Tuesday, November 25, 2014

Intel plans 3D NAND flash next year for 'as much storage as you want'

  4 surprising tech trends we should be thankful for | UpCloud bets on storage performance, US datacenter to dent market

 
  Network World Storage  

Intel plans 3D NAND flash next year for 'as much storage as you want'
Intel plans to ship 3D NAND flash chips next year that will allow it to cram more bits into solid-state storage.Its 3D NAND will have twice the density of competing products on the market now, Intel claims. Samsung, a key rival, is already on its second generation of SSDs built with 3D technology.3D NAND has multiple layers of transistors stacked on top of each other in a cube. Intel's chips will have 32 layers. Samsung is shipping SSDs made with 32-layer flash, but Intel says its products will hold twice as many bits: 256 billion bits on a single die using MLC (multilevel cell), the most common form of flash.To read this article in full or to leave a comment, please click here Read More
 


WEBCAST: VMware

Healthcare IT: Out of the Basement and into the Cloud
Historically, Healthcare IT has not been a IT trend setter. In fact, they have been historically viewed as technology laggards. Although with the massive business and industry transformation taking place that is or will no longer be the case. We will explore how the Healthcare will be able to get out of the basement and into the cloud. Learn more!

WHITE PAPER: Curvature

The State of IT Infrastructure & Operations
The challenge that IT decision-makers face is the pressure to reduce costs paired with the pressure to progress digital maturity. Curvature analyzes why businesses miss significant CapEx and OpEx cost savings and how to refocus IT strategy. View now

4 surprising tech trends we should be thankful for
  In the run up to the Thanksgiving holiday, it's customary to identify some of the things for which we want to offer our gratitude. Typically, that means family, friends, good health, and the like.That's always a good idea, but for those of us in the technology industry or who work in IT, there are plenty of other things to be thankful for, from falling storage prices to fancy new tablets and smartphones. That's a good idea, too, but I want to take this opportunity to give thanks for a few things that we might usually think of as problems, but can actually add significant value to our organizations and our careers. Let's start with an easy one:To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: BMC Software
 
Guide to Managing and Lowering Mainframe Software Charges
Monthly license charges (MLC) are rising by 7% or more each year, and account for 30% of total mainframe costs. Yet managing MLC costs is an inexact science. This best practice guide provides a step-by-step process to reduce mainframe MLC costs up to 20% without compromising business critical services. Learn More

UpCloud bets on storage performance, US datacenter to dent market
It may be a minnow in a market of whales, but Finnish cloud service company UpCloud is hoping that improving its storage performance and adding datacenter capacity in Chicago will make customers take a look.The cloud arena has become very competitive, but there still is room for smaller companies that can find a way to stand out. While UpCloud, which expanded operations outside its native Finland last year, can't compete with Amazon Web Services' range of services, it believes it can still distinguish itself as a provider of cloud-based servers and storage."We believe very strongly that the cloud isn't a commodity, because behind the price there are multiple decisions on how services are produced that all affect performance," said CEO Antti Vilpponen.To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: BMC Software
 
An Insightful Approach to Optimize Mainframe MLC Spend
This paper, "An Insightful Approach to Optimizing Mainframe MLC Costs," discusses how you can penetrate the complexity of IBM mainframe MLC products and the MLC price model to gain insight into the MLC cost drivers and leverage that insight to optimize MLC spend. Learn More

Facebook's alternative PHP engine attracts Web service providers
HHVM is being used by the Box storage service and by one of the largest hosts for enterprise-ready WordPress Read More
 

Microsoft Azure thrown out of gear during a performance update
A service interruption on Azure storage services late Tuesday was caused by Microsoft's attempts to roll out a performance update that had been earlier tested for several weeks.An issue was discovered as part of the update to Azure Storage that resulted in reduced capacity across services using Azure Storage, including Virtual Machines, Visual Studio Online, Websites, Search and other Microsoft services, wrote Jason Zander, corporate vice president of the Microsoft Azure team in a blog post Wednesday.The interruption impacted storage services across the U.S., Europe and parts of Asia. A limited subset of customers were still affected by intermittent issues on Wednesday, according to the company. On the Azure status page, Microsoft was still reporting problems in the West Europe region on Wednesday evening.To read this article in full or to leave a comment, please click here Read More
 

Attackers trading malware for privilege
Hackers will use malware, among other techniques, to break into enterprise systems but once they're in, they're likely to switch away from malware to abusing privileged accounts, according to a report released today by CyberArk Software, Ltd., an Israel-based vendor of security solutions for privileged accounts.The report analyses the experience of some of the world's top cybersecurity and forensics teams -- Cisco's Talos Security Intelligence and Research Group, Deloitte's Computer and Cyber Forensics Team, Deloitte & Touche's Cyber Risk Services, FireEye's Mandiant, EMC's RSA security division, and the Verizon RISK Team."A lot of the industry equates malware to the means by which an attack is carried on," CyberArk CEO Udi Mokady told CSO Online. "But the more computers are infected with malware, the easier it is for a victim to detect an attack."Instead, hackers switch to using privileged accounts once they're in a system."When you're able to do do that, you can come and go to the organization as you please, and set up additional users that blend in with the normal traffic," he said.According to Mokady,  most enterprises are unaware of how many privileged accounts they actually have."Companies typically have three to four times as many privileged accounts as employees," he said. In fact, compromised privileged accounts are at the heart of 80 to 100 percent of the attacks that cybersecurity teams investigate, he said."This also explains why attacks are so hard to discover and stop," he added. "An attacker with access to a privileged account can lie there undetected for 200 days or more."For example, according to the report, privileged accounts can be used to delete log data and other evidence of illicit activity.In addition, hackers are using a wider range of privileged accounts than ever before."Security investigators report a range of privileged account exploits, from hacking embedded devices in the Internet of Things to establishing multiple privileged identities in Microsoft Active Directory to ensure redundant points of access," said the report.One particularly dangerous type of privileged account is the service account used for machine-to-machine communication."Most companies expect service accounts to be used only internally, so they keep the default passwords," said Christopher Novak, global managing principal for investigative response for the Verizon RISK Team, one of the experts who contributed to the report."We've seen 25 or 30 attacks recently in which attackers used default passwords," he added. "And because it's presumed individuals aren't using [these accounts], analysts dial down the sensitivity on alerts. Service accounts are out of sight, out of mind."The report also provides some details about how far attackers will go to gain access to high-value targets."We've set up fake online personas, pretending to be a PhD researching cancer therapies oran engineer developing a new laser module for a defense system," said Peter Tran, senior director of RSA's Worldwide Advanced Cyber Defense Practice, in the report. "And what we're seeing is attackers have gotten really good," he said. "They're masquerading as recruiters and reaching out to high-value targets such as senior engineers, business managers. They use social media to start dialogs with valuable insiders, and they take time to cultivate relationships. Based on what we've seen, [attackers are] credible enough to fool most people into providing the entry point they need."To read this article in full or to leave a comment, please click here Read More
 

 

SLIDESHOWS

Top tech turkeys of 2014

This Thanksgiving, just be thankful you aren't associated with any of these people.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. 20+ Jaw-Dropping Black Friday 2014 Tech Deals

2. Peeping into 73,000 unsecured security cameras thanks to default passwords

3. No, Walmart, you can't walk away with my smartphone for price-matching purposes

4. 14 go-to tools for Mac sysadmins

5. 12 tips to tune your Wi-Fi network

6. Black Friday sales promise iPhone 6 deals

7. 10 cheap or free ways to make your old PC run faster

8. Black Friday: Newegg axes prices on laptops, desktops, tablets

9. SDN groups respond to Cisco's game over

10. Google launching 20 Internet balloons per day


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_storage_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: