Wednesday, March 4, 2015

Salesforce, SAP to get a shot of IoT data

  Salesforce, SAP to get a shot of IoT data | What happens inside Amazon when there's a Xen vulnerability

 
  ITworld Data Center Strategies

Google Plus LinkedIn Facebook Twitter


 

INSIDER
How to connect to enterprise Wi-Fi security on Android devices
Connecting to wireless networks using the enterprise or 802.1X mode of Wi-Fi security is a bit different compared to using the personal or pre-shared key (PSK) mode. Here's what you need to know. Read More

 


WHITE PAPER: BMC Software
 
An Insightful Approach to Optimize Mainframe MLC Spend
This paper, "An Insightful Approach to Optimizing Mainframe MLC Costs," discusses how you can penetrate the complexity of IBM mainframe MLC products and the MLC price model to gain insight into the MLC cost drivers and leverage that insight to optimize MLC spend. Learn More

WHITE PAPER: BMC Software
 
Five Levers to Lower Mainframe MLC Costs
This paper discusses five levers you can use to lower your mainframe MLC costs by up to 20 percent or more. Explore best practices and real-world examples of dramatic savings through a mainframe MLC optimization strategy based on higher visibility, predictability, and automation. Learn More

Salesforce, SAP to get a shot of IoT data
The Internet of Things is really an Internet of data about things, and combining that information with other kinds of knowledge could add to its impact.At Mobile World Congress this week, data is starting to come together in new ways. One of the most powerful combinations may emerge from partnerships between IoT veteran Jasper Technologies and two software giants: Salesforce.com and SAP.Jasper sells a SaaS platform that companies use to monitor and control products or equipment in the field. It's designed to handle all the functions involved in making money from a device or just using it within an enterprise, including setup, ongoing service and data collection. Jasper sells its SaaS through mobile operators, and the platform can be deployed through multiple carriers to give customers global reach.To read this article in full or to leave a comment, please click here Read More
 

What happens inside Amazon when there's a Xen vulnerability
Amazon Web Services last year was estimated by Gartner to be five times bigger than its next 14 competitors combined. That's a lot of virtual machines. And they all run on a customized version of the open source Xen hypervisor, so when the Xen code has a security vulnerability, that's a big deal for AWS.In the past six months AWS has twice had to reboot some of its Elastic Compute Cloud (EC2) servers because of a Xen vulnerability. In September, 2014 about 10% of EC2 instances were rebooted and just this week AWS announced that about 0.1% of instances had to be rebooted to install a security patch. That may not sound like a lot, but at the scale AWS operates, it's still a large number.To read this article in full or to leave a comment, please click here Read More
 

Intel CEO Krzanich: What we're doing to succeed on smartphones
Intel is looking to partners to help make its mark in smartphones Read More
 

SanDisk's InfiniFlash is a new storage format that will sell for under $1/GB
InfiniFlash is Sandisk's new all-flash platform for applications such as video streaming or high-peformance databases Read More
 


WHITE PAPER: HP

Next-Generation IPS and Firewall: Why You Need Both
Next-generation enterprise firewalls include intrusion prevention system technology that enables them to spot and block cyber attacks. But they do not replace IPS solutions--you need both. This HP business white paper shows how NGFW and next-generation IPS (NGIPS) are complementary security solutions that work together to secure your network. Learn more >>

Spain's Telefonica goes virtual with HP
The international carrier will virtualize functions in its network for more flexibility Read More
 

Google scores a win in SOPA-tinged Mississippi case
  Google contends the case was cooked up with help from the Motion Picture Association of America Read More
 

Brocade acquires mobile SDN company
Brocade has announced plans to acquire Connectem, a privately-held company whose virtualization software maps mobile workloads to clouds. Read More
 

Will network disaggregation play in the enterprise?
  HP is the latest to decouple merchant silicon-based hardware from operating system software, following Dell and Juniper. The strategy is to attract web-scale companies like Google, Facebook and Amazon who need the flexibility, choice, rapid deployment/decommissioning and cost efficiency of commodity "white box" switches capable of running a variety of software packages. Read More
 

Break me if you can: 4 rugged tablets put to the test
Tablets are useful, but can be fragile. These four tablets -- three Windows and one Android -- will take a licking and keep on ticking. Read More
 

 

BECOME AN ITWORLD INSIDER

Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

- R programming beginner's guide
- IT Resume Makeover: Emphasize your 'X factor'
- 4 open source monitoring tools that deserve a look
- Free and cheap ways to learn about IT security
- PowerShell for beginners: Scripts and loops
- Six Ted talks that can change your career

What are you waiting for? Sign up today!

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.


 
 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_server_and_datacenter_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2015 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.