Application Servers and Management Solutions, Cloud Computing and Hosted Services, Computer Hardware Sales, Installation, Maintenance, Computer and IT systems management, Database management, Desktop computers and mobile devices, Server Management, Server Operating Systems: Windows, Linux and Unix, Systems Integration and Management, Virtualization Technology and Services
Computer Networking Certifications, Network Management Services, Open Source Network Tools, SMB Business Networks, Virtualization Networking Services, Network Planning and Design, Network Installation and Administration, Virtual Private Network (VPN), VoIP and unified communications, Wireless Networks, SDN technologies and products
Introductory Security Services, Information Security Training and Certification, Regulatory Compliance, Threat management and prevention, Network security products, technologies, services, Identity management and access controls, Application security and data protection
Data Backup and Data Protection, Data Storage Hardware, Data Storage Management, MSPs/Storage as a Service, Network-Attached Storage (NAS), Regulatory Compliance Services, Remote Storage Management, Storage Area Network (SAN), Storage Virtualization
( Oct 15, 2014 )
( Oct 10, 2014 )
( Aug 01, 2014 )
Research finds that SMBs are wasting time and schools are wasting money
The Business Software Alliance has kicked off a campaign to inform Manchester-based firms over the need to be on top of their software licenses
Symantec says the Trojan is one of the most advanced ever seen and was likely developed by a nation state for cyber-espionage
So far, Helion has been generally well-received by HP partners and customers alike. According to partners, the platform reduces the risks for solution providers looking to make the move to cloud.
Partners must develop a balanced portfolio between on-premises and cloud-based offerings and endure the recurring revenue model's cash flow trough, says Tintri's Americas channel chief.
Challenges arise for IT shops introducing OpenStack into legacy environments, but solution providers can help by providing distros and services.
The Canadian anti-spam legislation applies to many enterprises. Expert Mike Chapple explains what the effects of CASL are for businesses.
New research shows that average DDoS attacks are growing larger and more prevalent as attackers have moved to exploit SSDP, the latest protocol to be abused for its amplification factor.
News roundup: As the industry responds to growing demand for end-to-end Internet encryption, some fear unintended consequences. Plus: Black hats wanted; Windows Phone survives Pwn2Own; webcam spying resurgence.
SN blogs: This week, analysts discuss how white-box switching will become more affordable, and why multinode server platforms aren’t much different from blade servers.
Extreme Networks is expanding on its software-defined architecture with the addition of new products, partners and enhancements to existing technology.
Generic Ethernet access is a new carrier service rolling out in the United Kingdom. Is this a technology that can work for you?
Archiving data in place is becoming more attractive to enterprises because it allows data to be archived on the storage it already resides on.
Seagate beefs up ClusterStor storage systems acquired from Xyratex, with new Hadoop optimization tools, Lustre update and secure data appliances.
Analyst Jon Toigo explains why performing analytics on big data sets means that data is no longer considered cold, reducing the importance of archives.
Google Autoscaling gives IaaS customers better control and more use cases as the public cloud vendor inches toward product parity with the competition.
Microsoft’s slow response to the recent Azure outage left some users wondering if they should entrust critical business data to the cloud environment.
In this Q&A, Docker CEO Ben Golub discusses integration with AWS and future development of the hugely popular container technology.
Virtualization capabilities can enhance a company’s disaster avoidance and recovery process, but companies must weigh business needs to decide which approach is right.
Today's businesses can shift away from disaster recovery and prevent outages from occurring in the first place with a disaster avoidance plan.
The VHDX file format offers new features and better scalability over its predecessor, but many IT professionals still have questions about the advantages.
Can you discuss application awareness for widely used products like SharePoint and Exchange in backup software today?
Should mobile device data protection be on more organizations' radars?
Is performance a big issue with instant recovery, or recovery-in-place? It seems like running a VM from backup storage would cause performance to drop.