Content Vault : Sort by Most Recent
CIO Leadership, Big Data, Services

Webcast: Implementing Big Data? Infrastructure Readiness Is Key

The lifeblood of the interconnected pathways of our world today is data. Data can deliver more complete and accurate knowledge, which drives smarter decisions. In this on-demand webcast, the analyst and HP speakers discuss the need for infrastructure readiness, prior to implementing a Big Data solution.


CIO Leadership, Big Data, Services

Implementing Big Data? Infrastructure Readiness Is Key

The lifeblood of the interconnected pathways of our world today is data. Data can deliver more complete and accurate knowledge, which drives smarter decisions. This analyst white paper communicates the need to develop a sound Big Data infrastructure strategy and design, prior to implementing a Big Data solution.


CIO Leadership, IT Infrastructure, IT Performance

Energy: Barrier #4 to Achieving an Efficient Data Center

This article is the fourth in a five-part series looking at the barriers to achieving an effective data center.

Blog-post by Brian Reagan, Wed, 08/28/2013 - 16:09
BrianReagan
Barrier 4 – Energy
Energy has become an increasingly scarce resource in many cities around the world.  One issue: legacy architectures continue to serve mission-critical workloads, while consuming more kWh than their modern-era equivalents.   Consider that VMware estimates that nearly 3,000 kWh are saved per year for every workload virtualized.    The continued use of physical, standalone servers drive significant inefficiencies.  Similarly, the energy consumed by a legacy 73GB FC disk drive is 94% higher than even a 1TB SATA disk drive.
(2) (2)

CIO Leadership, Cloud, Services

Cloud Insight: 6 essential facts for defining a successful cloud strategy

Misinformation may be the most daunting obstacle when building an IT infrastructure. To help you separate the facts from the hype, experts from HP Technology Consulting have created this informative guide to provide you with the insight you need to make decisions about successful cloud strategies.

(3)
   

Technology, Cloud

SaaS Revolution in Payroll Applications

Cloud services have become key for managing payroll in enterprises.

Blog-post by Kaushal Shah, Wed, 08/28/2013 - 10:54

Cloud services for payroll services have become one of the key beneficial areas for enterprises. Discussed here are most important benefits of payroll cloud services.

(1) (1)

CIO Leadership, Security

Some Companies Regularly Thwart Insider Theft

Key to preventing these types of threats is understanding when the line has been crossed from legitimate business operation to risky behavior.

Blog-post by Jim Ricotta, Tue, 08/27/2013 - 20:29
Jim Ricotta

We're in the midst of our annual survey of our customers -- leaders in automotive, financial services, aerospace, insurance, oil & gas, healthcare, entertainment, manufacturing and technology. We specialize in privileged user monitoring and control to stop IP theft. And we know from two years of survey data that our customers thwart malicious insider attacks at least once or twice every year.  This number is typical at almost all mid-size and large organizations – but most of the time the theft goes unnoticed by security teams unless alerted by a third party or an employee.

(7) (7)

Technology, IT Performance

Flow-Based Behavioral Fingerprinting FloCon Presentation

Blog-post by Joe Simmons, Tue, 08/27/2013 - 11:57

FloCon 2013 Presentation by FlowTraq

As a way to demonstrate the powerful algorithms developed for FlowTraq, Alex Barsamian was selected to share this presentation at FloCon 2013.   The presentation focused on identifying network users using flow-based behavioral fingerprinting. During the presentation, Alexander discussed some of the features we extract from flow data to create unique user fingerprints, and how well these algorithms fare at identifying users on a 500-user network.


Technology, IT Performance

Port Vulnerability Scanning: How FlowTraq Dynamically Adapts to Your Network

Blog-post by Joe Simmons, Tue, 08/27/2013 - 11:51

Perhaps one of the most common reconnaissance techniques to map out networks when planning attacks is a port scan. Port scans are a connection sweep of address and/or ports intended to discover what addresses have open service ports with potentially vulnerable services.

For instance, if a host has a MySQL port open, it is worth trying various exploits that some MySQL versions are vulnerable to. The same goes for web servers, email servers, databases, fileserver ports, etc.