MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
February 17, 2009
Paul Shread
Sun's Encryption Keys Going Open Source Just days after seven IT vendors proposed an encryption key management standard, Sun is open sourcing its own key management technology. mark for My Articles similar articles
InternetNews
September 12, 2006
Sean Michael Kerner
IBM Encrypts The Key to Privacy IBM today officially announced new encryption technology and services that claim to provide "end-to-end" protection of customer data stored on IBM tape drives. mark for My Articles similar articles
InternetNews
February 20, 2009
Jennifer Schiff
Five Ways to Improve Data Protection As storage vendors debate encryption key management, experts weigh in on steps you can take to protect your data now. mark for My Articles similar articles
InternetNews
December 9, 2008
Richard Adhikari
Web Services Interoperability May Get Chaotic Fifteen companies, including some leading high-tech vendors, have launched the Web Services Test Forum to speed up Web services interoperability testing among their products. mark for My Articles similar articles
InternetNews
September 24, 2008
Paul Shread
Can Storage Fabrics Offer Security? Security is becoming an increasingly important part of storage fabrics, judging by recent announcements from Cisco and Brocade. mark for My Articles similar articles
The Motley Fool
March 8, 2007
Jack Uldrich
IBM Surpasses HP Big Blue moved past its competitor in disk storage hardware sales. The news offers investors yet another reason to look favorably on IBM. mark for My Articles similar articles
InternetNews
December 18, 2006
Sean Michael Kerner
HP: Improved Security in Our Unix Unix security is getting better. Hewlett-Packard (Quote) just added some security upgrades to its own flavor of the operating system, the HP-UX 11i. mark for My Articles similar articles
InternetNews
April 4, 2008
Judy Mottl
HP Targets Storage With New Security Tools HP expands Secure Advantage Portfolio with new tools and free service. mark for My Articles similar articles
InternetNews
April 7, 2004
Clint Boulton
Web Security Protocols Pass Muster After nearly two years in development, WS-Security comes to fruition; OASIS also vows to employ service-oriented architectures based on ebXML. mark for My Articles similar articles
InternetNews
October 28, 2008
Richard Adhikari
Enterprises Still Lax on Storage Security Encrypting backup tapes is a good way to prevent data losses, but few companies do this correctly - or know where to store their encryption keys. mark for My Articles similar articles
InternetNews
February 13, 2007
Clint Boulton
IBM Floats Encryption Downstream IBM's new TS3400 tape library borrows encryption technologies from the company's TS1120 tape drive. mark for My Articles similar articles
InternetNews
February 15, 2007
Drew Robb
Deciphering the DeCrypti Code Four different standards groups are at work on storage security standards. Can they make it all work, and when will storage users see results? mark for My Articles similar articles
InternetNews
May 11, 2005
Clint Boulton
Competing Web Services Specs Merge WS-ReliableMessaging will be housed under the standards body's roof, along with its counterpart WS-Reliability. mark for My Articles similar articles
InternetNews
April 8, 2008
Judy Mottl
It's All About Security With EMC EMC is integrating its PowerPath management software with technology from its RSA security division. mark for My Articles similar articles
BusinessWeek
November 19, 2007
Stephen H. Wildstrom
Data Protection for the Rest of Us New hard drives can give your computer inexpensive, government-style security. mark for My Articles similar articles
InternetNews
December 8, 2005
Clint Boulton
EMC Plans New Services Portfolio EMC is about to unveil a mix of consulting and storage services. mark for My Articles similar articles
InternetNews
March 12, 2007
Andy Patrizio
Seagate Delivers Encrypting Hard Drive Seagate on Monday announced a partnership with ASI Computer Technologies to deliver laptops with encrypted hard drives. The advantage of these drives is if the notebook is lost or stolen, the data on the drive is inaccessible. mark for My Articles similar articles
CIO
October 1, 2003
Lorraine Cosgrove Ware
By the Numbers It's not just what you send, it's what you store that needs encryption. mark for My Articles similar articles
InternetNews
March 14, 2005
Michael Singer
HP Vows Server, Storage Marriage HP partners with Broadcom and Seagate to outfit its server and storage families with Serial Attached SCSI and RAID6. mark for My Articles similar articles
InternetNews
September 2, 2005
Paul Shread
Dell Paces Strong Storage Market Dell led the storage market, with both HP and IBM also boasting strong quarters. It was the highest year-over-year growth in two years for the storage sector. iSCSI and NAS showed solid growth. mark for My Articles similar articles
InternetNews
December 11, 2007
Paul Shread
nCipher Scoops Up NeoScale nCipher has acquired the assets of NeoScale Systems after the storage security vendor wound down operations. mark for My Articles similar articles
InternetNews
April 27, 2005
Clint Boulton
HP Goes Small With 2.5 Inch Hard Drives Hewlett Packard tries to outshine IBM, Dell and EMC in the race for a smaller, denser disk drive. mark for My Articles similar articles
The Motley Fool
April 6, 2011
Tim Beyers
Meet Your Computer's Mini-Me Seagate shows off the world's thinnest external drive. mark for My Articles similar articles
InternetNews
February 4, 2004
Ryan Naraine
New Wi-Fi Security Spec Due Mid-Year The Wi-Fi Alliance plans to upgrade the security capabilities in WPA2, a new version of its Wi-Fi Protected Access (WPA) protocol. mark for My Articles similar articles
InternetNews
April 23, 2004
Clint Boulton
IBM Runs and Guns for EMC Customers IBM resumed its aggressive positioning against rival EMC by making its storage management software run on EMC hardware. mark for My Articles similar articles
InternetNews
December 13, 2004
Sean Michael Kerner
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day. mark for My Articles similar articles
InternetNews
July 11, 2007
Sean Michael Kerner
IBM Extends Patent Pledge IBM has added over 150 key standards specifications and protocol implementations to its list of items it's willing to share in an effort to make software more interoperable. mark for My Articles similar articles
InternetNews
March 8, 2007
Michael Hickins
Microsoft Makes a Play Date Microsoft announced the first interoperability protocol licensee under a European licensing program. mark for My Articles similar articles
InternetNews
March 4, 2005
Paul Shread
Storage Pricing Pressures Remain Storage pricing pressures persist - amount of storage shipped increasing at much faster rate than revenues generated from it. mark for My Articles similar articles
InternetNews
January 29, 2007
Paul Shread
IBM Scoops Up Softek IBM on Monday said it will acquire long-time partner Softek Storage Solutions Corp. in a move to boost its storage and data services business. mark for My Articles similar articles
InternetNews
May 17, 2005
Jim Wagner
OASIS Tackles Unified Installs OASIS wants to make it easier to install applications in corporate networks and is looking at a specification for vendors to follow when creating applications mark for My Articles similar articles
Wall Street & Technology
May 31, 2007
Elena Malykhina
Indentity Theft-Related Data Breaches Inceasingly Stemming From Laptop Theft More than half of identity theft-related data breaches stem from the theft or loss of a laptop or storage device. Yet most companies aren't locking down every laptop. Maybe the data isn't worth the price of securing the computer, but for most financial services companies there are no excuses. mark for My Articles similar articles
InternetNews
April 17, 2006
Paul Shread
EMC Takes VTLs Down Market EMC unveils a virtual tape appliance aimed at mid-size businesses and remote offices, among other changes. mark for My Articles similar articles
InternetNews
September 22, 2006
Drew Robb
EMC Secures Its Future EMC's acquisition of RSA is the latest move in its ambition to become a general IT vendor. mark for My Articles similar articles
InternetNews
March 2, 2006
Paul Shread
Storage Market Keeps Humming The storage market posted its strongest growth in years in the fourth quarter of 2005, according to IDC. mark for My Articles similar articles
InternetNews
April 10, 2006
David Needle
IBM's Answer to Security Blues IBM said it's developed technology that promises to bring mainframe-inspired levels of security to PCs, cell phones, PDAs and other digital devices. mark for My Articles similar articles
InternetNews
May 23, 2007
Clint Boulton
Cisco, RSA Buddy Up to Secure Data Cisco Systems and EMC's security division RSA pair two core security products to encrypt and manage customer data. mark for My Articles similar articles
CIO
October 1, 2003
Christopher Koch
The Battle for Web Services Everyone wants Web services standards. CEOs think the technology will create new opportunities. CFOs believe it will save millions. Vendors see a pot of gold at the end of the Web services rainbow. And CIOs know that linking to customers and partners over the Internet will revolutionize both business and IT. So what's the holdup? The usual suspects: Politics. Ego. Suspicion. Fear. Greed. mark for My Articles similar articles
InternetNews
September 18, 2008
Richard Adhikari
Internal HP Memo Details New Strategies On the heels of its announcement that it will cut more than 24,000 jobs as it integrates outsourcing giant EDS, Hewlett-Packard is also reorganizing its software and services offerings. mark for My Articles similar articles
InternetNews
October 29, 2008
Judy Mottl
Wi-Fi Networks Growing in Number, Security Companies and consumers are using Wi-Fi networks more than ever, although security measures aren't always keeping pace, according to a new study. mark for My Articles similar articles
JavaWorld
August 2002
Ray Djajadinata
Yes, you can secure your Web services documents, Part 1 This article discusses XML Encryption, an important technology in the Web services security realm. The article explains what it is, why savvy Java programmers should understand it, and how to implement the technology using IBM's XML Security Suite. mark for My Articles similar articles
InternetNews
September 8, 2008
Judy Mottl
IBM Seeks Shootout With EMC Over Storage IBM revamps its storage strategy to take on the market's leader. But who will be left standing once the dust clears? mark for My Articles similar articles
InternetNews
June 29, 2006
Paul Shread
EMC Acquires RSA EMC announced late Thursday that it will acquire RSA Security for about $2.1 billion. mark for My Articles similar articles
InternetNews
June 4, 2004
Paul Shread
EMC, iSCSI Show Strong Growth EMC takes the top spot from HP in the external storage systems market, while iSCSI SANs post impressive first quarter growth. mark for My Articles similar articles
InternetNews
April 2, 2007
Andy Patrizio
PGP Adds Vista, USB Drive Encryption Support PGP Corp. has given its PGP Encryption Platform a boost by adding support for new platforms, applications and expanding encryption support to other potential areas of vulnerability. mark for My Articles similar articles
InternetNews
March 11, 2005
Clint Boulton
EMC's 'Simple' Evolution EMC isn't a full-blown systems vendor yet, but it got a step closer with its new Making Storage Simple program. mark for My Articles similar articles
InternetNews
January 15, 2008
Andy Patrizio
PGP Updated to be a Good Citizen New version of Encryption Platform makes it play nicer with others on your computer. mark for My Articles similar articles
InternetNews
September 13, 2007
Andy Patrizio
Dell Adds Encrypting Drive to Latitude Line Dell announced it would offer Seagate's encrypting hard drive as an option for its Latitude line of laptops to provide "the world's most secure notebooks." mark for My Articles similar articles
InternetNews
December 23, 2008
Richard Adhikari
Uncertain Future Adds to Security Concerns Security is never a secondary concern, but the economic situation will compound the problem. mark for My Articles similar articles
The Motley Fool
March 10, 2011
Cindy Johnson
HP's "Softer Side" Strategy: Sensible, but Not Enough It's going to be a long haul for Hewlett-Packard. mark for My Articles similar articles