Peer Incite archive
From Wikibon
m (Reverted edits by Wikibon Daemon (Talk) to last version by Dvellante) |
|||
Line 14: | Line 14: | ||
---- | ---- | ||
+ | |||
{|border="1" cellpadding="3" | {|border="1" cellpadding="3" | ||
Line 22: | Line 23: | ||
!width="80"|Audio/Short | !width="80"|Audio/Short | ||
!width="30"|Length | !width="30"|Length | ||
- | !width="30"|Audio/ | + | !width="30"|Audio/Long |
!width="30"|Length | !width="30"|Length | ||
|- | |- | ||
- | | | + | |03-02-10||[[How Virtualization and Cloud Computing Change Business Continuity and Disaster Recovery]]||{{Click||image=Icon_listen.gif|link= Media: .mp3|width=67px|height=16px}}||00:00||{{Click||image=Icon_listen.gif|link= Media:03-02-10_Peer_Incite.mp3|width=67px|height=16px}}||1:00:07 |
|- | |- | ||
- | | | + | |02-16-10||[[Information Governance and Transparency though Records Management]]||{{Click||image=Icon_listen.gif|link= Media: .mp3|width=67px|height=16px}}||00:00||{{Click||image=Icon_listen.gif|link= Media:02-16-10_Peer_Incite.mp3|width=67px|height=16px}}||1:00:31 |
|- | |- | ||
- | | | + | |02-02-10||[[FCoE: Fact versus Fiction]]||{{Click||image=Icon_listen.gif|link= Media: .mp3|width=67px|height=16px}}||00:00||{{Click||image=Icon_listen.gif|link= Media:02-02-10_Peer_Incite.mp3|width=67px|height=16px}}||59:31 |
|- | |- | ||
- | + | |01-12-10||[[Opening Pandora's Box of SAN Management]]||{{Click||image=Icon_listen.gif|link= Media: .mp3|width=67px|height=16px}}||00:00||{{Click||image=Icon_listen.gif|link= Media:01-12-10 Peer Incite - long.mp3|width=67px|height=16px}}||58:50 | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
|- | |- | ||
|11-17-09||[[How Strand architected a remote office backup and recovery with a DR twist]]||{{Click||image=Icon_listen.gif|link= Media: 11-17-09 Peer Incite short mashup.mp3|width=67px|height=16px}}||07:33||{{Click||image=Icon_listen.gif|link= Media:11-17-09_Peer_incite_-_Long_mashup.mp3|width=67px|height=16px}}||29:23 | |11-17-09||[[How Strand architected a remote office backup and recovery with a DR twist]]||{{Click||image=Icon_listen.gif|link= Media: 11-17-09 Peer Incite short mashup.mp3|width=67px|height=16px}}||07:33||{{Click||image=Icon_listen.gif|link= Media:11-17-09_Peer_incite_-_Long_mashup.mp3|width=67px|height=16px}}||29:23 | ||
Line 97: | Line 38: | ||
|09-29-09||[[How CalTech manages to manage a billion files]]||{{Click||image=Icon_listen.gif|link= Media:09-29-09_How_Caltech_manages_-_mashup_short.mp3|width=67px|height=16px}}||6:55||{{Click||image=Icon_listen.gif|link= Media:09-29-09 Peer Incite - long mashup.mp3|width=67px|height=16px}}||16:37 | |09-29-09||[[How CalTech manages to manage a billion files]]||{{Click||image=Icon_listen.gif|link= Media:09-29-09_How_Caltech_manages_-_mashup_short.mp3|width=67px|height=16px}}||6:55||{{Click||image=Icon_listen.gif|link= Media:09-29-09 Peer Incite - long mashup.mp3|width=67px|height=16px}}||16:37 | ||
|- | |- | ||
- | |08-25-09||[[Using sourcing strategies to modernize legacy systems]]||||||{{Click||image=Icon_listen.gif|link= Media:08-25-09 Peer Incite.mp3|width=67px|height=16px}}||1:01:48 | + | |08-25-09||[[Using sourcing strategies to modernize legacy systems]]||{{Click||image=Icon_listen.gif|link= Media:.mp3 | width=67px|height=16px}}||00:00||{{Click||image=Icon_listen.gif|link= Media:08-25-09 Peer Incite.mp3|width=67px|height=16px}}||1:01:48 |
|- | |- | ||
- | |07-28-09||[[Building a strategic information plan to tame unstructured data]]|||||||| | + | |07-28-09||[[Building a strategic information plan to tame unstructured data]]||{{Click||image=Icon_listen.gif|link= Media:.mp3 | width=67px|height=16px}}||00:00||{{Click||image=Icon_listen.gif|link= Media:.mp3 | width=67px|height=16px}}||0:00:00 |
|- | |- | ||
- | |06-23-09||[[Huddle with Wikibon Analysts discussing NetApps Analyst briefing]]||||||{{Click||image=Icon_listen.gif|link= Media:Huddle_with_Wikibon_on_NetApp.mp3|width=67px|height=16px}}||49:47 | + | |06-23-09||[[Huddle with Wikibon Analysts discussing NetApps Analyst briefing]]||{{Click||image=Icon_listen.gif|link= Media:.mp3 | width=67px|height=16px}}||00:00||{{Click||image=Icon_listen.gif|link= Media:Huddle_with_Wikibon_on_NetApp.mp3 | width=67px|height=16px}}||49:47 |
|- | |- | ||
|06-11-09||[[Data compression for primary storage]]||{{Click||image=Icon_listen.gif|link= Media:Shopzilla_mashup-short_version.mp3 | width=67px|height=16px}}||05:18||{{Click||image=Icon_listen.gif|link= Media:Shopzilla_mashup_long_version.mp3 | width=67px|height=16px}}||30:09 | |06-11-09||[[Data compression for primary storage]]||{{Click||image=Icon_listen.gif|link= Media:Shopzilla_mashup-short_version.mp3 | width=67px|height=16px}}||05:18||{{Click||image=Icon_listen.gif|link= Media:Shopzilla_mashup_long_version.mp3 | width=67px|height=16px}}||30:09 | ||
|- | |- | ||
- | |05-26-09||[[EMC World 2009]]||||||{{Click||image=Icon_listen.gif|link= Media:05-26-09_Peer_Incite_EMC_World_2009.mp3 | width=67px|height=16px}}||1:05:76 | + | |05-26-09||[[EMC World 2009]]||||NA||{{Click||image=Icon_listen.gif|link= Media:05-26-09_Peer_Incite_EMC_World_2009.mp3 | width=67px|height=16px}}||1:05:76 |
|- | |- | ||
- | |03-17-09||[[Virtualization Energizes California State University East Bay]]||||||{{Click||image=Icon_listen.gif|link= Media:03-17-09_Virtualization_Energizes_Cal_State.mp3 | width=67px|height=16px}}||57:38 | + | |03-17-09||[[Virtualization Energizes California State University East Bay]]||||NA||{{Click||image=Icon_listen.gif|link= Media:03-17-09_Virtualization_Energizes_Cal_State.mp3 | width=67px|height=16px}}||57:38 |
|- | |- | ||
- | |02-24-09||Improving Energy Efficiency - Part 1: JCPenney's Green IT Tips||{{Click||image=Icon_listen.gif|link= Media:Daryl_Molitor_Short-1.mp3 | width=67px|height=16px}}||05:57|||| | + | |02-24-09||Improving Energy Efficiency - Part 1: JCPenney's Green IT Tips||{{Click||image=Icon_listen.gif|link= Media:Daryl_Molitor_Short-1.mp3 | width=67px|height=16px}}||05:57||||NA |
|- | |- | ||
- | |02-24-09||[[Reducing Data Center Costs thru Improved Energy Efficiency]]|| ||||{{Click||image=Icon_listen.gif|link= Media:02-24-09_Energy_Efficiency_Panel.mp3 | width=67px|height=16px}}||58:31 | + | |02-24-09||[[Reducing Data Center Costs thru Improved Energy Efficiency]]|| ||NA||{{Click||image=Icon_listen.gif|link= Media:02-24-09_Energy_Efficiency_Panel.mp3 | width=67px|height=16px}}||58:31 |
|- | |- | ||
- | |02-03-09||[[Managing Archiving and Retention Risk|X-Pfizer IT Exec Unlocks Legal Risk Secrets - Part II]]||{{Click||image=Icon_listen.gif|link= Media:02-03-09_Archiving_Retention_Mashup_Part_2.mp3 | width=67px|height=16px}}||20:08|||| | + | |02-03-09||[[Managing Archiving and Retention Risk|X-Pfizer IT Exec Unlocks Legal Risk Secrets - Part II]]||{{Click||image=Icon_listen.gif|link= Media:02-03-09_Archiving_Retention_Mashup_Part_2.mp3 | width=67px|height=16px}}||20:08||{{Click||image=Icon_listen.gif|link= Media: .mp3 | width=67px|height=16px}}||00:00 |
|- | |- | ||
|02-03-09||[[Managing Archiving and Retention Risk|X-Pfizer IT Exec Unlocks Legal Risk Secrets - Part I]]||{{Click||image=Icon_listen.gif|link= Media:02-03-09_Peer_Incite_mashup.mp3 | width=67px|height=16px}}||19:48||{{Click||image=Icon_listen.gif|link= Media:02-03-09_Managing_archiving_and_retention_risk.mp3 | width=67px|height=16px}}||1:00:43 | |02-03-09||[[Managing Archiving and Retention Risk|X-Pfizer IT Exec Unlocks Legal Risk Secrets - Part I]]||{{Click||image=Icon_listen.gif|link= Media:02-03-09_Peer_Incite_mashup.mp3 | width=67px|height=16px}}||19:48||{{Click||image=Icon_listen.gif|link= Media:02-03-09_Managing_archiving_and_retention_risk.mp3 | width=67px|height=16px}}||1:00:43 | ||
Line 147: | Line 88: | ||
|02-19-08||[[Developing a storage services architecture]]||{{Click||image=Icon_listen.gif|link= Media:02-19-08_Architecting_storage_services_summary.mp3 | width=67px|height=16px}}||06:28||{{Click||image=Icon_listen.gif|link= Media:02-19-08_Architecting_storage_services.mp3 | width=67px|height=16px}}||1:06:24 | |02-19-08||[[Developing a storage services architecture]]||{{Click||image=Icon_listen.gif|link= Media:02-19-08_Architecting_storage_services_summary.mp3 | width=67px|height=16px}}||06:28||{{Click||image=Icon_listen.gif|link= Media:02-19-08_Architecting_storage_services.mp3 | width=67px|height=16px}}||1:06:24 | ||
|- | |- | ||
- | |02-05-08||[[Remote Backup Services: Requirements and Alternatives]]||{{Click||image=Icon_listen.gif|link= Media:02-05-08_Remote_Backup_Services.mp3|width=67px|height=16px}}||05:10|||| | + | |02-05-08||[[Remote Backup Services: Requirements and Alternatives]]||{{Click||image=Icon_listen.gif|link= Media:02-05-08_Remote_Backup_Services.mp3 | width=67px|height=16px}}||05:10||{{Click||image=Icon_listen.gif|link= Media:02-05-08_.mp3 | width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |01-22-08||[[EMC's DMX Enhancement Announcement]]||{{Click||image=Icon_listen.gif|link= Media:01-22-08_EMC's_DMX_enhancement_announcement.mp3 | width=67px|height=16px}}||06:24|||| | + | |01-22-08||[[EMC's DMX Enhancement Announcement]]||{{Click||image=Icon_listen.gif|link= Media:01-22-08_EMC's_DMX_enhancement_announcement.mp3 | width=67px|height=16px}}||06:24||{{Click||image=Icon_listen.gif|link= Media:01-22-08_.mp3 | width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |01-15-08||[[IBM's acquisition of XIV]]||{{Click||image=Icon_listen.gif|link= Media:01-15-08_IBM_buys_XIV_summary.mp3 | width=67px|height=16px}}||04:38|||| | + | |01-15-08||[[IBM's acquisition of XIV]]||{{Click||image=Icon_listen.gif|link= Media:01-15-08_IBM_buys_XIV_summary.mp3 | width=67px|height=16px}}||04:38||{{Click||image=Icon_listen.gif|link= Media:01-15-08_IBM_buys_XIV.mp3 | width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |12-11-07||[[Clustered storage]]||{{Click||image=Icon_listen.gif|link= Media:12-11-07_Clustered_storage_summary.mp3 | width=67px|height=16px}}||07:00|||| | + | |12-11-07||[[Clustered storage]]||{{Click||image=Icon_listen.gif|link= Media:12-11-07_Clustered_storage_summary.mp3 | width=67px|height=16px}}||07:00||{{Click||image=Icon_listen.gif|link= Media:12-11-07.mp3 | width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |12-04-07||[[Disk drive power consumption, what can be done?]]||{{Click||image=Icon_listen.gif|link= Media:12-04-07_Disk_drive_power_consumption_summary.mp3 | width=67px|height=16px}}||06:41|||| | + | |12-04-07||[[Disk drive power consumption, what can be done?]]||{{Click||image=Icon_listen.gif|link= Media:12-04-07_Disk_drive_power_consumption_summary.mp3 | width=67px|height=16px}}||06:41||{{Click||image=Icon_listen.gif|link= Media:12-04-07_.mp3 | width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |11-20-07||[[Maximizing storage returns from your EMC relationship]]||{{Click||image=Icon_listen.gif|link= Media:11-20-07_Optimizing_EMC_investment.mp3 | width=67px|height=16px}}||07:15|||| | + | |11-20-07||[[Maximizing storage returns from your EMC relationship]]||{{Click||image=Icon_listen.gif|link= Media:11-20-07_Optimizing_EMC_investment.mp3 | width=67px|height=16px}}||07:15||{{Click||image=Icon_listen.gif|link= Media:11-20-07_.mp3 | width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |11-06-07||[[Hitachi announcement review]]||{{Click||image=Icon_listen.gif|link= Media:11-06-07_Hitachi_announcement_summary.mp3 | width=67px|height=16px}}||08:50|||| | + | |11-06-07||[[Hitachi announcement review]]||{{Click||image=Icon_listen.gif|link= Media:11-06-07_Hitachi_announcement_summary.mp3 | width=67px|height=16px}}||08:50||{{Click||image=Icon_listen.gif|link= Media:11-06-07.mp3 | width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |10-30-07||[[Green storage procurement options]]||{{Click||image=Icon_listen.gif|link= Media:Green_storage_summary_10-30-07.mp3 | width=67px|height=16px}}||05:16|||| | + | |10-30-07||[[Green storage procurement options]]||{{Click||image=Icon_listen.gif|link= Media:Green_storage_summary_10-30-07.mp3 | width=67px|height=16px}}||05:16||{{Click||image=Icon_listen.gif|link= Media:10-30-07.mp3 | width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |10-23-07||[[IBM storage announcement]]||{{Click||image=Icon_listen.gif|link= Media:IBM_announcement_10-23-07.mp3 | width=67px|height=16px}}||05:52|||| | + | |10-23-07||[[IBM storage announcement]]||{{Click||image=Icon_listen.gif|link= Media:IBM_announcement_10-23-07.mp3 | width=67px|height=16px}}||05:52||{{Click||image=Icon_listen.gif|link= Media:10-23-07.mp3 | width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |10-09-07||[[Maximizing storage returns from your IBM relationship]]||{{Click||image=Icon_listen.gif|link= Media:Optimizing_storage_returns_on_IBM_investment_10-09-07.mp3 | width=67px|height=16px}}||07:50|||| | + | |10-09-07||[[Maximizing storage returns from your IBM relationship]]||{{Click||image=Icon_listen.gif|link= Media:Optimizing_storage_returns_on_IBM_investment_10-09-07.mp3 | width=67px|height=16px}}||07:50||{{Click||image=Icon_listen.gif|link= Media:10-09-07.mp3 | width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |09-25-07||[[Selecting virtualization approaches ]]||{{Click||image=Icon_listen.gif|link= Media:Selecting_virtualization_approaches_summary.mp3 | width=67px|height=16px}}||04:46|||| | + | |09-25-07||[[Selecting virtualization approaches ]]||{{Click||image=Icon_listen.gif|link= Media:Selecting_virtualization_approaches_summary.mp3 | width=67px|height=16px}}||04:46||{{Click||image=Icon_listen.gif|link= Media:.mp3 | width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |09-18-07||[[Storage resource management (SRM)]]||{{Click||image=Icon_listen.gif|link= Media:Storage_resource_management_-_SRM.mp3 | width=67px|height=16px}}||04:38|||| | + | |09-18-07||[[Storage resource management (SRM)]]||{{Click||image=Icon_listen.gif|link= Media:Storage_resource_management_-_SRM.mp3 | width=67px|height=16px}}||04:38||{{Click||image=Icon_listen.gif|link= Media:.mp3 | width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |09-11-07||[[Infrastructure for email archiving]]||{{Click||image=Icon_listen.gif|link= Media:Infrastructure_for_email_archiving_09-11-07.mp3 | width=67px|height=16px}}||05:38|||| | + | |09-11-07||[[Infrastructure for email archiving]]||{{Click||image=Icon_listen.gif|link= Media:Infrastructure_for_email_archiving_09-11-07.mp3 | width=67px|height=16px}}||05:38||{{Click||image=Icon_listen.gif|link= Media:.mp3 | width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |09-04-07||[[Virtual tape strategies]]||{{Click||image=Icon_listen.gif|link= Media:Virtual_tape_strategies_summary.mp3 | width=67px|height=16px}}||03:56|||| | + | |09-04-07||[[Virtual tape strategies]]||{{Click||image=Icon_listen.gif|link= Media:Virtual_tape_strategies_summary.mp3 | width=67px|height=16px}}||03:56||{{Click||image=Icon_listen.gif|link= Media:.mp3 | width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |08-28-07||[[Continuous data protection]]||{{Click||image=Icon_listen.gif|link= Media:Continuous_Data_Protection_summary.mp3 | width=67px|height=16px}}||04:35|||| | + | |08-28-07||[[Continuous data protection]]||{{Click||image=Icon_listen.gif|link= Media:Continuous_Data_Protection_summary.mp3 | width=67px|height=16px}}||04:35||{{Click||image=Icon_listen.gif|link= Media:.mp3 | width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |08-14-07||[[Re-visiting e-mail archiving strategies]]||{{Click||image=Icon_listen.gif|link= Media:08-14-07_Re-visiting_e-mail_archiving_strategies.mp3 | width=67px|height=16px}}||04:41|||| | + | |08-14-07||[[Re-visiting e-mail archiving strategies]]||{{Click||image=Icon_listen.gif|link= Media:08-14-07_Re-visiting_e-mail_archiving_strategies.mp3 | width=67px|height=16px}}||04:41||{{Click||image=Icon_listen.gif|link= Media:.mp3 | width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |08-04-07||[[Strategies for Storage Consolidation]]||{{Click||image=Icon_listen.gif|link= Media:08-07-07_Research_mtg-Strategies_for_storage_consol_summary.mp3 | width=67px|height=16px}}||05:52|||| | + | |08-04-07||[[Strategies for Storage Consolidation]]||{{Click||image=Icon_listen.gif|link= Media:08-07-07_Research_mtg-Strategies_for_storage_consol_summary.mp3 | width=67px|height=16px}}||05:52||{{Click||image=Icon_listen.gif|link= Media:.mp3 | width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |07-31-07||[[How-to optimize and justify DR expenditures]]||{{Click||image=Icon_listen.gif|link= Media:How-to_optimize_and_justify_dr_expenditures.mp3| width=67px|height=16px}}||05:59|||| | + | |07-31-07||[[How-to optimize and justify DR expenditures]]||{{Click||image=Icon_listen.gif|link= Media:How-to_optimize_and_justify_dr_expenditures.mp3| width=67px|height=16px}}||05:59||{{Click||image=Icon_listen.gif|link= Media:.mp3| width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |07-24-07||[[EMC's 07-16-07 Platform Announcement]]||{{Click||image=Icon_listen.gif|link= Media:EMC_7-16-07_announcement_summary.mp3| width=67px|height=16px}}||05:29|||| | + | |07-24-07||[[EMC's 07-16-07 Platform Announcement]]||{{Click||image=Icon_listen.gif|link= Media:EMC_7-16-07_announcement_summary.mp3| width=67px|height=16px}}||05:29||{{Click||image=Icon_listen.gif|link= Media:.mp3| width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |07-17-07||[[Storage security]]||{{Click||image=Icon_listen.gif|link= Media:Storage_security.mp3| width=67px|height=16px}}||05:26|||| | + | |07-17-07||[[Storage security]]||{{Click||image=Icon_listen.gif|link= Media:Storage_security.mp3| width=67px|height=16px}}||05:26||{{Click||image=Icon_listen.gif|link= Media:.mp3| width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |07-10-07||[[Can tape be eliminated?]]||{{Click||image=Icon_listen.gif|link= Media:Can_tape_be_eliminated.mp3| width=67px|height=16px}}||04:12|||| | + | |07-10-07||[[Can tape be eliminated?]]||{{Click||image=Icon_listen.gif|link= Media:Can_tape_be_eliminated.mp3| width=67px|height=16px}}||04:12||{{Click||image=Icon_listen.gif|link= Media:.mp3| width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |07-03-07||[[Mobile device impact on enterprise storage]]||{{Click||image=Icon_listen.gif|link= Media:Mobile device impact on enterprise storage.mp3| width=67px|height=16px}}||03:29|||| | + | |07-03-07||[[Mobile device impact on enterprise storage]]||{{Click||image=Icon_listen.gif|link= Media:Mobile device impact on enterprise storage.mp3| width=67px|height=16px}}||03:29||{{Click||image=Icon_listen.gif|link= Media:.mp3| width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |06-26-07||[[Tiered storage]]||{{Click||image=Icon_listen.gif|link= Media:Tiered storage.mp3| width=67px|height=16px}}||05:45|||| | + | |06-26-07||[[Tiered storage]]||{{Click||image=Icon_listen.gif|link= Media:Tiered storage.mp3| width=67px|height=16px}}||05:45||{{Click||image=Icon_listen.gif|link= Media:.mp3| width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |06-19-07||[[Google storage]]||{{Click||image=Icon_listen.gif|link= Media:Google storage.mp3| width=67px|height=16px}}||06:00|||| | + | |06-19-07||[[Google storage]]||{{Click||image=Icon_listen.gif|link= Media:Google storage.mp3| width=67px|height=16px}}||06:00||{{Click||image=Icon_listen.gif|link= Media:.mp3| width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |06-12-07||[[Recording the change to records management]]||{{Click||image=Icon_listen.gif|link= Media:Recording the Change to Records Management.mp3| width=67px|height=16px}}||05:24|||| | + | |06-12-07||[[Recording the change to records management]]||{{Click||image=Icon_listen.gif|link= Media:Recording the Change to Records Management.mp3| width=67px|height=16px}}||05:24||{{Click||image=Icon_listen.gif|link= Media:.mp3| width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |06-04-07||[[Predicting data deduplication]]||{{Click||image=Icon_listen.gif|link= Media:Predicting Data Deduplication.mp3|width=67px|height=16px}}||05:34|||| | + | |06-04-07||[[Predicting data deduplication]]||{{Click||image=Icon_listen.gif|link= Media:Predicting Data Deduplication.mp3|width=67px|height=16px}}||05:34||{{Click||image=Icon_listen.gif|link= Media:.mp3| width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |05-29-07||[[iSCSI and the future of SAN]]||{{Click||image=Icon_listen.gif|link= Media:ISCSI and the Future of SAN.mp3| width=67px|height=16px}}||03:45|||| | + | |05-29-07||[[iSCSI and the future of SAN]]||{{Click||image=Icon_listen.gif|link= Media:ISCSI and the Future of SAN.mp3| width=67px|height=16px}}||03:45||{{Click||image=Icon_listen.gif|link= Media:.mp3| width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |05-22-07||[[Data deduplication and the NetApp IBM Announcements]]||{{Click||image=Icon_listen.gif|link= Media:Data Deduplication & the NetApp IBM Announcement.mp3| width=67px|height=16px}}||04:37|||| | + | |05-22-07||[[Data deduplication and the NetApp IBM Announcements]]||{{Click||image=Icon_listen.gif|link= Media:Data Deduplication & the NetApp IBM Announcement.mp3| width=67px|height=16px}}||04:37||{{Click||image=Icon_listen.gif|link= Media:.mp3| width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |05-15-07||[[Hitachi USPV and Thin Provisioning]]||{{Click||image=Icon_listen.gif|link= Media:Hitachi's USPV and Thin Provisioning.mp3| width=67px|height=16px}}||04:55|||| | + | |05-15-07||[[Hitachi USPV and Thin Provisioning]]||{{Click||image=Icon_listen.gif|link= Media:Hitachi's USPV and Thin Provisioning.mp3| width=67px|height=16px}}||04:55||{{Click||image=Icon_listen.gif|link= Media:.mp3| width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |05-08-07||[[At Your Storage Service]]||{{Click||image=Icon_listen.gif|link= Media:At your storage service.mp3| width=67px|height=16px}}||04:47|||| | + | |05-08-07||[[At Your Storage Service]]||{{Click||image=Icon_listen.gif|link= Media:At your storage service.mp3| width=67px|height=16px}}||04:47||{{Click||image=Icon_listen.gif|link= Media:.mp3| width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |05-01-07||[[The State of Big NAS]]||{{Click||image=Icon_listen.gif|link= Media:The State of Big NAS.mp3| width=67px|height=16px}}||04:54|||| | + | |05-01-07||[[The State of Big NAS]]||{{Click||image=Icon_listen.gif|link= Media:The State of Big NAS.mp3| width=67px|height=16px}}||04:54||{{Click||image=Icon_listen.gif|link= Media:.mp3| width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |04-25-07||[[IBM's Grid Access Manager]]||{{Click||image=Icon_listen.gif|link= Media:IBM Grid Access Manager.mp3| width=67px|height=16px}}||03:45|||| | + | |04-25-07||[[IBM's Grid Access Manager]]||{{Click||image=Icon_listen.gif|link= Media:IBM Grid Access Manager.mp3| width=67px|height=16px}}||03:45||{{Click||image=Icon_listen.gif|link= Media:.mp3| width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |04-18-07||[[Green Computing]]||{{Click||image=Icon_listen.gif|link= Media:Green Computing.mp3| width=67px|height=16px}}||04:27|||| | + | |04-18-07||[[Green Computing]]||{{Click||image=Icon_listen.gif|link= Media:Green Computing.mp3| width=67px|height=16px}}||04:27||{{Click||image=Icon_listen.gif|link= Media:.mp3| width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |04-10-07||[[Blade Servers]]||{{Click||image=Icon_listen.gif|link= Media:Blade Servers.mp3| width=67px|height=16px}}||06:12|||| | + | |04-10-07||[[Blade Servers]]||{{Click||image=Icon_listen.gif|link= Media:Blade Servers.mp3| width=67px|height=16px}}||06:12||{{Click||image=Icon_listen.gif|link= Media:.mp3| width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |03-27-07||[[Data Classification]]||{{Click||image=Icon_listen.gif|link= Media:Data Classification.mp3| width=67px|height=16px}}||02:57|||| | + | |03-27-07||[[Data Classification]]||{{Click||image=Icon_listen.gif|link= Media:Data Classification.mp3| width=67px|height=16px}}||02:57||{{Click||image=Icon_listen.gif|link= Media:.mp3| width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |03-20-07||[[Storage Virtualization]]||{{Click||image=Icon_listen.gif|link= Media:Storage virtualization.mp3| width=67px|height=16px}}||04:42|||| | + | |03-20-07||[[Storage Virtualization]]||{{Click||image=Icon_listen.gif|link= Media:Storage virtualization.mp3| width=67px|height=16px}}||04:42||{{Click||image=Icon_listen.gif|link= Media:.mp3| width=67px|height=16px}}||00:00 |
|- | |- | ||
- | |03-13-07||[[Storage Services Architecture]]||{{Click||image=Icon_listen.gif|link= Media:Storage Services Architecture.mp3| width=67px|height=16px}}||05:08|||| | + | |03-13-07||[[Storage Services Architecture]]||{{Click||image=Icon_listen.gif|link= Media:Storage Services Architecture.mp3| width=67px|height=16px}}||05:08||{{Click||image=Icon_listen.gif|link= Media:.mp3| width=67px|height=16px}}||00:00 |
|- | |- | ||
|03-06-07||[[Email Archiving]]||{{Click||image=Icon_listen.gif|link= Media:E-Mail archiving summary.mp3| width=67px|height=16px}}||05:47||{{Click||image=Icon_listen.gif|link= Media:03-06-07_Email_archiving.mp3| width=67px|height=16px}}||50:45 | |03-06-07||[[Email Archiving]]||{{Click||image=Icon_listen.gif|link= Media:E-Mail archiving summary.mp3| width=67px|height=16px}}||05:47||{{Click||image=Icon_listen.gif|link= Media:03-06-07_Email_archiving.mp3| width=67px|height=16px}}||50:45 | ||
|- | |- | ||
- | |02-26-07||[[3-Node Disaster Recovery]]|||||||| | + | |02-26-07||[[3-Node Disaster Recovery]]||{{Click||image=Icon_listen.gif|link= Media:.mp3| width=67px|height=16px}}||N/A||{{Click||image=Icon_listen.gif|link= Media:.mp3| width=67px|height=16px}}||N/A |
+ | |||
Line 245: | Line 187: | ||
- | [[Category:Peer Incite newsletters]][[Category: Podcasts]] | + | [[Category:Misc]][[Category: Peer Incite newsletters]][[Category: Podcasts]] |
Revision as of 21:07, 17 August 2012
The following are research notes from Wikibon's Peer Incite research meetings. The objectives of Peer Incites is to share information and best practices that can help customers apply technology to create business solutions.
Peer Incites are normally scheduled for the 1st & 3rd Tuesday of every month. These meetings are an open, moderated phone forum where a guest practitioner presents a premise to the community. Anyone can participate in the call, have a voice, ask questions or comment. The content of the call is ultimately geared toward the customer. The goal is to catalyze thought and action items that the community posts on Wikibon after the call.
Peer Incite calls are not vendor sponsored events, however Wikibon clients are allowed an opportunity to suggest topics and invite their customers to host calls.
Since we launched Wikibon, we've hosted many dozen Peer Incites attended by several thousand IT professionals. Thanks to everyone who participated and contributed content.
- If you'd like to participate or present, please Contact Us.
- If you would like to receive the Peer Incite Newsletter, please Signup in the Peer Incite Newsletter box in the lower right column.
- Check out proposed topics and Upcoming Peer Incites.