(Go: >> BACK << -|- >> HOME <<)



Ads by TechWords

See your link here


Subscribe to our e-mail newsletters
For more info on a specific newsletter, click the title. Details will be displayed in a new window.
Data Management
Storage
Computerworld Daily News (First Look and Wrap-Up)
Computerworld Blogs Newsletter
The Weekly Top 10
More E-Mail Newsletters 
Computerworld 2007Subscribe to Computerworld
40 years of the most authoritative source of news and information for IT leaders.

New disk encryption standards could complicate data recovery
The Trusted Computing Group's new specification for drive encryption at the hardware level means that all disks will be able to communicate with encryption management software no matter the vendor. The downside: If a user loses a password or breaks a drive, data recovery won't be easy. Read more...

Study: Data breaches continue to get more costly for businesses

SonicWall introduces management appliance

With economic slump, concerns rise over data theft

Backup merger unites Barracuda, Yosemite

Oracle takes aim at Salesforce with on-demand CRM update

CommVault adds de-duplication to data management software

Seagate releases new firmware for broken hard drives

Update: Seagate offers free data recovery for faulty drives, new firmware

HP adds orchestration, recovery to Adaptive Infrastructure

More Disaster Recovery StoriesMore Top Stories

Would the bird flu kill the Internet, too?


Supply chain execs share disaster-planning techniques
Sturdy IT systems, strong lines of communication with trading partners, and training exercises can help businesses prepare for management during a disaster, according to a panel of supply chain experts at the Retail Systems show held in Chicago this spring.

Disaster recovery high on SAN user's list
When Michael Amble's storage-area network is down, it costs the financial-services firm he works for US$4 million per hour.

Affordable disaster recovery
Q: When will disaster recovery solutions become attainable by "normal" companies? -- D.H., Rochester, N.Y.

Oracle Bringing Fusion Plan to Users, Exec Says
John Wookey, senior vice president of applications development at Oracle, said the firm plans to ship pieces of its next-generation Fusion applications to users this year.

Your Identity: 'Costanza Style'
Your identity is like George Costanza's wallet. Really. Think about it. Do you remember the classic Seinfeld episode? The one where George wouldn't give up his ever-expanding wallet filled with store credit cards, Irish money, a coupon for an Orlando Exxon gas station and several Sweet and Low packets. This, in spite of the obvious physical pain it caused and the security threat all of that imposed.

Locked Down in Transit
T managers often are hampered in their efforts to protect tapes and laptops because they buy into one or more of these six myths about movable media.

Costs of a Data Breach: Can You Afford $6.65 Million?
Affixing a dollar cost to a problem has immense benefit, and The Ponemon Institute goes to great lengths to arrive at the figures for its Annual Cost of a Data Breach Study.

Social engineering: Anatomy of a hack
How a social engineering expert gained access to extremely sensitive information with little more than a thrift-shop shirt, a plate of cookies and a Linksys box.

Is West Wing BlackBerry Security Possible?
Former White House Deputy Chief of Staff Joe Hagin is the guy who planned George W. Bush's secret trips to Iraq and Afghanistan and oversaw renovations to the Situation Room and press briefing room. He was also the one in charge of securing every BlackBerry used in the West Wing.

Ever wonder what powers eHarmony, Plenty of Fish, True.com and PerfectMatch.com? We peek under the covers at online dating sites.
Apple's office suite gets a number of evolutionary updates this year, along with iWork.com, Apple's take on Web-based document sharing.
Technology that will sync Amazon's Kindle 2 e-reader with a range of other mobile devices may open up a new world of interoperability.
Can interactive tools from the likes of WebMD and MayoClinic.com really find what ails you? Watch our video and see for yourself.
Get the latest news, reviews and more about Microsoft's newest desktop operating system
Find wage data for 50 IT job titles.
The Top Ten Reasons to Rethink Application and Network Management
(Source: Extrahop Networks) Applications have evolved tremendously in recent years, with major advancements in functionality coupled with increasing complexity. Virtualization, Attached Storage, SOA, Cloud etc. all add to the complexity and make IT's job harder in the process. This white paper explores these management challenges and discusses fresh new approaches for effective Application Management.
More White Papers More White Papers
Sign up now for complimentary access to these upcoming Computerworld webcasts.
LIVE Feb 26, 2009 11:00 AM ET
E-mail Address:
(Required)
 Storage
 Storage Hardware
 Disaster Recovery
"It took a while, but Debian 5 is finally here, and it has all of its old virtues and several..." Read more Read More Blogs

"An article in the Wall Street Journal discusses assorted scams involving job ads...." Read more Read More Blogs

"Here is the typical process for scoping out internal penetration tests for those companies that need to be compliant with..." Read more Read More Blogs

More Security Blogs More Security Blogs
See all Computerworld Blogs See all Computerworld Blogs
White Papers
Virtualization Technologies and Their Impact on Disaster Recovery
Double-Take Software delivers enterprise-class disaster recovery and high availability solutions for cutting-edge virtual environments. Learn how your business can leverage virtual technologies to achieve complete confidence in the unparalleled data protection, availability, and recoverability while simplifying your overall IT management.
Download this white paper now! 
Winning Enterprise Authentication: 5 Key Steps for Success
Winning Enterprise Authentication: 5 Key Steps for Success
View this on demand webcast, compliments of Entrust, for a limited time only!
Go to the webcast 
Trend Micro Gets Smart with a Hybrid Approach
Download this white paper. Brought to you by Trend Micro
(Source: Trend Micro) In this Analyst Brief, written by IDC, Chris Christensen remarks on the Trend Micro conference that highlighted their new Smart Protection Network. SPN promises to reduce endpoint resource consumption, network bandwidth consumption, malware, and overall risk. Discover how your organization can extend the lifecycle and usefulness of your gateways, with additional input from IDC.
Download this executive briefing download
Simplifying Enterprise File Management
Get this white paper now!
(Source: Brocade) This paper describes how Brocade FAN solutions provide a cost-effective approach to file consolidation and migration in distributed environments.
Download this white paper go
White Papers
Read up on the latest ideas and technologies from companies that sell hardware, software and services.
The Trend from Unix to Linux in SAP Data Centers
Building a Reliable and Dynamic Data Center with PAN Manager by Egenera
IT Service Management: Metrics That Matter
View more whitepapers 
Premier 100
For more information or to register, please visit premier100.com.

Storage Networking World (SNW)
For more information or to register, please visit snwusa.com.

Mobile & Wireless World (MWW)
For more information or to register, please visit mwwusa.com.

Infrastructure Management World (IMW)
For more information or to register, please visit imworldusa.com.

Business Intelligence Perspectives
For more information or to register, please visit biperspectives.com.

IT Executive Summits
For more information or to register, please visit itexecutivesummit.com.
See all events see all events

Forrester Analyst Report: X86 Server Virtualization For High Availability and Disaster Recovery
According to a recent Forrester study, 49% of enterprises surveyed that are implementing or interested in x86 server virtualization. In particular, x86 server virtualization can improve the availability of business-critical systems that are important to the business but not critical enough to warrant the investment in expensive and complex resiliency technologies like fault-tolerant hardware or clustering.

Download this whitepaper 
Yankee Group. "Disaster Strikes! Is Your Business Ready? Disaster Preparedness for Mid-Sized Firms"
Mid-sized businesses have long struggled to protect their IT systems. Many firms are inadequately protected and mistakenly think that a disaster is rare and won't happen to them anytime soon. This custom Yankee Group Report studies the newest technology trends, such as virtualization and storage replication, which make powerful DR solutions attainable and affordable even for mid-sized businesses.

Download this whitepaper 
VMware White Paper: Transforming Disaster Recovery - VMware Infrastructure for rapid, reliable and cost-effective Disaster Recovery
VMware Infrastructure transforms disaster recovery by providing you fast, reliable and cost-effective disaster recovery. Why suffer from the slow, expensive and unreliable problems associated with traditional disaster recovery solution? VMware makes disaster recovery affordable through consolidation savings and re-use of existing servers for your disaster recovery site. Experience the speed of virtualization!

Download this whitepaper