April 06, 2013

Data storage challenges outpace decision-making strategies
Jon Toigo, CEO and managing principal of Toigo Partners International, and chairman of the Data Management Institute, examines common decision-making processes in today's IT environments. According to Jon, these processes aren't effective enough to deal with the 'storage infrastruggle,' a term he's coined to describe the many data storage challenges faced by storage pros.


Nonstop cloud computing price war: Amazon, Google both drop rates again
Pricing for the default small VM running Windows OS dropped from $0.115 per hour to $0.091 per hour, a 21% drop. Other Windows VM types also fell in price, in some cases by an even higher percentage, including high-memory (now $0.51 per hour) and high-CPU (now $0.225 per hour). The news of AWS's price reduction was seemingly in response to the announcement by Google that same day of its Amazon-competitor cloud.


United HomeCare Services informs patients of data breach
United HomeCare Services, Inc. will offer two years of free credit monitoring for patients affected by the breach. PHIPrivacy also reports that the organization has said all of their laptops are now encrypted and are in full compliance with their encryption policy. And now all employees have been retrained laptop and client record privacy and security.


CxO Talk: Can a CIO and CMO be friends?
On this week's show, the CMO of legal information provider, LexisNexis, and CIO of Seton Hill University share advice on enterprise relationships, software, and selling advice to vendors. The discussion includes an insider's look at the CIO and CMO roles, along with advice for technology vendors selling to senior executives.


US executives 'question business value' of tech spend
Almost none of those surveyed (3%) rate their companies as "excellent", according to a new survey of more than 150 senior finance executives by CFO Research in collaboration with consultants AlixPartners. The survey also finds that more than two-thirds of financial executives (66%) give their companies a "C" or "D" grade when it comes to measuring financial returns from discretionary IT projects, such as big data ones, designed to improve or add to a company’s business and profits. Only 5% gave their companies an "A".


Big Data Protects Intel's Info
In 2012, Intel made significant progress in implementing this architecture, which is based on four pillars. The first pillar is identity and access management, which allows users' access privileges to be dynamically adjusted as the level of risk changes. Intel has tested this system in its production environment and continues to refine these tools for a range of devices, locations and infrastructure technologies.


Startup Hiring: When One Entrepreneur Is Enough
He or she could quickly leave when another hot startup pops up or when the business progresses past the initial stages. Most startups are fine with one or two of these early visionary types, but they need a different person as the second, third, or twenty-third hire. What they need is the "WANT-trepreneur." The Want-repreneur is the guy or girl that will someday become the entrepreneur — the ones who have the curiosity to build and explore new ideas, but haven't developed the full-on "entrepreneurial spirit" that so many employers claim to want.


How a trickle of BYOD costs can turn into a deluge
But take that one person's extra costs and multiple them by the other 5,000 people in the company who are doing the same thing every month. Now you have a run rate of $50,000 a month -- that's $600,000 a year. It didn't seem like much when it was only $10 for each person. It was easy to ignore. But when you add it up, it can be a real issue.


Making Sense of the Myriad SDN Offerings
One way to get your arms around it is to organize the various SDN announcements into buckets of common features and functionality. As you can see below, we can classify them into four buckets: 1) legacy proprietary systems; 2) overlay network virtualization; 3) abstracted network management systems; and, 4) open SDN architectures.


Amazon Announces CloudHSM To Secure Enterprises
According to a blog post published by Amazon Web Services, customers can have full control of their keys and entire cryptographic operations. All the keys are protected by a tamper resistant HSM designed in accordance with strict security standards.The new CloudHSM service is powered by a Luna SA appliance from SafeNet. The appliance features a tamper resistant hardware enclosure. Enterprises can use it to store their keys on the dedicated hardware unit and even use then to encrypt and decrypt data.



Quote for the day:

"Trying to get everyone to like you is a sign of mediocrity." -- Colin Powell