Seagate is inching closer to the next evolution of disk technology – heat-assisted magnetic recording (HAMR) – with the demonstration of 1 terabit (1 trillion bits) per square inch and the intention of releasing 3.5-inch hard drives with up to 60 terabytes capacity as early as 2015. That’s double the capacity of the current drive technology, Perpendicular Magnetic Recording (PMR), which replaced longitudinal recording, starting in 2006.
Network Computing
Seagate’s HAMR Time: Can’t Touch This…Yet!
Comments Off
Categories: General.
RIM Returning to Roots to Attempt Rebound
It was not a great day for RIM,or its new CEO Thorsten Heins. The quarterly earnings report was worse than expected, and drove another nail in the coffin of the iconic mobile platform company. But, big changes are coming as Heins makes some aggressive moves and tries to stage a comeback.
Comments Off
Categories: General.
Boundary Hosts Network Monitoring Service
Real-time network monitoring is quickly becoming a must have capability for network managers supporting transaction intensive networks, especially when cloud based applications are involved.
Network Computing
Comments Off
Categories: General.
Data Classification Tips And Technologies
As data continues to grow in terabytes in the enterprise, classifying it based on its sensitivity has never been more important. According to a just-released InformationWeek report, 10 Steps to Effective Data Classification, an organizational classification program defines policy requirements; specific classifications, generally as “secret,” “private,” “confidential” and “public,” and their associated data types; processes and procedures; accountability metrics; and repercussions from not following the rules, according to author Erik Bataller, a senior consultant with information security consultancy Neohapsis.
Network Computing
Comments Off
Categories: General.
Zetta.net Cloud Backup & Recovery Service Refresh Offers 10X Better Performance
Zetta.net has announced a new version of its cloud-based online backup and data recovery DataProtect service. Version 3.0 now gives users the ability to protect Structured Query Language and Windows System State files, and will soon offer the ability to protect Microsoft Exchange files, as well as continuing to provide support for the unstructured data files, VMWare, and data restore to dissimilar hardware that the company had previously offered. Other new features in this release include the ability to support the Macintosh platform as well as the Windows and multiple Linux platforms that were already supported, and improved data transfer speeds of up to ten times using features such as a local metadata cache, deduplication, and advanced network data compression.
Network Computing
Comments Off
Categories: General.
The BYOD Security Dilemma
The Information Security Forum this week released a report titled ‘Threat Horizon 2014′ that looks at the continued global threat to computer networks, businesses and individuals from cybercrime. But one section of the report also looks at ‘Internal Threats’, which at first glance would seem like another discussion about malicious insiders who attack the network because they’re disgruntled. In fact, the Internal Threats identified in this report are from new technology that comes into an organization, sometimes presenting security issues its advocates weren’t aware of. A case in point is BYOD.
Network Computing
Comments Off
Categories: General.
5 Secure Switch Management Best Practices
One of the easiest things an organization can do to help increase the security posture of their infrastructure is to implement a policy and standard for secure management. Often overlooked, or not fully executed, this is what I consider to be the low hanging fruit of network security.
Network Computing
Comments Off
Categories: General.
How To Set Up A Certificate Authority In 10 Minutes
Having a company owned certificate authority makes managing your network devices simpler and more secure. There is nothing inherently wrong with self-signed certs, but you can do better. You can build a CA issue your first certificate in about 10 minutes. Here is how to do it.
Network Computing
Comments Off
Categories: General.
Zero to Private Cloud in 8 Steps
Zero to Private Cloud in 8 Steps: notice I didn’t say easy. Don’t let that bother you, nothing that’s easy is ever worth doing anyway. Here are the 8 steps to guide you down the path to Private Cloud.
Network Computing
Comments Off
Categories: General.
Equinix, Tier 3 Tackle Public Cloud Worries
An Infrastructure as a Service (IaaS) provider, Tier 3, is partnering with data center services provider Equinix to enable enterprises to run a private cloud computing environment on a public cloud service. The idea is to help customers take advantage of the cost-efficiency and flexibility offered by public cloud computing, while protecting them from worries about multi-tenancy and security that give so many enterprises pause.
Network Computing
Comments Off
Categories: General.
