Application Servers and Management Solutions, Cloud Computing and Hosted Services, Computer Hardware Sales, Installation, Maintenance, Computer and IT systems management, Database management, Desktop computers and mobile devices, Server Management, Server Operating Systems: Windows, Linux and Unix, Systems Integration and Management, Virtualization Technology and Services
Computer Networking Certifications, Network Management Services, Open Source Network Tools, SMB Business Networks, Virtualization Networking Services, Network Planning and Design, Network Installation and Administration, Virtual Private Network (VPN), VoIP and unified communications, Wireless Networks, SDN technologies and products
Introductory Security Services, Information Security Training and Certification, Regulatory Compliance, Threat management and prevention, Network security products, technologies, services, Identity management and access controls, Application security and data protection
Data Backup and Data Protection, Data Storage Hardware, Data Storage Management, MSPs/Storage as a Service, Network-Attached Storage (NAS), Regulatory Compliance Services, Remote Storage Management, Storage Area Network (SAN), Storage Virtualization
( Jul 23, 2014 )
( Jul 03, 2014 )
( Jun 06, 2014 )
( May 07, 2014 )
( May 01, 2014 )
After just a couple of months in the job Russell Poole has revealed his plans as the UK channel head at EMC
EMC has warned that the fruits of big data are not going to be harvested unless firms can get hold of staff with the right IT skills
Zycko brings sales veteran into the fold to head up European expansion plans
When partnering with a tier 1 IaaS provider, overlapping offerings can lead to eroding margins. Experts give advice on how solution providers can create differentiated services and secure businesses.
Amazon boasts a broad range of tools for managing an EC2 instance, but partners say third-party and open source tools expand on Amazon's offerings.
Partners give their take on a range of Azure management tools that are offered by Microsoft, third-party vendors and the open source community.
The Staples breach is suspected to have affected payment card information in an as-yet-undetermined number of the office supply chain's stores in the northeast U.S.
The Sality malware has reemerged with new capabilities: brute-forcing passwords on wireless access points. Enterprise threats expert Nick Lewis explains how to.
The newly launched Apple Pay mobile payment system could deliver the most secure shopping experience for U.S. customers yet, though it still may not be perfect.
ICYMI: The NBA shows its commitment to the Internet of Things by keeping Cisco as its official technology provider; Ruckus launches smart APs.
Aerohive and Verizon are offering an all-inclusive cloud-managed Wi-Fi networking offering for retail customers, backed by Verizon's LTE network.
NetScout expands its network performance monitoring and security monitoring capabilities with Fluke, Arbor and Tektronix merger, but questions remain.
Brocade adds Fibre Channel SAN extension switch and denser 16 Gbps card for its backbone director switch with an eye on moving data across distances.
IBM bundles Elastic Storage -- based on GPFS and Watson -- on its Power8 server and supports System z mainframes.
Red Hat's new Storage Server 3 software update adds support for snapshots and hot-button capabilities such as petabyte-scale capacity, SSDs and Hadoop.
DIY is good for remodeling a house, but it might not be right for your enterprise. Answering five questions can prevent your cloud from a DIY disaster.
VMware will offer a SaaS version of its vRealize management suite as the company looks to bolster its hybrid cloud services.
There are many considerations for building a private cloud, especially with a tight budget. Keep costs in check by carefully planning out hardware, capacity, storage and networking.
There are many factors to consider when configuring a storage LUN to ensure it provides your VMs with the best possible performance.
Zombie VMs are real, but they don’t have to be as scary as they sound. With proper planning and the right tools you can prevent shambling hordes of wasteful servers.
Every IT pro knows that it's important to install critical patches to virtual machines in a timely manner, but what about the less serious updates?
George Crump of Storage Switzerland discusses mobile device data protection, comparing products that perform file synchronization to products that perform an actual backup.
Can you describe the different issues involved with laptops, phones and tablets specifically, and mobile device backup in general?
What are the biggest challenges when it comes to mobile device data protection? Supporting different technologies among multiple users? Remote users?