Wednesday, October 30, 2013

China's Baidu works on bringing software to smartwatches, wearable devices

China's Baidu works on bringing software to smartwatches, wearable devices | Dell to show its first 64-bit ARM server this week

ITworld Data Center Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


Hadoop is not enough for 'big data', says Facebook analytics chief
The Hadoop programming framework may be synonymous with the "big data" movement but it's not the only tool companies need to derive insights from massive stores of unstructured information, according to Facebook analytics chief Ken Rudin. Read More


WEBCAST: IBM and Intel

The Future of x86 Platforms is Here
You need an IT infrastructure that provides scalability, performance and efficiency tailored to the specific goals of your business. Watch this on-demand webcast to learn more about IBM's new innovation designed to provide the performance and efficiency required for today's workloads. Watch Now

RESOURCE COMPLIMENTS OF: VMTurbo

Get the Most Out of Your Virtual Environment
How can you ensure the performance of applications while getting the most out of your virtualized environment? VMTurbo taps into the increased agility provided by virtualization to continually tune, adjust, and plan how the infrastructure is optimized based on the needs and demands of your entire infrastructure while reducing IT costs by 20-40%. Try it free in your environment

China's Baidu works on bringing software to smartwatches, wearable devices
Chinese search giant Baidu is gearing up to break into the wearable devices market, with what appears to be software made to run on smartwatches, and even weighing scales. Read More

Dell to show its first 64-bit ARM server this week
Dell will give its first public demonstration of a 64-bit ARM server this week, the latest step in an industrywide effort to build servers based on low-power chips like those used in smartphones. Read More

Seagate Kinetic - Cloud storage on a disk, no server required
Building your own storage area network (SAN) involves many layers, not the least of which is the server layer communicating with the storage devices. Seagate has recently announced a new storage architecture called Kinetic that builds server-like functionality and ethernet right on the drive itself. Read More


WHITE PAPER: Akamai Technologies, Inc.

Demonstrate the Business Value of Security
This Forrester report highlights the most common mistakes made in the budgeting process and offers Forrester's step-by-step Information Security Value Model to guide you through a strategy to support smart investment and resource allocation. Learn More

Mozilla developing geolocation data service for public use
Mozilla is working on a geolocation data service using cell tower and Wi-Fi signals to give developers what it says will be a more privacy-aware option than current alternatives. Read More

Zuckerberg said what about privacy? Researchers create archive to find out
Facebook CEO Mark Zuckerberg sometimes speaks quickly and his statements on Internet privacy are not always clear, so researchers have created an archive to collect everything the executive has said publicly, aimed at gaining a better understanding of where the company stands on privacy. Read More

HP sues seven optical drive makers over price-fixing
HP has filed suit against seven makers of optical disk drive technology, claiming that over a six-year period the group conspired to drive up the price of products sold to HP and others. Read More

Cloud-based app suite takes aim at e-discovery speed and cost
A company that helps enterprises through e-discovery will give customers new tools to streamline the process and cut costs. Read More


BOOK GIVEAWAY:

The drawings end October 31. Enter now for your chance to win one of these two new books!

The Official Ubuntu Server Book, 3rd Ed.
Written by leading members of the Ubuntu community, The Official Ubuntu Server Book, Third Edition, covers all you need to know to make the most of Ubuntu Server, whether you're a beginner or a battle-hardened senior systems administrator.

The Practice of Network Security Monitoring
Learn how to deploy, build, and run a network security monitoring (NSM) operation using open source software and vendor-neutral tools.

DON'T MISS...

Arg! The 9 hardest things programmers have to do

7 tools that help protect you against the NSA and Google

Obsolete! Careers that are being automated into oblivion

15 geeky places to visit before you die

13 unsung women of technology


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_server_and_datacenter_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.