Monday, August 29, 2005

Storage By The Cluster


___________________________________________________________
Computerworld Hardware
August 29, 2005
___________________________________________________________

***************SPONSOR**************************************

The Nokia 9300

Learn the fundamentals of mobile device security. Aimed at IT
professionals and decision makers who must provide secure mobile access
to corporate data systems, this paper focuses on the security and
device management features of the most advanced Nokia business devices
- the Nokia 9300 smartphone and Nokia 9500 Communicator.

http://www.computerworld.com/nokia/communicator

************************************************************

In this issue:

* Storage By The Cluster
-- Sidebar: Making Plans
* Up To Capacity
-- Sidebar: Priceline Sees Big ROI On Clustered Storage
-- Sidebar: Definition: Storage Cluster
* Share President Still Sees A Future For User Group
* Synergetic SANs And Blades

Computerworld Blogs:

* Travelling used to be so easy
* Viiv: DOA
* IPod cellphone
* Resist change

Other Resources:

Analyst Corner: IDC on Making Storage Simple -- Click to download this
white paper.
http://www.accelacomm.com/jlp/nlhw/11/10004140/

Strategies for Deploying Blade Servers in Existing Data Centers.
http://www.computerworld.com/apc?lpid0243000001142471idlp

Strategies for Deploying Blade Servers in Existing Data Centers.
http://www.computerworld.com/apc?lpid0243000001142471idlp

____________________________________________________________

Storage By The Cluster

Massive throughput and the ability to add capacity on the fly are
making clustered storage an attractive option.

http://www.computerworld.com/newsletter/0,4902,104173,00.html?nlid=HW

-- Sidebar: Making Plans

A quick look at different capacity planning methods.
http://www.computerworld.com/newsletter/0,4902,104178,00.html?nlid=HW

____________________________________________________________

Up To Capacity

Capacity planning helps companies locate current bottlenecks or wasted
capacity as well as strategize for the future.

http://www.computerworld.com/newsletter/0,4902,104179,00.html?nlid=HW

-- Sidebar: Priceline Sees Big ROI On Clustered Storage

Priceline.com is finding that switching to clustered storage has
translated into substantial savings.
http://www.computerworld.com/newsletter/0,4902,104196,00.html?nlid=HW

-- Sidebar: Definition: Storage Cluster

The definition of a storage cluster.
http://www.computerworld.com/newsletter/0,4902,104175,00.html?nlid=HW

***************SPONSOR**************************************

Keeping the Customer in View
How well do you know your customers?

Accurate customer data directly impacts loyalty and business planning,
yet few companies update data regularly. Experts address the challenges
of ensuring a consistent, coherent customer view across the
enterprise.

http://www.accelacomm.com/jlp/cwnlfillers/11/10003726/

************************************************************

Share President Still Sees A Future For User Group

The mainframe-oriented Share user group turned 50 this year, and its
current president, government-agency CIO Robert Rosen, said in an
interview that attendance at the group's conferences has stabilized and
is even starting to increase again.

http://www.computerworld.com/newsletter/0,4902,104208,00.html?nlid=HW

____________________________________________________________

Synergetic SANs And Blades

Serial-attached SCSI -- an emerging technology that will eventually
replace parallel SCSI in enterprise storage -- is acquiring new
capabilities.

http://www.computerworld.com/newsletter/0,4902,104100,00.html?nlid=HW

***************SPONSOR**************************************

Fighting over who owns the customer?

Getting a single view of your customers requires consistency and
cooperation across the enterprise. Without it, your business won't be
as productive or profitable. Register now for the FREE live e-seminar,
"Practical Guide to Customer Data Politics", brought to you by
Computerworld and CRM Magazine.

http://www.destinationcrm.com/webevents/oracle/13jul2005/cwn

************************************************************

COMPUTERWORLD BLOGS
-----------------------------------

Travelling used to be so easy

I'm just packing up ready to speak at EclipseWorld next week and I'm amazed at
how much time it is taking me to get everything ready. I have a bag prepacked -
I've gone on trips with just 10 days notice before now, so I don't like to be
caught out - but even with the pack there are so many other things to sort out.
I've got to pack the laptop, a ...

http://www.computerworld.com/blogs/node/860?NLT_HW

Viiv: DOA

How can you tell that Intel's newly announced Viiv brand for home-entertainment
PCs will fail? Simple: Copy that name onto a piece of paper, show it to the next
half-dozen people you see and ask them how to say it. They won't know. They'll
guess "viv," and "veev," and "vivey." One or two ...

http://www.computerworld.com/blogs/node/854?NLT_HW

IPod cellphone

Does it matter to IT managers whether or not Apple will start building iPod
cellphones? Not right away. But eventually, if Apple and Motorola actually
beginning shipping the devices, they will become one of the larger number of
endpoints on the corporate network. End users will start using it as their
contact management tool.

http://www.computerworld.com/blogs/node/852?NLT_HW

Resist change

George Hungerford can help you so that you'll never have to change anything
again--on your hard drive. No virus problems. No worms. No poorly installed
patches. Nothin'. Not even new data can be stored on it. So, why would you want
to do that? George is the CEO of Jackson Backup LLC which makes the Jackson
Armor Card. That's a PCI card ....

http://www.computerworld.com/blogs/node/851?NLT_HW

___________@COMPUTERWORLD.COM___________________________

THE SECURITY AGENDA
-------------------
Build a security plan to protect your company's assets. In this
comprehensive report you will learn everything from how to educate
staff against picking easy-to-crack passwords or falling for "social
engineering" attacks to keeping up with the latest patches and fixes
from vendors. This report is a must for security professionals.

https://store.computerworld.com/?source=HW_bot

___________CONTACTS/SUBSCRIPTIONS___________________________

FEEDBACK
--------
To submit feedback about Computerworld's e-mails, contact our online
customer service group at online@computerworld.com. Please include the
following subscriber e-mail address in all correspondence:

pet.computter@GMAIL.COM

ADVERTISING
-----------
For information on advertising, contact
Kathy_Snow@computerworld.com

PRIVACY POLICY
--------------
Computerworld's online privacy policy is at:
http://www.computerworld.com/utilities/privacy

SUBSCRIPTION SERVICES
---------------------
To sign up for Computerworld's e-mail newsletters, stop
getting them or change your e-mail address, go to the following URL:

http://www.cwrld.com/nl/preferences.asp?e=pet.computter@GMAIL.COM

If the above URL is not enabled as a link, please copy it in to your
browser window to access our Subscription Page.

Copyright 2005 Computerworld Inc.
1 Speen Street
Framingham MA 01701