HP Helps Deliver Mobility for Australian Students

theCube began its live coverage of the ~11,000-attendee HP Discover conference in Las Vegas today. Wikibon founder Dave Vellante and Wikibon analyst Stu Miniman kicked off the interviews with Gregory Bell, an HP customer and Head of Technical Services for Ballarat Grammar School in Australia. Vellante asked Bell how they deal with competitors when it comes time to purchasing new equipment. “We most certainly look at other vendors for servers, storage, notebooks, etc. – we put them all on the table, make our comparisons, and perform our due diligence,” Bell replied.

Bell described one of Ballarat Grammar’s more recent and tasking projects driven by the school’s initiative to provide a 1:1 pairing program for its senior students. With this program, the school opted to provide every student and staff member with his/her own HP Netbook running Windows 7 and a copy of the full version of Microsoft Office. Ballarat Grammar’s biggest hurdle with this initiative? Handling all of the additional devices connecting to the network via mobile hotspots throughout the school.

One of the key challenges described by Bell included that, at any given time, the network could have as many as 500 mobile devices connected. Bell said that HP’s wireless network and servers, 99% of which are virtualized, are running Windows in VMware and are managed by vCenter, allowing up to 900 devices to connect at any given time – all viewing rich content such as classroom videos from YouTube.

Read the full article by the imsmartin team on SiliconANGLE and watch the video to see and hear the list of some of the key challenges that HP helped Bell overcome at Ballarat Grammar School.

IBM Acquisitions Deliver Storage for the Rest of Us

The Edge conference in Orlando, FL is IBM’s opportunity to show off its wide range of storage solutions to the world. While IBM is typically known for its large enterprise offerings, some of its acquisitions highlighted during the conference make this year’s Edge “the storage coming-out party,” as said by Wikibon founder David Vellante. Wikibon analyst John McArthur and Wikibon founder Dave Vellante were fortunate to spend some time with IBM systems storage VP, Bob Cancilla (full video below). McArthur and Vellante prompt Cancilla to reminisce a few years back into his 27+ years with IBM to answer a few questions on IBM’s acquisitions, their strong go-to-market strategy, and insights into the future of storage at IBM.

The golden child of IBM's storage portfolio is IBM’s XIV offering, which is growing 30% per quarter. This is a significant number when compared to the single-digit figures captured and presented by IDC in a recent report coupled with last quarter’s earnings from EMC, a firm that relies heavily on storage and reported a down quarter. “XIV had $2M at the end of 2007, then $200M and $500M,” said Cancilla. “We are tracking quite nicely to becoming a billion-dollar entity,” he added. “It is evident that XIV is gaining share, despite some serious bumps in the road,” said Vellante. Cancilla was more than happy to confirm.

What's the future look like for IBM storage? Read the full article by the imsmartin team on SiliconANGLE and watch the video here.

Mass Amounts of Data Creates A Name for Itself, Big Data

The increase in data proliferation has also caused an increased need and opportunity in information security. While not new, the idea of “Big Data” has gained a tremendous amount of steam in the market. How much data are we creating you ask?

From the article, “Each day, the world creates 2.5 quintillion bytes of data, according to IBM, meaning some 90 percent of the information alive today was only born within the last two years. Each sector in the U.S. economy is responsible for at least 200 terabytes of stored data, says a report from the McKinsey Global Institute.”

As the world works away, creating more and more Big Data, the need for information security continues to become a critical element - both to protect the data and to use the data to better protect the environment in which it resides. It is imperative that companies realize how important is as a benefit their business.

Our very own Sean Martin, founder of imsmartin consulting, offered his own advice on the issue stating, “Perhaps no two verticals deal with security and Big Data more than the information-intensive industries of financial services and health care.”

To find out more about the "Three V’s of Big Data" and how to use the information to aid your company in developing a Big Data-driven security practice, read the full article on SC Magazine.

This article is from the full April 2012 Issue of SC Magazine

CU InfoSecurity Conference 2012

The CU InfoSecurity Conference, held June 6th - 8th at the Trump International Hotel Las Vegas, is the original and premier conference dedicated solely to credit union security. Our speakers are industry leaders in their respective fields and will provide practical advice on securing your credit union.Pin It This event represents a tremendous opportunity to learn, network with your credit union peers, and visit our Security Vendor Reception.

Here are just some of the topics that will be covered in this two and one half day security summit:

  • iPadSecurity
  • Data Forensics
  • Insider Threats
  • Incident Response
  • Social Engineering
  • Securing Cloud Storage
  • Virtual Desktop Security
  • Securing Mobile Workers
  • Fighting Online Banking Fraud
  • Single Sign-on & Authentication
  • Check Fraud Prevention Trends

Register today!

Blog: Survive the Cisco CSA Transition

Surviving the Cisco CSA Transition

Searching for behavioral based protection and control for your PCs? Look no further.

The search for a viable replacement to Cisco’s CSA has resulted in frustration for many CSA customers. As they look for alternatives, their demanding requirements for behavioral-based protection and complete endpoint control are quite clear. Cisco CSA users want the same technological capabilities they’ve loved for years, or something better. The featured whitepaper ‘Surviving the Cisco CSA Transition’ is available now and will help provide a deep view into these requirements.

Download the whitepaper. Complete your search.