The document summarizes Brocade's announcement of a new IP storage switch developed in partnership with EMC. Key points:
- Brocade and EMC announced the industry's first dedicated IP storage switch, the EMC Connectrix VDX-6740B, designed specifically for IP storage networks.
- Creating dedicated IP storage networks provides more reliable and efficient networking than allowing storage and other traffic to share the same infrastructure, without performance guarantees.
- The new switch expands Brocade's OEM relationship with EMC and is based on Brocade fabric technology, providing a resilient, agile foundation for EMC storage systems.
The document summarizes Brocade's announcement of a new IP storage switch developed in partnership with EMC. Key points:
- Brocade and EMC announced the industry's first dedicated IP storage switch, the EMC Connectrix VDX-6740B, designed specifically for IP storage networks.
- Creating dedicated IP storage networks provides more reliable and efficient networking than allowing storage and other traffic to share the same infrastructure, without performance guarantees.
- The new switch expands Brocade's OEM relationship with EMC and is based on Brocade fabric technology, providing a resilient, agile foundation for EMC storage systems.
The document summarizes findings from Ericsson ConsumerLab's annual research on TV and media consumption habits. It finds that streaming habits are increasing and nearing linear TV viewing levels. Younger consumers in particular are watching less traditional TV. The trends are driving cord cutting and changes to traditional TV business models. Consumers want content on any device and are willing to pay more for on-the-go access. They also prefer higher video quality like 4K and personalized recommendations based on their viewing data. TV providers need to aggregate the atomized viewing experience across devices to better meet shifting consumer demands.
201408 fire eye korea user event press roundtableJunSeok Seo
油
The document discusses advanced cyber attacks and defense strategies. It notes that attackers are present on victim networks for an average of 229 days before detection. Multiple layers of security controls, known as defense in depth, are recommended to slow attackers and reduce their momentum over time. This involves placing security measures throughout the IT system to provide redundancy if one control fails. It is also important for executives to understand that cyber threats are continuous and will likely never be fully prevented due to human attackers adapting their techniques. Continuous monitoring, detection, prevention and analysis are needed to address modern threats.
Device to Intelligence, IOT and Big Data in OracleJunSeok Seo
油
The document discusses Internet of Things (IoT) and big data in the context of Oracle technologies. It provides examples of how Oracle solutions have helped companies in various industries like transportation, healthcare, manufacturing, and telecommunications manage IoT and big data. Specifically, it highlights how Oracle technologies allow for efficient processing, analysis and management of large volumes of data from IoT devices and sensor networks in real-time.
襴讌 Networked society day 2014 蠍一螳危 ceo pptJunSeok Seo
油
The document discusses the progression of technological revolutions over time and how the current networked society represents an inflection point with new opportunities. It outlines key statistics on the growth of connectivity through devices like PCs, mobile subscriptions, smartphones, and mobile broadband. The document then discusses Ericsson-LG's role in innovating and enabling services in the networked society through their portfolio and strategic focus on excelling in core businesses while also establishing leadership in new areas like energy, transport, and safety.