Application Servers and Management Solutions, Cloud Computing and Hosted Services, Computer Hardware Sales, Installation, Maintenance, Computer and IT systems management, Database management, Desktop computers and mobile devices, Server Management, Server Operating Systems: Windows, Linux and Unix, Systems Integration and Management, Virtualization Technology and Services
Computer Networking Certifications, Network Management Services, Open Source Network Tools, SMB Business Networks, Virtualization Networking Services, Network Planning and Design, Network Installation and Administration, Virtual Private Network (VPN), VoIP and unified communications, Wireless Networks, SDN technologies and products
Introductory Security Services, Information Security Training and Certification, Regulatory Compliance, Threat management and prevention, Network security products, technologies, services, Identity management and access controls, Application security and data protection
Data Backup and Data Protection, Data Storage Hardware, Data Storage Management, MSPs/Storage as a Service, Network-Attached Storage (NAS), Regulatory Compliance Services, Remote Storage Management, Storage Area Network (SAN), Storage Virtualization
( Oct 15, 2014 )
( Oct 10, 2014 )
( Aug 01, 2014 )
Nick Booth walked the stands at the recent VMworld 2014 event to find out if anyone in the land of virtualisation had any problems to declare
Microsoft and IBM have forged a partnership allowing their software solutions to run on their respective clouds
Warnings of a Doomsday cyber security attack are not just the stuff of James Bond warns KCS Group chief executive and founder Stuart Poole-Robb
When partnering with a tier 1 IaaS provider, overlapping offerings can lead to eroding margins. Experts give advice on how solution providers can create differentiated services and secure businesses.
Amazon boasts a broad range of tools for managing an EC2 instance, but partners say third-party and open source tools expand on Amazon's offerings.
Partners give their take on a range of Azure management tools that are offered by Microsoft, third-party vendors and the open source community.
When evaluating the business cases for MFA in the enterprise, expert David Strom says an organization must first identify which of the three operational scenarios apply to a potential implementation.
Expert Ernie Hayden takes an in-depth look at the development of NIST SP800-82 since its birth, and what the standard includes in the most recent revision.
SQL injection attacks continue to plague enterprises. However, performing audit code validation when using outsourced developers can be a challenge. Expert Nick Lewis explains how to prevent these attacks.
The Cisco IOx platform has been updated to help businesses simplify the management of IoT endpoints and applications.
There's been a lot of talk recently about Cisco vs. HP switches. Read this comparison to help you choose the best networking switch.
National Cyber Security Awareness month has been around for 11 years, but more talk -- and action -- is needed to achieve real goals.
Brocade adds Fibre Channel SAN extension switch and denser 16 Gbps card for its backbone director switch with an eye on moving data across distances.
IBM bundles Elastic Storage -- based on GPFS and Watson -- on its Power8 server and supports System z mainframes.
Red Hat's new Storage Server 3 software update adds support for snapshots and hot-button capabilities such as petabyte-scale capacity, SSDs and Hadoop.
A Xen hypervisor issue forced Amazon Web Services to reboot EC2, causing issues for customers. Are disruptions just part of the cloud package?
IBM joins forces with Microsoft to support the other’s cloud platforms with their respective enterprise apps. Whether the software gains can cover IBM’s hardware losses remains to be seen.
DIY is good for remodeling a house, but it might not be right for your enterprise. Answering five questions can prevent your cloud from a DIY disaster.
Picking hardware with the right CPU features can improve server virtualization potential and boost critical VM performance.
There are many factors to consider when configuring a storage LUN to ensure it provides your VMs with the best possible performance.
Zombie VMs are real, but they don’t have to be as scary as they sound. With proper planning and the right tools you can prevent shambling hordes of wasteful servers.
Overland Storage releases 60- and 80-slot automated tape libraries in 6U rack and scales tape storage into petabyte range.
George Crump of Storage Switzerland discusses mobile device data protection, comparing products that perform file synchronization to products that perform an actual backup.
Can you describe the different issues involved with laptops, phones and tablets specifically, and mobile device backup in general?