High-tech

High-tech
Light

Thursday, January 9, 2014

Cloud's worst-case scenario: What to do if your provider goes belly up

---------- Forwarded message ----------
From: "Network World Daily News AM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jan 9, 2014 8:29 AM
Subject: Cloud's worst-case scenario: What to do if your provider goes belly up
To: <aquarianm@gmail.com>
Cc:

Worst data breaches of 2013

IBM launches business unit to make Watson a moneymaker

Network World Daily News AM
January 09, 2014
Share this email

Cloud's worst-case scenario: What to do if your provider goes belly up

Last September customers of storage provider Nirvanix got what could be worst-case scenario news for a cloud user: The company was going out of business and they had to get data out, fast.

READ MORE
 

Issue highlights

1. Worst data breaches of 2013

2. IBM launches business unit to make Watson a moneymaker

3. INSIDER 5 ways that BYOD is shaking up tech support

4. Internet of Ca-chings

5. 3 reasons AT&T's sponsored data plan isn't the end of the world

6. The NSA blame game: Singling out RSA diverts attention from others

7. World of Warcraft attack highlights two-factor authentication weakness

8. Windows Phone 8.0 is upgradeable to 8.1, Microsoft says

9. 3D printer prices drop, food printers arrive at CES

10. CES 2014: D-Link shows 802.11ac gear, new colors for routers and a Baby Camera

11. Best of CES 2014: In Pictures

WHITE PAPER: APC by Schneider Electric

Data Center Projects: Project Management

In data center design/build projects, flaws in project management and coordination are a common – but unnecessary – cause of delays, expense, and frustration. This paper presents a framework for project management roles and relationships that is understandable, comprehensive, and adaptable to any size project. View more

Worst data breaches of 2013

These businesses and government agencies lost the most personal and financial records due to hackers or security mishaps last year READ MORE

IBM launches business unit to make Watson a moneymaker

IBM continues to commercialize its Watson-branded cognitive computing technology, setting up a new Watson business unit and unveiling two new Watson-derived services. READ MORE

INSIDER

5 ways that BYOD is shaking up tech support

Amid the clamor of "bring your own device" (BYOD), a question lurks in the background: "What happens to technical service and support?" Concerns for the tech support function encompass the extremes, from agents being overwhelmed with calls, to their becoming inhabitants of a help desk ghost town. READ MORE

WHITE PAPER: APC by Schneider Electric

Types of Prefabricated Modular Data Centers

There are important distinctions between the types of data center factory-built building blocks on the market. This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, and compares their key attributes. View more

Internet of Ca-chings

The Internet of Everything could generate $4.6 trillion in value for public sector organizations over the next decade by helping them save money, improve employee productivity, generate new revenue without increasing taxes, and enhancing citizen benefits. So says a new Cisco study released at this week's CES conference. READ MORE

3 reasons AT&T's sponsored data plan isn't the end of the world

AT&T rattled some cages this week when it announced at CES a plan to let companies sponsor network access to reach specific websites or streaming content. The idea is that such deals would allow companies to serve up high-bandwidth content without their customers – especially mobile customers -- worrying that they'll blow out their data plan limits and end up paying big bucks just to watch a commercial.... READ MORE

The NSA blame game: Singling out RSA diverts attention from others

RSA may have earned much of the criticism being heaped upon it for allegedly enabling a backdoor in one of its encryption technologies under a contract with the National Security Agency. But singling out the company for reproach deflects attention from the role that other technology vendors may have had in enabling the NSA's data collection activities. READ MORE

WEBCAST: Egnyte

Consider Hybrid Approach to File-Sharing

Security. Scalability. Control. These are just some of the many benefits of enterprise cloud file-sharing that you'll discover in this KnowledgeVault, packed with short videos, white papers and demos. View Now!

World of Warcraft attack highlights two-factor authentication weakness

New malware targeting users of the online role-playing game World of Warcraft exploits a weakness that exists in many forms of two-factor authentication. READ MORE

Windows Phone 8.0 is upgradeable to 8.1, Microsoft says

Windows Phone 8.1, expected to launch in the spring, will be backwards compatible to Windows Phone 8.0, contrary to some earlier reports from industry sources, a Microsoft official told Computerworld today. READ MORE

3D printer prices drop, food printers arrive at CES

The number of 3D printer vendors rose from five last year to more than 20 this year, and prices for their machines have come down dramatically. READ MORE

CES 2014: D-Link shows 802.11ac gear, new colors for routers and a Baby Camera

CES 2014: D-Link shows 802.11ac gear, new colors for routers and a Baby Camera D-Link's CES announcements included a new 802.11ac wireless range extender, a new portable travel router, color versions of its existing routers and an IP ca... From: Network World Videos Views: 0 0 ratings Time: 02:28 More in Science & Technology READ MORE

Best of CES 2014: In Pictures

Here's what's grabbing our attention right now at the sprawling CES 2014 gadget show in Las Vegas READ MORE

WEBCAST: SAP

The Path to Big Data

Hear from top IDC analyst, about the path you can start taking now to enable your organization to get the benefits of turning data into actionable insights with exciting x86 technology. Is the data explosion today a liability or a competitive advantage for your business? View now

SLIDESHOWS

2014's 25 Geekiest 25th Anniversaries

A look back at the most memorable tech-related happenings of 1989.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Analyst: Save millions, don't renew Microsoft Enterprise Agreements

2. Best of CES 2014: In Pictures

3. SDN showdown: Examining the differences between VMware's NSX and Cisco's ACI

4. Cryptolocker scrambles eight years of data belonging to US town hall

5. The nerdiest, most high-tech business card you've ever seen

6. 12 jobs getting the biggest raises in 2014

7. Ubuntu 13.10 takes aim at Microsoft, Apple, Google

8. Cisco takes TV to the cloud

9. Trojan program hijacks World of Warcraft accounts despite two-factor authentication

10. Why can't Microsoft find a CEO?

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment