Smartphones and tablets equipped with fingerprint readers or other biometric hardware have the potential to drive greater adoption of biometric authentication in the enterprise—if we can get the hardware, software and business processes right.
Network Computing
Mobile Biometrics: The Next Phase of Enterprise Authentication?
Comments Off
Categories: General.
Red Hat Speeds Up Open Source Virtualization Race
Red Hat last week enhanced its open source alternative to Microsoft and VMware, Enterprise Virtualization 3.1, with the ability to mount larger virtual machines and achieve live migration across more storage systems than before.
It also cited the continued high performance of its kernel virtual machine, or open source KVM, in its Dec. 5th announcement.
Enterprise Virtualization 3.1 allows the creation of a virtual machine with up to 160 virtual CPUs and 2 TB of memory, said Red Hat’s Chuck Dubuque, senior manager of product marketing. That’s larger than the maximum 64 virtual CPUs and 1 TB of memory supported by Microsoft System Center’s Virtual Machine Manager or VMware’s vSphere 5.1.
Network Computing
Comments Off
Categories: General.
Savvis Cloud Storage Takes On Amazon, Google
Savvis is moving more convincingly into standard cloud services. The managed hosting provider launched Savvis Direct as a beta compute service Monday, following on its Dec. 3 launch of Symphony Cloud Storage, its long-term storage equivalent to Amazon’s S3.
Comments Off
Categories: General.
Does Microsoft Really Need To Make Its Own Hardware?
Steve Ballmer says Microsoft is seriously considering making more of its own hardware. It seems that even with the old guard of IBM, Dell, Toshiba, Sony and HP, and the new guard of Samsung, Lenovo, LG and Asus, and all those white-box manufacturers, Microsoft just can’t find a reliable design partner.
Have we come full circle to where we started 50 years ago, when hardware and software were inextricably intertwined and necessarily provided by the same company?
Looking at the actions of some of the world’s largest software houses, you could easily come to that conclusion. Microsoft now makes Surface, and it has made the Xbox for years. Google bought Motorola’s phone division, probably for its patent portfolio but also to make the Droids it thinks people want. Google also makes the Chromebook. Even Oracle had to have its own hardware division, though the performance of Sun doesn’t bear out the wisdom of that move. Its real play is purpose-built machines such as Exadata and Exalogic.
Network Computing
Comments Off
Categories: General.
Hot Flash: Researchers Use Heat to Counter NAND Flash Wear-n-Tear
Engineers have announced a new technique using heat to extend flash write/erase cycles from 10,000 to 100 million or more. But while tech breakthroughs are great, prudent management may be a better solution to flash’s lack of endurance.
Network Computing
Comments Off
Categories: General.
5 Steps For Good Database Hygiene
Some of the most important ways to reduce risk boil down to the fundamentals of security. Keep systems well-patched, prevent data from spreading around, make sure systems are properly segmented, and watch where you store valuable log-in data. Much like flossing, these good habits require day-to-day maintenance that will reap long-term benefits.
Here are what the experts say about the kinds of actions necessary to keep up on good database hygiene.
Comments Off
Categories: General.
Must ‘Cloud’ Translate To ‘Ungovernable’?
When IT services come from a mix of inside and outside assets, we need more control, not less. Enter ITSM.
Network Computing
Comments Off
Categories: General.
A UC Deployment’s Most Important Ingredient: the VAR
Picking the right UC technology is important, but unless you have unlimited IT resources you’ll be relying on outside services for deployment, training and more. The right VAR can make a UC rollout shine.
Network Computing
Comments Off
Categories: General.
Object Storage’s Path to the Enterprise
Object storage is a smart fit for enterprise use cases such as backup, but the need to write to custom APIs impedes adoption.
Network Computing
Comments Off
Categories: General.
