Feeds

SanDisk and Microsoft BFFs around software-stuffed memory

Cruzer replaced by new entity

The Power of One Brief: Top reasons to choose HP BladeSystem

Microsoft and SanDisk have inked a deal to create USB flash drives and memory cards with built-in software and user preferences to replace SanDisk's existing U3 Cruzer line.

Under the agreement, Microsoft will develop new software and SanDisk will cover the hardware for the products.

The hardware/software pairing will allow customers to carry applications as well as their customized Windows interface on a flash storage device.

SanDisk rep Mike Lanberg said the disks will let users access their encrypted financial, corporate, and personal data on public or shared computers without leaving the information behind when they leave.

The partnership will replace and expand upon SanDisk's current application-launching flash storage line, U3. The offering is expected to be commercially available starting in the second half of 2008. The U3 line will be sold and supported until the new release, Lanberg said.

SanDisk said its partnership with Microsoft will allow the applications to be more tightly integrated with Windows operating systems, as well as enhance data security. The flash storage drives will support both XP and Vista.

Microsoft has plans to begin recruiting third-party hardware vendors interested in licensing the new software. The two companies said they will create "a new entity" to license compatible hardware designs from both Microsoft and SanDisk. These revenues will be shared by the two companies. ®

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.