Application Servers and Management Solutions, Cloud Computing and Hosted Services, Computer Hardware Sales, Installation, Maintenance, Computer and IT systems management, Database management, Desktop computers and mobile devices, Server Management, Server Operating Systems: Windows, Linux and Unix, Systems Integration and Management, Virtualization Technology and Services
Computer Networking Certifications, Network Management Services, Open Source Network Tools, SMB Business Networks, Virtualization Networking Services, Network Planning and Design, Network Installation and Administration, Virtual Private Network (VPN), VoIP and unified communications, Wireless Networks, SDN technologies and products
Introductory Security Services, Information Security Training and Certification, Regulatory Compliance, Threat management and prevention, Network security products, technologies, services, Identity management and access controls, Application security and data protection
Data Backup and Data Protection, Data Storage Hardware, Data Storage Management, MSPs/Storage as a Service, Network-Attached Storage (NAS), Regulatory Compliance Services, Remote Storage Management, Storage Area Network (SAN), Storage Virtualization
Survey from Cloud Technology Alliance reveals misaligned expectations between ISVs and their channel partners
Apple's CEO might have mused on the reasons for a PC in the age of the iPad Pro and he has got Billy MacInnes thinking about the humble desktop and its role
Meg Whitman has used her slot speaking to analysts about the last set of results from a single HP operation to outline its aggressive plans to gain more partners from rivals
A company planning to migrate from the cloud to an in-house data center or colocation facility faces a number of challenges, writes Datalink's Irwin Teodoro.
To determine which apps to migrate to cloud and which to maintain on premises, application rationalization projects analyze numerous aspects of your customers' businesses.
Avnet Inc. has launched a cloud marketplace, which targets traditional resellers, as well as born-in-the-cloud partners, managed services providers and independent software vendors.
Dell issued a fix for a root certificate similar to Superfish that could potentially allow attackers to intercept encrypted private data on its PCs.
Expert Dan Sullivan outlines criteria for evaluating big data security analytics platforms for collecting, analyzing and managing large volumes of data generated for information security purposes.
The best approach for penetration testing is to use a combination of tools with different approaches. Here are several pen testing tools for midmarket companies.
Cisco has launched an open source project, called Contiv, to build technology that automates the use of security, storage and networking in cloud-based containerized applications.
This week bloggers explore how the Ericsson Cisco venture may affect SDN and NFV, data center automation and Extreme Networks' Wave 2 APs.
Facebook says it's working on a 100 GbE Wedge switch; Extreme Networks launches 802.11ac Wave 2 APs; and the Linux Foundation envelopes the Open Network Summit.
EMC and Dell storage customers shared their thoughts and concerns on Dell's proposed $67 billion deal to acquire EMC during a series of interviews at Dell World 2015.
Oracle ZFS Storage uses mechanical and flash storage. The ZS3-2 and ZS4-4 models offer a variety of software for storage management, encryption and security.
The Hewlett Packard Enterprise StoreEasy 1000 Storage family -- formerly HP StoreEasy 1000 Storage -- has four mid-level NAS models, management tools and BitLocker Drive Encryption support.
The acquisition of automation platform Ansible and a partnership to run its services on Microsoft Azure highlight a busy month of bolstering for the Red Hat cloud strategy.
Joyent bet big on containers to compete in the cloud market, and the company's CTO Bryan Cantrill has plenty to say about the state of containers and what needs to change.
Despite lingering concerns around compliance and lock-in, IT pros are deploying cloud storage services for a range of applications and use cases.
In order to ensure successful App-V deployment and get the most out of application virtualization, users should study up on App-V’s server and client-side components.
Application virtualization improves centralized control of complex applications without endpoint installation and management hassles.
With the advent of NFV, IT managers are finding new ways to improve data center networking.
Find out if these recent backup technologies -- snapshots and flat backup, hybrid cloud backup and instant VM recovery -- are right for your organization.
Atlanta-based Sutherland Asbill & Brennan chose Actifio for a specific task, but extended its copy data virtualization for all of its data protection needs.
While it may seem that you should never switch off the deduplication process, there are two instances where that may be the best solution for your organization.