Application Servers and Management Solutions, Cloud Computing and Hosted Services, Computer Hardware Sales, Installation, Maintenance, Computer and IT systems management, Database management, Desktop computers and mobile devices, Server Management, Server Operating Systems: Windows, Linux and Unix, Systems Integration and Management, Virtualization Technology and Services
Computer Networking Certifications, Network Management Services, Open Source Network Tools, SMB Business Networks, Virtualization Networking Services, Network Planning and Design, Network Installation and Administration, Virtual Private Network (VPN), VoIP and unified communications, Wireless Networks, SDN technologies and products
Introductory Security Services, Information Security Training and Certification, Regulatory Compliance, Threat management and prevention, Network security products, technologies, services, Identity management and access controls, Application security and data protection
Data Backup and Data Protection, Data Storage Hardware, Data Storage Management, MSPs/Storage as a Service, Network-Attached Storage (NAS), Regulatory Compliance Services, Remote Storage Management, Storage Area Network (SAN), Storage Virtualization
( Jul 25, 2014 )
( Jul 16, 2014 )
( Jun 19, 2014 )
The UK tech market continues to demonstrate it has the potential to drive the economy forward
A decent performance in Europe for both its computing and components operations helped Arrow Electronics in its second quarter
Exclusive Networks has hired a supply chain expert to mastermind its next phase of growth
Cloud solution providers that have made a commitment to AWS say it was an easy choice, though one expert cautions that Amazon's channel is immature.
Proponents say Microsoft's existing customer base, brand, mature channel and other factors position Azure as the top choice among IaaS providers.
Partners evolve as they move customers' business apps to the cloud, learning the skills and approach and about further business opportunities.
Corporate boards have increased their awareness of security issues, but experts say they still lack information security principles.
Preview: At Black Hat USA, Point-of-Sale expert Nir Valtman will demonstrate new attacks designed to break point-of-sale security.
Video: Insider threats expert Randy Trzeciak explains why non-malicious insiders, particularly developers, pose as much risk to an enterprise as intentionally malicious insiders.
To respond to increased cyberthreats, enterprises need to form their network's security plan around the idea of pervasive protection, which is based on the notion of a centrally managed security system.
The new IT landscape is more virtual, distributed and increasingly mobile. It's more interconnected with applications talking to each other. Threats are evolving and so is regulatory pressure. All of this creates security compliance challenges.
Pervasive protection encompasses risk management, forensics, identity authentication and risk management to provide a centralized approach to security management that protects your enterprise network in a modern IT landscape.
Red Hat's first Ceph upgrade since its Inktank acquisition adds erasure coding, cache tiering and management updates.
DDN's high-performance computing storage systems provide Department of Energy lab with 75 GBps read/write operations and eliminates bottlenecks.
EMC spins out two new Isilon NAS models, including one for Hadoop analytics, and adds flash read cache.
Database technology is soaring into its next evolution and heading to the cloud. What impact, if any, will it have on big data and Hadoop?
Cloud monitoring can collect a range of performance data, but a crucial piece of the puzzle, networking, often falls short. A third-party network monitoring tool is essential to keep your cloud running up to par.
Windows Azure carries a reputation of being difficult to manage, but with Microsoft and third parties stepping up with several management tools, it can be difficult to sort through your options.
New technologies allow efficient VM-aware storage provisioning and management through the hypervisor.
With VMworld 2014 right around the corner, our Advisory Board experts share their predictions for new VMware products.
The proliferation of virtualization has radically changed the face of disaster recovery and introduced new trends to protect data.
Virtual servers require a new approach to backup and recovery. Brien Posey looks at the products which offer virtual backups.
EMC data protection president Guy Churchward says EMC can deliver Data Domain as a virtual appliance and discusses plans for cloud-to-cloud backup and data protection services inside ViPR.
The line between endpoint data protection and file sync and share has blurred as endpoint backup products can access protected data from devices beyond laptops.