Seagate delivers advanced digital storage solutions to meet the needs of today's consumers and tomorrow's applications. It produced the industry's first 1.5-terabyte and half-terabyte notebook hard drives. It partnered with NBC to store all the generated video files from the Beijing Olympics on enterprise drives. Recently, the company's acquisitions reflect a push into the managed services market with software for data protection and retrieval, backup and recovery.


Deep Ties Bind Accessibility, Mobile Web

Shawn Lawton Henry, who leads worldwide education and outreach activities for the Worldwide Web Consortium's Web Accessibility Initiative, says there's a lesson for mobile developers in its Web More >

More Articles >


DLP's Question to Exiting Data: Who Goes There-and Why?

Carl Weinschenk spoke with Bill Ledingham, CTO, Verdasys.   Weinschenk: What does data loss prevention do?Ledingham: If you are just looking at devices by themselves, you lose the context of More >

Cyber Security Awareness Rising in Academia

Carl Weinschenk spoke with Bob Kirby, senior director, K-12, CDW-G. Late last month, CDW-G released the 2008 School Safety Index Self-Assessment Tool, which included information on academic More >

Set Priorities Before Deploying NAC

Carl Weinschenk spoke with Wain Kellum, president and CEO of Trusted Network Technologies.   Weinschenk: How do you define network access control?Kellum: Personally, I think it's very simple. More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making


SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Related IT Downloads

Security3TN Guide to Attribute Based Access Control (ABAC) Definition and Considerations

This document provides Federal agencies with a definition of attribute based access control (ABAC). ABAC is a logical acce...

Cryptographic Key Management Issues & Challenges in Cloud Services

The management of cryptographic keys is a critical and challenging security management function, especially in the case of...

Electronic Authentication Guidelines

Learn more about advanced techniques for user authentication to sensitive computer systems.


Enabling an Enterprise-wide, Data-centric Operating Environment

If properly envisaged and designed, access control can serve a more vital role in computing than one might expect.


More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.