Application Servers and Management Solutions, Cloud Computing and Hosted Services, Computer Hardware Sales, Installation, Maintenance, Computer and IT systems management, Database management, Desktop computers and mobile devices, Server Management, Server Operating Systems: Windows, Linux and Unix, Systems Integration and Management, Virtualization Technology and Services
Computer Networking Certifications, Network Management Services, Open Source Network Tools, SMB Business Networks, Virtualization Networking Services, Network Planning and Design, Network Installation and Administration, Virtual Private Network (VPN), VoIP and unified communications, Wireless Networks, SDN technologies and products
Introductory Security Services, Information Security Training and Certification, Regulatory Compliance, Threat management and prevention, Network security products, technologies, services, Identity management and access controls, Application security and data protection
Data Backup and Data Protection, Data Storage Hardware, Data Storage Management, MSPs/Storage as a Service, Network-Attached Storage (NAS), Regulatory Compliance Services, Remote Storage Management, Storage Area Network (SAN), Storage Virtualization
( Jul 23, 2014 )
( Jul 03, 2014 )
( Jun 06, 2014 )
( May 07, 2014 )
( May 01, 2014 )
Stone has teamed up with the Tablet Academy to help the education market make the right decisions about mobile technology
KCS continues to bolster its cyber security portfolio adding Sentinel to its options
Mobile workers are using increasing amounts of data as video and mapping apps grow in popularity
Cloud solution providers that have made a commitment to AWS say it was an easy choice, though one expert cautions that Amazon's channel is immature.
Proponents say Microsoft's existing customer base, brand, mature channel and other factors position Azure as the top choice among IaaS providers.
Partners evolve as they move customers' business apps to the cloud, learning the skills and approach and about further business opportunities.
A vendor's Heartbleed scan shows that a majority of Global 2000 organizations may still be vulnerable despite patching the OpenSSL flaw.
A variant of malware on Android devices removes and reinstalls itself when a device powers on or off. Learn how to completely eradicate the threat.
Big data clusters require a different security model. Four common approaches can help security teams migrate beyond familiar RDBMS techniques, to the tools and processes required in new database environments.
Cisco unveiled its managed service, Cisco Secure Ops Solutions, to help unify security risk management for business environments with isolated IT and industrial networks.
Arista, Google, Microsoft, Broadcom and Mellanox are developing 25 and 50 Gigabit Ethernet (GbE) top-of-rack switches. After initial reluctance, the IEEE is considering a standard for 25 GbE, but vendors may be out of luck with 50 GbE.
Updated Juniper security tool, DDos Secure, now offers broader DDoS intelligence to routers for improved attack mitigation.
Advances to object technology and accelerating growth of unstructured data make object storage valuable for on-premises data, despite their start as a cloud play.
Red Hat's first Ceph upgrade since its Inktank acquisition adds erasure coding, cache tiering and management updates.
DDN's high-performance computing storage systems provide Department of Energy lab with 75 GBps read/write operations and eliminates bottlenecks.
Database technology is soaring into its next evolution and heading to the cloud. What impact, if any, will it have on big data and Hadoop?
Cloud monitoring can collect a range of performance data, but a crucial piece of the puzzle, networking, often falls short. A third-party network monitoring tool is essential to keep your cloud running up to par.
Windows Azure carries a reputation of being difficult to manage, but with Microsoft and third parties stepping up with several management tools, it can be difficult to sort through your options.
No matter what word follows the phrase "software defined," it catches IT professionals' attention. Here's a deeper look at the different software-defined options.
New technologies allow efficient VM-aware storage provisioning and management through the hypervisor.
With VMworld 2014 right around the corner, our Advisory Board experts share their predictions for new VMware products.
Virtual servers require a new approach to backup and recovery. Brien Posey looks at the products which offer virtual backups.
EMC data protection president Guy Churchward says EMC can deliver Data Domain as a virtual appliance and discusses plans for cloud-to-cloud backup and data protection services inside ViPR.
The line between endpoint data protection and file sync and share has blurred as endpoint backup products can access protected data from devices beyond laptops.