Welcome to SearchITChannel.com's Events information listings the latest SearchITChannel.com related conferences, tradeshows, and more.
CompTIA ChannelCon 2014
Date: August 4-6, 2014
Location: Phoenix, AZ
Application Servers and Management Solutions, Cloud Computing and Hosted Services, Computer Hardware Sales, Installation, Maintenance, Computer and IT systems management, Database management, Desktop computers and mobile devices, Server Management, Server Operating Systems: Windows, Linux and Unix, Systems Integration and Management, Virtualization Technology and Services
Computer Networking Certifications, Network Management Services, Open Source Network Tools, SMB Business Networks, Virtualization Networking Services, Network Planning and Design, Network Installation and Administration, Virtual Private Network (VPN), VoIP and unified communications, Wireless Networks, SDN technologies and products
Introductory Security Services, Information Security Training and Certification, Regulatory Compliance, Threat management and prevention, Network security products, technologies, services, Identity management and access controls, Application security and data protection
Data Backup and Data Protection, Data Storage Hardware, Data Storage Management, MSPs/Storage as a Service, Network-Attached Storage (NAS), Regulatory Compliance Services, Remote Storage Management, Storage Area Network (SAN), Storage Virtualization
Dragon's Den star and co-CEO of Outsourcery says that employers must change their ways in order to get the most out of Gen-Y
Sales of personal computers boost HP's figures but profit still falls as as vendor reports its third-quarter results
Qsan brings 20-year storage veteran on board to handle UK channel
For MSPs and VARs, Office 365 presents a gateway to the cloud. Partners have found ways to make Microsoft Office 365 a highly profitable part of their business by bundling the product with additional value and leveraging a weakness in the platform.
Opportunities abound for cloud platforms like Microsoft Azure, and solution providers see business growth as they monetize Azure and deliver added value.
Rethinking your sales and marketing strategy is critical to developing a workable cloud sales strategy, according to cloud expert Terry Hedden.
A vendor report found that while mobile malware may receive more attention, unrestrained mobile app data collection actually poses a greater risk to consumers and data security.
Bigger, more diverse networks mean a larger attack surface for hackers. Today's networking pros must update security strategies to account for new vulnerabilities and respond to inevitable attacks. But first, they need a clear view into their network.
An infosec consultancy has claimed that a Heartbleed exploit was used by attackers to gain access as part of the Community Health data breach.
WAN aggregation allows continuous, high-performance networking, and software-defined networking delivers greater security, visibility and control. In this tip, expert John Burke evaluates both technologies to help you better optimize your network.
The Georgia World Congress Center has upgraded to 802.11ac Meru wireless technology to support thousands of attendees, exhibitors and mobile devices.
ICYMI: Array unveils low-cost WAN optimization; Cisco layoffs are more strategic than you might think.
The vendor comes out of stealth with Discovery hybrid storage arrays that offer real-time data governance and data protection capabilities.
Boston Celtics VP and CTO Jay Wessland says the team is considering a shift from scale-up storage to address the explosion of digital video.
Incoming Michigan State CIO discusses the data storage challenges universities have to deal with and how to address them with cloud storage.
Is it true that if you don't use it, you lose it? When it comes to the cloud, enterprises are buying excess capacity at lower prices. David Linthicum discusses whether the extra cloud capacity is being maximized.
OpenStack is close to doing its victory lap in the private cloud race -- but not so fast. There are three emerging trends in the cloud market that could become threats to OpenStack's position.
Combining the Internet of Things and cloud services could build an IT superpower. With its infinite capabilities and security enhancements, it'd be hard to find its kryptonite.
Generation 1 and Generation 2 virtual machines are the two options for Windows Server 2012 R2. Generation 2 offers plenty of benefits but there are requirements and limitations that accompany it.
Before you deploy a bare-metal hypervisor, you have to make sure you have met all of the requirements. One of the main requirements needed to make the deployment work is something not included in SCVMM.
Hyper-V Replica is included in Hyper-V 3.0 without any extra cost, but what do you need to use it? When is the right time to host your applications in Hyper-V Replica? These questions and more are answered right here.
Independent backup expert Brien Posey outlines the reasons why mobile data protection and security are increasingly important and whether organizations are on top of the issue today.
In the final part of our three-part series on modernizing backup and DR, Jason Buffington explores how cloud and virtualization advancements are changing disaster recovery.
Part two of our three-part series on modernizing backup and disaster recovery takes a look at endpoint data protection issues and what's available today to address them.