Application Servers and Management Solutions, Cloud Computing and Hosted Services, Computer Hardware Sales, Installation, Maintenance, Computer and IT systems management, Database management, Desktop computers and mobile devices, Server Management, Server Operating Systems: Windows, Linux and Unix, Systems Integration and Management, Virtualization Technology and Services
Computer Networking Certifications, Network Management Services, Open Source Network Tools, SMB Business Networks, Virtualization Networking Services, Network Planning and Design, Network Installation and Administration, Virtual Private Network (VPN), VoIP and unified communications, Wireless Networks, SDN technologies and products
Introductory Security Services, Information Security Training and Certification, Regulatory Compliance, Threat management and prevention, Network security products, technologies, services, Identity management and access controls, Application security and data protection
Data Backup and Data Protection, Data Storage Hardware, Data Storage Management, MSPs/Storage as a Service, Network-Attached Storage (NAS), Regulatory Compliance Services, Remote Storage Management, Storage Area Network (SAN), Storage Virtualization
( Dec 12, 2014 )
( Dec 11, 2014 )
( Dec 05, 2014 )
( Dec 03, 2014 )
Security player Blue Coat has turned to a former staffer to take up a senior position in its channel team to drive growth
Ofcom has started the process of unraveling the complexities of IoT, but the report does nothing other than kick the can down the road
Data privacy day is a chance for resellers to remind customers of the risks of a data breach and the benefits of being proactive
If traditional distributors are to gain traction in the cloud-based IT economy, they will have to overcome competition from unexpected corners.
To keep pace with their customers' increasingly complicated, hybridized environments, service providers employ a range of new and developing tools.
Cloud partners provide insight into the objectives and challenges involved in each step of a cloud readiness assessment: the technology, the operational processes and the people.
An FTC report urges vendors to be proactive in creating Internet of Things security and privacy controls, while a Tripwire survey shows IoT devices are a growing corporate risk.
With a number of new network security certifications available, knowing which one will best help your career can be confusing. Expert Kevin Beaver discusses the options.
A critical Linux vulnerability, called GHOST, has been found to affect glibc versions released since 2000, and could pose a remote exploit risk on many Linux systems.
Cisco ONE provides a single license for all-in-one hardware and software package aimed at a specific networking use case, but it may be the high-priced option.
SN blogs: This week, an analyst discusses why browser-based communication is enhanced with WebRTC applications.
A10 Networks has re-architected the software within its application delivery controller, making it more customizable for inserting Layer 4-7 services in SDN, NFV and cloud applications.
Find out the six finalists we think offer the best storage systems of 2014, while still using ‘old-fashioned’ spinning disk.
The finalists in the storage management tools category offer analytics, monitoring and automation for physical and virtual environments.
The Law Offices of Joe Bornstein filled performance, data classification and data protection checkboxes with startup DataGravity's Discovery Series array.
U.S. federal agencies have been slow to adopt cloud due to security concerns, budget constraints and other factors. But that might change soon.
Google expanded its storage offerings this month with the general availability of local SSD -- a feature pegged for high-demand apps and supplementing RAM.
Google customers looking to do more around high-performance workloads got a boost with the expansion of the cloud vendor's big data ecosystem.
Migrating your existing VMs to the latest version of Hyper-V will allow you to take advantage of new features and capabilities.
What are the hardware and software requirements for server clustering with vSphere 5.5?
What hypervisor and host system are required for VMDK files larger than 2 TB? Are there any potential problems to consider?
New Unitrends CEO Kevin Weiss says he needs to build the company's brand awareness and wants to grow through acquisition and organically.
George Crump of Storage Switzerland looks at how continuous data protection has evolved over the past 10 years.
Unitrends isn't new to integrated backup appliances, but puts a new twist on their systems by adding up to 480 GB of flash to handle processing chores.