Application Servers and Management Solutions, Cloud Computing and Hosted Services, Computer Hardware Sales, Installation, Maintenance, Computer and IT systems management, Database management, Desktop computers and mobile devices, Server Management, Server Operating Systems: Windows, Linux and Unix, Systems Integration and Management, Virtualization Technology and Services
Computer Networking Certifications, Network Management Services, Open Source Network Tools, SMB Business Networks, Virtualization Networking Services, Network Planning and Design, Network Installation and Administration, Virtual Private Network (VPN), VoIP and unified communications, Wireless Networks, SDN technologies and products
Introductory Security Services, Information Security Training and Certification, Regulatory Compliance, Threat management and prevention, Network security products, technologies, services, Identity management and access controls, Application security and data protection
Data Backup and Data Protection, Data Storage Hardware, Data Storage Management, MSPs/Storage as a Service, Network-Attached Storage (NAS), Regulatory Compliance Services, Remote Storage Management, Storage Area Network (SAN), Storage Virtualization
( May 13, 2015 )
( May 08, 2015 )
( May 06, 2015 )
The United Nation's Office of the High Commissioner has published a report applauding encryption and calling on governments to stop trying to sneak around it
IDC says Windows 10 will not save decline in PC shipments from impact of mobile demand
Lenovo unveils range of new concepts at first global technology event
SaaS providers typically don't offer clients a full backup service, but partners can step in with a cloud-to-cloud backup service that fills that gap.
EMC's pending acquisition of Virtustream would create a new cloud service business and opportunities for consultants, integrators and service providers
A PartnerPath study says vendors can boost cloud channel partner management if they focus on metrics, channel program structure and field sales incentives.
A breach of the IRS' Internet tax form service "Get Transcript" exposed the personal information and tax filings of thousands of people.
News roundup: Cybersecurity is finally garnering attention at the boardroom table, but not necessarily for the right reasons. Plus: Ponemon's "Cost of Data Breach"; D-Link vulnerabilities; NitlovePOS; bad bots.
As the global smartphone market slows, it's becoming readily apparent that the rise of smartphone security threats isn't slowing -- and no OS is safe.
Fortinet's acquisition of Wi-Fi vendor Meru networks gives the security vendor the tools to compete with Cisco and HP in the enterprise wireless LAN market
Dell switches from data protection reseller to innovative vendor; business intelligence heads to the cloud.
Networking expert Mike Jude says big data analytics isn't complete without cognitive computing. But a cognitive computing framework should not be taken lightly.
Toshiba joins drive makers testing new devices that combine storage, compute resources and Ethernet ports to scale object stores, big data analytics.
Hyperscale systems and high-performance computing environments can gain performance boosts from Avago's PEX9700 PCI Express switch chips.
Jon Toigo discusses why, despite their benefits, high-availability features are not a full replacement for a good disaster recovery plan.
Containers are gaining steam in the cloud market with Docker leading the pack. To steer your application to containers, follow these five steps.
EMC just laid down some serious cash to acquire a cloud software company that has some technology overlap with VMware but also fills an important gap.
Many businesses expect cloud to be cheaper, but cost-efficiency is no guarantee. To reap cloud's financial rewards, devise a cost optimization plan.
A new generation of flash storage at more affordable prices is improving performance. Here are five quick tips to help you understand how to get the most for your money.
Businesses used to rely on partnerships between companies to get the different top products but now hyper-converged vendors have expanded to offer more products of their own.
Removing every potential failure point is usually prohibitively expensive. Instead, start by mapping potential failures and assessing business needs.
Instant recovery allows users to run a virtual machine from a backup copy. We list the top five fallacies around the technology.
Recovery in place allows users to run apps from a backup virtual machine. Brien Posey explains the two steps involved with failing back to the primary VM.
Restoring VMware and Hyper-V virtual machines from a backup are similar processes, but there are a few important differences to keep in mind.