The Wikibon Data Storage Portal contains data storage industry research, articles, expert opinion, case studies, and data storage company profiles.
Latest Information Storage Research
>>Join our Group | >>Become a Fan | >>Follow @Wikibon | >>Read the Blog |
WikitipWhy use email encryptionA lot of hype surrounds online security, with antivirus software, firewalls and other forms of security. But an important factor that should be addressed is email encryption. If you were to send a letter with a check or important information enclosed, you would make sure the envelope was sealed. You could also track the letter or insure the contents, so why would you send an unprotected email? Email encryption will stop hackers from seeing confidential emails, and you can use a personal email certificate to sign your email to let receivers know it’s you. Having your own email certificate to digitally sign your emails will help receivers distinguish your emails from spam emails. Email encryption works with a public and private key, where you will use the private key and the public key is given to anyone you wish. If someone wants to send you a private email they will use the public key and your private key is used to decrypt the message. It is important to remember to encrypt all emails so the important messages do not attract hackers. |
Featured Case StudyVirtualization Energizes Cal State UniversityJohn Charles is the CIO of California State University, East Bay (CSUEB) and Rich Avila is Director, Server & Network Operations. In late 2007 they were both looking down the barrel of a gun. The total amount of power being used in the data center was 67KVA. The maximum power from the current plant was 75kVA. PG&E had informed them that no more power could be delivered. They would be out of power in less than six months. A new data center was planned, but would not be available for two years. |
|
Featured How-To Note |
Storage Virtualization Design and DeploymentA main impediment to storage virtualization is the lack of multiple storage vendor (heterogeneous) support within available virtualization technologies. This inhibits deployment across a data center. The only practical approach is either to implement a single vendor solution across the whole of the data center (practical only for small and some medium size data centers) or to implement virtualization in one or more of the largest storage pools within a data center. |