You Are Browsing ‘Data Security ’ Category

Posted on May 2 2012 - 10:33am by admin
Comments Off on Case Study: DuPont Accelerates Innovation And Savings With R&D Cloud
DuPont is one of the world’s premier science companies. Its Central Research & Development (CR&D) IT leaders wanted to provide the company’s scientists with the power and flexibility of cloud-enhanced computing for its scientific application portfolio. DuPont CR&D chose the Intel® Xeon® processor 7500 series as the foundation of its science-focused highperformance computing (HPC) cloud. Now the processor’s perfor...
Posted on May 2 2012 - 7:00am by admin
Comments Off on Data Center Efficiency And Optimization
Data center managers will face a lot of challenges over the next few years. In many facilities, three pressing problems need to be solved in the immediate future: limited power, increasing cooling demands, and space constraints.     Provided by   ...
Posted on May 2 2012 - 6:10am by admin
Comments Off on Gain A Business Advantage With Scale-Out Storage
You are probably well aware of the challenges facing data centers today. A full 17 percent of IT budgets are devoted to storage,1 and power and cooling costs represent as much as 40 percent of operational expenses. And that’s just today. Corporate data is expected to increase by 650 percent in just five years, from 2009 to 2015.   Provided by   ...
Posted on May 2 2012 - 5:33am by admin
Comments Off on Intelligent Power Management Improves Rack Density
One of the greatest challenges for data center operators today is the increasing cost of power and cooling as a portion of the total cost of operation. Power and cooling costs indata centers have risen sharply over the past several years—as much as 400 percent in the span of a decade.1 In many data centers, electricity now represents as much as half of total operating expenses.2 Of equal concern is capacity. In 2007, IDC found that 40 percent o...
Posted on May 2 2012 - 4:52am by admin
Comments Off on Vendor Round Table: Cloud Security
This guide is designed to help you better evaluate different cloud technology vendors and service providers based on a series of questions posed to three cloud infrastructure providers, three managed or hosted infrastructure providers, and three cloud technology providers. Their answers include: Descriptions of the security components of the current offerings, including solution architecture and user benefits How the current offerings protect data ...
Posted on Feb 15 2012 - 6:44am by admin
Comments Off on Intel IT: Implementing Cloud Storage Metrics
For many businesses, transitioning to an enterprise private cloud to improve storage efficiency can require extensive amounts of time and planning. Evaluating which technology best fits your enterprise can be complex, but it's crucial in ensuring a successful transition. Access this white paper to learn how implementing cloud storage metrics can help you choose the right technology for increasing IT productivity and capacity management in your enterpr...
Posted on Feb 15 2012 - 6:29am by admin
Comments Off on Intel IT: Implementing And Expanding A Virtualized Environment
While businesses strive to find ways to deliver the most efficient cloud deployment possible in their enterprise, the security issues can make it difficult. IT professionals can utilize deployment platforms to mitigate the challenges that arise in a cost-effective manner. Access this exclusive resource to discover how to effectively balance cloud security and network performance.   Provided by   ...
Posted on May 11 2011 - 3:33am by admin
Comments Off on DEFEND – Data Protection For Businesses With Remote Offices Across Multiple Locations
A study conducted by industry analyst Enterprise Strategy Group found that the top three IT priorities for remote office / branch office (ROBO) locations were driven by business priorities: to improve information security, ensure regulatory compliance, and enhance disaster recovery2. However, the many choices in data protection technologies and approaches, coupled with a wide range of vendors to choose from, can make data protection planning a dauntin...
Posted on Aug 14 2007 - 2:12pm by Newsfeed
Comments Off on Ukraine finally battens down its leaky cyber hatches after attacks
(Source: Reuters) It wasn't the only symptom of lax IT security in a country suffering crippling cyber attacks. Sometimes pressing the spacebar was enough to open a PC, according ......