- Welcome Guest
- Sign In
Recovery point objective metrics are commonly defined as how much data a system can afford to lose without endangering business processes. Let's face facts: Some applications require zero-data-loss protection both within one site and between sites. These applications move millions of dollars or pot...
I played with a number of titles, including "How Google Is the New Standard Oil," "Google the new Slave Master," and "Should Google be Nationalized or Regulated?" I chose this one because it would both get your attention and address the fact that Google is taking advantage of all of us, no matter h...
The winds of change are buffeting businesses like never before. Consumer and workforce demands for Web 2.0 technology, the need to cut costs by going to the cloud, and the continuing need to control general spending in this economy are among the forces currently hammering away at enterprises. That's...
year over year, the amount of Internet traffic has grown and will continue to grow. These trends are facilitated by the continuous growth of smartphone usage and the recent introduction of the iPad. This growth in Internet traffic means that most websites today are expected to see more traffic and m...
Seagate Monday began shipping its second-generation hybrid solid state/hard disk drive to original equipment manufacturers and its sales channels. The Seagate Momentus XT is priced much lower than full solid-state drives. The device spins at 7,200 RPMs and comes in capacities of 250 GB, 320 GB and 5...
Working for a disaster recovery solutions designer is often difficult. After being bombarded by ad slogans, magazine articles and just plain life experience, many company executives are looking to achieve a mythical figure for server uptime. Perceived uptime of 99.999 percent -- or "five nines" --...
No company can afford to have a disaster disrupt its business. Despite this, the opportunity and technology costs of a feasible disaster recovery plan have traditionally been too high for the masses to properly plan for and ensure continuity. However, recent advancements in infrastructure and the pr...
The Federal Trade Commission has responded to an April 29 letter from Rep. Edward J. Markey, D-Mass., expressing concerns about sensitive data stored on digital copiers' hard drives. Markey's letter followed CBS News' April 19 airing of a report on its investigation into the matter. The FTC said it ...
Server virtualization has crossed the proverbial chasm. Not long ago, when deploying new servers, one had to justify making them virtual, rather than physical. Now, IT managers in many organizations have decreed "virtual first" policies, requiring new server deployments to be virtual unless there is...
Much has been said recently about virtual servers and networks and their ability to both save IT groups hardware costs and let users access software applications and Web-based tools regardless of location. However, data storage has remained a sticking point in the full realization of cloud-based com...
Google may have been the primary target of a sharp attack by privacy commissioners from 10 nations on Tuesday, but later that same day, the company revealed a new tool that could effectively turn the tables on those and other governments. Specifically, the company's new Government Requests tool is d...
IBM is joining forces with the U.S. Federal Aviation Administration to protect the nation's civilian aviation system from the ever-growing threat of cyberattacks. They are working on building a prototype security system capable of protecting the vast amount of information flowing daily through the F...
Victorinox, maker of the Swiss Army Knife, has come out with a model that would make James Bond proud: a pocket knife with a super-secure USB stick. How secure is the Secure Pro USB stick? Well, it's equipped with both a fingerprint reader and a thermal scanner so, if someone cuts off your finger an...
Cloud computing -- certainly a hot topic at the RSA conference held earlier this month in San Francisco -- is in some ways being eclipsed by security and accountability concerns. Who owns the data? Who is answerable if the cloud fails? Who is responsible if a virtual machine holding data from a comp...
The Google model survived the dot-com mess but its success seems based largely on the belief that advertising can fund everything. If the users are unhappy, well it doesn't really matter. In fact, Google's customers (the folks paying them money) and the folks they actually serve are quiet different,...