More Mac mania

In which we drink the Apple Kool Aid, then get serious about data security and storage networks

You may have thought that last week was InfoWorld's official "Week of Apple" -- what with all the WWDC (Worldwide Developers Conference) coverage, reviews of Parallels Desktop 3.0, VMware Fusion Beta 4, Apple TV, Tom Yager's iPhone analysis, plus his Mac OS X Leopard developer preview. But we're not done with Apple just yet. Tomorrow we're posting part 3 of our extended Leopard preview. Also on that day, keep your eye out for a preview of the new Santa Rosa MacBook Pro.

Why all this attention paid to little old Apple? Conspiracy theorists (you know who you are) might blame it on Chief Technologist Yager, a card-carrying Mac partisan who may have overimbibed at the Cupertino Kool Aid dispenser. But the truth is far simpler than that: Apple's technology impresses us. What it lacks in market share, it makes make up for in great ideas, design, and products. As Yager puts it, "Macs are stable, standardized, and secure, equipped by default for remote and centralized management, extremely power efficient, ruggedly built and full peers in settings with any combination of Windows, Unix, Linux, and Mac clients, servers and services. Give any user a choice (and I think that professionals should be offered the choice now that full Windows compatibility makes the Mac a can't-lose choice), and they'll opt for a Mac." Well, maybe yes and maybe no. But at least InfoWorld readers will understand their options.

If you're not part of the Steve Jobs booster club and marching society, don't despair. We have plenty of non-Mac content for you to dig into. For starters, senior writer Matt Hines explores the sensitive topic of data security in "Helping retailers wipe ID data issue." In doing reporting for the story, Hines came to the realization that although enterprises have spent years implementing technologies to secure sensitive data, they’ve largely failed. If you want proof of that failure, consider all the highly publicized data loss incidents of the recent past. "Companies are really just beginning to wrap their arms around the need for an overarching data security strategy," Hines says. Yet despite all their best efforts, he adds, "Enterprises still lack visibility into data security."

Hines’ investigation is an ideal lead-in to InfoWorld's newest event, the Enterprise Data Protection Executive Forum, which takes place on June 26 in New York City. We've lined up a tremendous slate of speakers, including Richard Clarke, onetime chief counter-terrorism adviser to the U.S. National Security Council, and we think our roster of attendees is pretty impressive, too. That means both the sessions and the schmoozing should be top-notch. I hope to see many of you there next Tuesday.

Senior Analyst Mario Apicella weighs in on enterprise data protection as well with "Suit up your storage network with business sense," which lays out a practical strategy for managing storage assets. If you want to learn about the state of the art in storage management -- data classification, data de-duplication, continuous data protection, and tiered storage -- this is a good place to start. And not only will these technologies help you get a handle on your data, but they'll also help you drag your storage network into the new era of business metrics. Given the importance of highly interactive applications and the current emphasis on compliance and e-discovery, measuring metrics such as relevancy and responsiveness is key for any company trying to wring greater competitive advantage out of its IT investment.

Remember: to get this complete column in your e-mail inbox every week, sign up here.