Application Servers and Management Solutions, Cloud Computing and Hosted Services, Computer Hardware Sales, Installation, Maintenance, Computer and IT systems management, Database management, Desktop computers and mobile devices, Server Management, Server Operating Systems: Windows, Linux and Unix, Systems Integration and Management, Virtualization Technology and Services
Computer Networking Certifications, Network Management Services, Open Source Network Tools, SMB Business Networks, Virtualization Networking Services, Network Planning and Design, Network Installation and Administration, Virtual Private Network (VPN), VoIP and unified communications, Wireless Networks, SDN technologies and products
Introductory Security Services, Information Security Training and Certification, Regulatory Compliance, Threat management and prevention, Network security products, technologies, services, Identity management and access controls, Application security and data protection
Data Backup and Data Protection, Data Storage Hardware, Data Storage Management, MSPs/Storage as a Service, Network-Attached Storage (NAS), Regulatory Compliance Services, Remote Storage Management, Storage Area Network (SAN), Storage Virtualization
( Jul 23, 2014 )
( Jul 03, 2014 )
( Jun 06, 2014 )
( May 07, 2014 )
( May 01, 2014 )
Steve Johnson joins Dragon Piers Linney in the call for enterprises to get GYR (Generation Y Ready)
If IT can liberate us from tedious repetitive tasks, Nick Booth wonders if someone couldn't design an automated due diligence system that saves us from public sector IT cock ups
With data sovereignty front and centre, Acronis announces that it is to provide its customers with local solutions
Consolidation within the infrastructure as a service market may put channel partners into difficult positions. The bottom line, according to experts: Be prepared. Ask yourself how an M&A could impact your customer relationships.
Cloud migration tools can automate simple tasks but fall short on more sophisticated jobs, such as server migrations, making cloud migrations costly for customers and cloud partners alike.
In this news roundup, a Citrix study finds almost 90% of service providers predict DaaS growth in the next year; Hostway debuts Cloud Connex, a hosted cloud reseller and partner platform; and Tech Data features Unitrends DRaaS in the Solution Store.
Distributed denial-of-service attacks are increasingly a menace for enterprises. Expert Michael Cobb discusses industry initiatives that can help enterprises reduce the occurrence and power of DDoS attacks.
Can determined attackers be prevented from launching a distributed denial-of-service attack against an enterprise? In this Q&A, expert Michael Cobb discusses the reality of attack prevention and offers best practices for thwarting attacks.
News roundup: Endpoint antimalware has been long considered ineffective, yet a recent IDC report projects endpoint security growth. What gives? Plus: AWS Zocalo, new gTLDs, QR code authentication and more.
SN blogs: How can SDN be used to fortify network security? And is it time to be worried about software libraries?
Bremer Bank selected ForeScout CounterACT for network access control and endpoint visibility to improve regulatory compliance and security.
Good WLAN design means getting past the slogans that thwart performance objectives.
Increasing cache memory in your environment might help allocate CPU processes, but it doesn't necessarily result in better performance.
As flash memory caching is on its way in because of its cost and non-volatile nature, RAM may be on its way out the door, says analyst Jon Toigo.
Depending on how you choose to integrate SDS into your system, there are pros and cons to consider.
Public cloud has plenty of benefits, but it can be difficult to manage. Monitoring tools can ease the burden on cloud admins and keep your cloud under watch.
Controlling mission-critical application costs starts with knowing the expenses. With app resource requirements subject to change, knowing the numbers for monthly expenses can prevent budgeting bugaboos.
'It's not you, it's me' doesn't apply to breakups with cloud providers. Regulations and better opportunities can cause the split, but knowing how to ensure the well-being of mission-critical workloads in a migration is key.
Your KVM environment setup will be a little more complicated if VLANs are involved. These step-by-step instructions should simplify the setup.
Hyperconverged infrastructure, EVO:RAIL, and rebranded management suite, vRealize, show promise, but VMware still has some work to do.
VMware didn’t release a new version of vSphere, yet IT pros are encouraged at vSphere 6’s upcoming features, including long distance vMotion.
Colm Keegan of Storage Switzerland discusses ways to prevent performance issues associated with virtual backups.
Independent backup expert Brien Posey outlines the reasons why mobile data protection and security are increasingly important and whether organizations are on top of the issue today.
In the final part of our three-part series on modernizing backup and DR, Jason Buffington explores how cloud and virtualization advancements are changing disaster recovery.