus Fiction]]|| | + | |02-02-10||[[FCoE: Fact versus Fiction]]||||00:00||{{Click||image=Icon_listen.gif|link= Media:02-02-10_Peer_Incite.mp3|width=67px|height=16px}}||59:31 |
|- | |- | ||
|01-12-10||[[Opening Pandora's Box of SAN Management]]||{{Click||image=Icon_listen.gif|link= Media: .mp3|width=67px|height=16px}}||00:00||{{Click||image=Icon_listen.gif|link= Media:01-12-10 Peer Incite - long.mp3|width=67px|height=16px}}||58:50 | |01-12-10||[[Opening Pandora's Box of SAN Management]]||{{Click||image=Icon_listen.gif|link= Media: .mp3|width=67px|height=16px}}||00:00||{{Click||image=Icon_listen.gif|link= Media:01-12-10 Peer Incite - long.mp3|width=67px|height=16px}}||58:50 | ||
Line 52: | Line 52: | ||
|09-29-09||[[How CalTech manages to manage a billion files]]||{{Click||image=Icon_listen.gif|link= Media:09-29-09_How_Caltech_manages_-_mashup_short.mp3|width=67px|height=16px}}||6:55||{{Click||image=Icon_listen.gif|link= Media:09-29-09 Peer Incite - long mashup.mp3|width=67px|height=16px}}||16:37 | |09-29-09||[[How CalTech manages to manage a billion files]]||{{Click||image=Icon_listen.gif|link= Media:09-29-09_How_Caltech_manages_-_mashup_short.mp3|width=67px|height=16px}}||6:55||{{Click||image=Icon_listen.gif|link= Media:09-29-09 Peer Incite - long mashup.mp3|width=67px|height=16px}}||16:37 | ||
|- | |- | ||
- | |08-25-09||[[Using sourcing strategies to modernize legacy systems]]|| | + | |08-25-09||[[Using sourcing strategies to modernize legacy systems]]||||00:00||{{Click||image=Icon_listen.gif|link= Media:08-25-09 Peer Incite.mp3|width=67px|height=16px}}||1:01:48 |
|- | |- | ||
- | |07-28-09||[[Building a strategic information plan to tame unstructured data]]|| | + | |07-28-09||[[Building a strategic information plan to tame unstructured data]]||||00:00||||0:00:00 |
|- | |- | ||
- | |06-23-09||[[Huddle with Wikibon Analysts discussing NetApps Analyst briefing]]|| | + | |06-23-09||[[Huddle with Wikibon Analysts discussing NetApps Analyst briefing]]||||00:00||{{Click||image=Icon_listen.gif|link= Media:Huddle_with_Wikibon_on_NetApp.mp3 | width=67px|height=16px}}||49:47 |
|- | |- | ||
|06-11-09||[[Data compression for primary storage]]||{{Click||image=Icon_listen.gif|link= Media:Shopzilla_mashup-short_version.mp3 | width=67px|height=16px}}||05:18||{{Click||image=Icon_listen.gif|link= Media:Shopzilla_mashup_long_version.mp3 | width=67px|height=16px}}||30:09 | |06-11-09||[[Data compression for primary storage]]||{{Click||image=Icon_listen.gif|link= Media:Shopzilla_mashup-short_version.mp3 | width=67px|height=16px}}||05:18||{{Click||image=Icon_listen.gif|link= Media:Shopzilla_mashup_long_version.mp3 | width=67px|height=16px}}||30:09 | ||
Line 68: | Line 68: | ||
|02-24-09||[[Reducing Data Center Costs thru Improved Energy Efficiency]]|| ||NA||{{Click||image=Icon_listen.gif|link= Media:02-24-09_Energy_Efficiency_Panel.mp3 | width=67px|height=16px}}||58:31 | |02-24-09||[[Reducing Data Center Costs thru Improved Energy Efficiency]]|| ||NA||{{Click||image=Icon_listen.gif|link= Media:02-24-09_Energy_Efficiency_Panel.mp3 | width=67px|height=16px}}||58:31 | ||
|- | |- | ||
- | |02-03-09||[[Managing Archiving and Retention Risk|X-Pfizer IT Exec Unlocks Legal Risk Secrets - Part II]]||{{Click||image=Icon_listen.gif|link= Media:02-03-09_Archiving_Retention_Mashup_Part_2.mp3 | width=67px|height=16px}}||20:08|| | + | |02-03-09||[[Managing Archiving and Retention Risk|X-Pfizer IT Exec Unlocks Legal Risk Secrets - Part II]]||{{Click||image=Icon_listen.gif|link= Media:02-03-09_Archiving_Retention_Mashup_Part_2.mp3 | width=67px|height=16px}}||20:08||||00:00 |
|- | |- | ||
|02-03-09||[[Managing Archiving and Retention Risk|X-Pfizer IT Exec Unlocks Legal Risk Secrets - Part I]]||{{Click||image=Icon_listen.gif|link= Media:02-03-09_Peer_Incite_mashup.mp3 | width=67px|height=16px}}||19:48||{{Click||image=Icon_listen.gif|link= Media:02-03-09_Managing_archiving_and_retention_risk.mp3 | width=67px|height=16px}}||1:00:43 | |02-03-09||[[Managing Archiving and Retention Risk|X-Pfizer IT Exec Unlocks Legal Risk Secrets - Part I]]||{{Click||image=Icon_listen.gif|link= Media:02-03-09_Peer_Incite_mashup.mp3 | width=67px|height=16px}}||19:48||{{Click||image=Icon_listen.gif|link= Media:02-03-09_Managing_archiving_and_retention_risk.mp3 | width=67px|height=16px}}||1:00:43 |
Revision as of 15:10, 14 July 2010
The following are research notes from Wikibon's Peer Incite research meetings. The objectives of Peer Incites is to share information and best practices that can help customers apply technology to create business solutions.
Peer Incites are normally scheduled for the 1st & 3rd Tuesday of every month. These meetings are an open, moderated phone forum where a guest practitioner presents a premise to the community. Anyone can participate in the call, have a voice, ask questions or comment. The content of the call is ultimately geared toward the customer. The goal is to catalyze thought and action items that the community posts on Wikibon after the call.
Peer Incite calls are not vendor sponsored events, however Wikibon clients are allowed an opportunity to suggest topics and invite their customers to host calls.
Since we launched Wikibon, we've hosted many dozen Peer Incites attended by several thousand IT professionals. Thanks to everyone who participated and contributed content.
- If you'd like to participate or present, please Contact Us.
- If you would like to receive the Peer Incite Newsletter, please Signup in the Peer Incite Newsletter box in the lower right column.
- Check out proposed topics and Upcoming Peer Incites.