News
News
- March 30, 2015
30 Mar'15
Databricks the heir to MapReduce throne?
At Spark Summit East, Databricks talked up a storm about its new Spark cloud offering in an effort to distinguish the data processing engine from MapReduce and the Hadoop stack: The Data Mill reports.
- March 30, 2015
30 Mar'15
PCI 3.1: Will it be a 'fire drill'?
The PCI Security Standards Council has confirmed that PCI DSS 3.1 will be released in just a few weeks. According to a Gartner analyst, the surprise new release could cause major problems for merchants.
- March 27, 2015
27 Mar'15
SearchYourCloud makes cloud storage search easier, safer
SearchYourCloud's new tool gives users a way to search multiple cloud sync-and-share services on mobile and desktops, with file-level security.
-
- March 27, 2015
27 Mar'15
Versatile banking Trojan Vawtrak returns
Heimdal Security researchers have found new cases of the nesting-doll financial malware, while Fortinet researchers peels back the layers to reveal its surprising intricacies.
- March 27, 2015
27 Mar'15
Two desktop analytics tools to ease endpoint management
New desktop analytics tools from AppSense and Ericom could help IT admins deal with desktop management at small and large scales.
- March 27, 2015
27 Mar'15
Amazon Cloud Drive guns for glory with unlimited storage offer
Amazon's cloud storage service to offer unlimited storage at cheaper rates than Dropbox and Google.
- March 27, 2015
27 Mar'15
Hybrid cloud driving companies to buy SDN products
A majority of U.S. businesses are preparing to implement SDN products in the data center by 2017 in order to reduce networking costs.
- March 27, 2015
27 Mar'15
Google Cloud Launcher accelerates open-source app deployments
Google hopes to make it easier for users to deploy open-source apps in its cloud through the release of its Google Cloud Launcher tool.
- March 27, 2015
27 Mar'15
Federal government clouds plagued by security shortfalls
A new report on government cybersecurity efforts delivered some troubling findings for the federal government's cloud operations.
- March 27, 2015
27 Mar'15
Amazon job postings hint at AWS roadmap
Amazon is hiring thousands of people, and where it’s hiring offers clues about where the AWS roadmap is headed.
-
- March 27, 2015
27 Mar'15
Microsoft to acquire LiveLoop productivity tool startup
Microsoft is to acquire LiveLoop, a startup that develops collaboration and sharing tools for Microsoft Office.
- March 27, 2015
27 Mar'15
How the social engineering threat has evolved and grown
Social engineering techniques have become increasingly sophisticated as more personal and corporate data is shared on the Internet, and traditional training techniques may not be enough to keep enterprises safe.
- March 26, 2015
26 Mar'15
Ovum urges service providers to get serious about cloud security
Analyst Ovum's report into enterprise cloud adoption warns service providers to stop treating customers' security as an afterthought.
- March 26, 2015
26 Mar'15
ProfitBricks ignites cloud pricing war with AWS and Google
IaaS player promises to undercut rivals on price, but analysts question sustainability of business model.
- March 26, 2015
26 Mar'15
Cross-region S3 replication simplifies disaster recovery
Replication across AWS cloud regions is now a checkbox item in the management console, circumventing homegrown and third-party tools.
- March 26, 2015
26 Mar'15
Hedvig comes out of stealth with SDS software
Hedvig, whose founder created Cassandra and Amazon Dynamo, looks to disrupt storage with a distributed platform that virtualizes hyperscale storage.
- March 26, 2015
26 Mar'15
Trust a key element in the convergence sale
Putting all of your eggs in one basket is not something that some customers decide to do with reservations making trust in the channel supplier vital.
- March 26, 2015
26 Mar'15
Samsung targets business with Microsoft integration
Samsung has pre-installed Microsoft OneNote, OneDrive, and Skype on the new Galaxy S6 and Galaxy S6 edge, as it expands into business.
- March 26, 2015
26 Mar'15
IBM adds block and file cloud storage options to SoftLayer
Big Blue adds iSCSI block and file access to SoftLayer cloud storage services.
- March 26, 2015
26 Mar'15
Cloud UC strategy varies for SMBs, enterprises
Enterprises interested in cloud UC are adopting a single-tenant, cloud-based UC model rather than multi-tenant UCaaS.
- March 26, 2015
26 Mar'15
Zuora CFO on subscription business models
Zuora's Tyler Sloat shares his CFO strategies for succeeding in the subscription economy.
- March 25, 2015
25 Mar'15
Pivotal Cloud Foundry makes public cloud link with AWS
Pivotal Cloud Foundry is offering one-click connections to AWS, as well as free infrastructure management for subscription customers.
- March 25, 2015
25 Mar'15
Oracle Marketing Cloud uses big data to help higher ed
Oracle releases Oracle Marketing Cloud products for colleges and data-as-a-service users, and a judge decides to keep the Oregon lawsuit in-state.
- March 25, 2015
25 Mar'15
SoftLayer adds performance tiering to its IBM Cloud
SoftLayer upgrades its IBM Cloud storage with services for granular performance management that calibrate IOPS to application needs.
- March 25, 2015
25 Mar'15
Azure App Service eases mobile, Web development
Azure App Service combines existing tools and adds cross-platform capabilities for streamlined mobile and Web application development.
- March 25, 2015
25 Mar'15
Ponemon: Companies are neglecting mobile app security
The Ponemon Institute says enterprises are devoting millions of dollars to mobile application development, but barely any of the money is focused on security.
- March 24, 2015
24 Mar'15
BandarChor ransomware evolves, spreads to U.S.
Antivirus vendor F-Secure discovered BandarChor, a new type of ransomware based on an existing malware family that struck Russia last year.
- March 24, 2015
24 Mar'15
Epic still on top, but Cerner narrows gap, KLAS says
Epic Systems wins big EHR buying decisions 2-1 over Cerner, down from 3-1 last year, KLAS says. The other players: Meditech, McKesson, and Allscripts.
- March 24, 2015
24 Mar'15
Enterprise messaging apps aren't threatening UC yet
Market research debunks claims that enterprise messaging apps are poised to take market share away from UC vendors.
- March 24, 2015
24 Mar'15
Third-quarter results show a strong Oracle cloud
Oracle's third-quarter financial results look very similar to last year's, but with constant currency the picture is much brighter. And the Oracle cloud business was particularly strong, company execs said.
- March 23, 2015
23 Mar'15
Embedded systems expand, but security lags behind
As more devices become Internet-enabled, experts fear an embedded systems security worst-case scenario for enterprises, many of which are unaware of the risks or unable to mitigate them.
- March 23, 2015
23 Mar'15
Microsoft's Nano Server: What to expect
With Microsoft reportedly set to announce a stripped-back version of Windows Server, what can IT leaders expect to see?
- March 23, 2015
23 Mar'15
Windows XP migration drying up hits VDI demand
The decline in the number of users needing to move off Windows XP has not only hit demand for traditional desktops but also VDI deployments.
- March 23, 2015
23 Mar'15
Juniper, Mirantis further OpenStack SDN marriage
Juniper and Mirantis are expanding their engineering partnership to deliver an OpenStack SDN combo to appeal to enterprises making the SDN move.
- March 23, 2015
23 Mar'15
Cisco IP phones vulnerable to eavesdropping
Cisco says a vulnerability in some of its IP phones for SMBs could allow attackers to remotely eavesdrop on phone calls. A fix is not yet available, but Cisco has offered mitigation techniques.
- March 20, 2015
20 Mar'15
Formulating a successful cloud storage strategy
While cloud storage may seem simple, there's a lot to consider to maximize ROI. Make sure security, metadata and management are top of mind.
- March 20, 2015
20 Mar'15
AAA maps out SaaS deployment success
Deploying SaaS can drive major efficiency gains within an organization. But it also presents its fair share of challenges -- security being one of them.
- March 19, 2015
19 Mar'15
SN blogs: Competitive acquisition leaves some partners vulnerable
SN blogs: This week, an analyst discusses why competitive acquisitions can hurt some companies and another discusses how to transition away from technology silos.
- March 19, 2015
19 Mar'15
AWS called on to follow data privacy standard
As AWS expands into apps such as email, experts say it should strengthen its data privacy credentials by following the controls set forth in the new ISO 27018 standard.
- March 18, 2015
18 Mar'15
UC vendors thumbs down on interoperability
While major UC vendors say users are in the driver's seat, they steer clear of making their products interoperable.
- March 18, 2015
18 Mar'15
Azure IoT Suite a back-end cloud answer to emerging field
Azure IoT Suite may be the first major cloud platform to cover the spectrum of collecting, analyzing and presenting data from Internet of Things devices.
- March 18, 2015
18 Mar'15
AMI launches StorTrends AFAs with 'split' tiers
The StorTrends 3600i iSCSI SAN arrays feature a split architecture that writes to enterprise MLC SSDs while maintaining a read tier of consumer-grade MLC drives.
- March 18, 2015
18 Mar'15
VMware taking on public cloud heavyweights
As VMware attempts to leverage its virtualization base to sell its hybrid cloud offering, can it wrest control from AWS and Azure?
- March 17, 2015
17 Mar'15
Extreme Networks targets HP and Aruba
Following the move by HP to acquire Aruba Networks a competitive upgrade program has been launched by Extreme Networks.
- March 17, 2015
17 Mar'15
WebRTC-messaging combo could usurp UC
The WebRTC-messaging combo adopted by vendors challenging unified communications platforms is threatening to replace the latter with simpler and more flexible technology, an expert tells Enterprise Connect attendees.
- March 17, 2015
17 Mar'15
Yahoo’s attempt to kill off passwords raises security concerns
Yahoo’s attempt to kill off passwords by introducing an on-demand one-time passcode option for its email services has raised security concerns.
- March 17, 2015
17 Mar'15
Linux conference focuses on innovation, future storage
The Vault Linux storage conference in Boston concluded with a keynote including speakers from Facebook, HGST, NetApp and Red Hat.
- March 17, 2015
17 Mar'15
Drobo B1200i gains larger drives, faster rebuilds
The Drobo B1200i rackmount hybrid array gets an update, expanding storage pools to 128 TB and adding thin provisioning for up to 255 volumes.
- March 16, 2015
16 Mar'15
HP GPC 2015: Hewlett Packard courts partners with new programs
On Day 1 of the Global Partner Conference, HP made a bevy of announcements, including new programs for partners, and revealed information about upcoming changes following the company split.
- March 16, 2015
16 Mar'15
Juniper CEO Rahim calls OCP technology an 'opportunity'
Juniper Networks CEO Rami Rahim says networking hardware developed under the Open Compute Project is an 'opportunity, not a threat' to the company's switching business.
- March 16, 2015
16 Mar'15
The UCaaS market is ready for enterprises
With the UCaaS market expected to double its revenue over the next three years, service providers are ready to take on enterprise customers at Enterprise Connect 2015.
- March 16, 2015
16 Mar'15
Keep IAM simple and collaborate to succeed, says Gartner
Identity and access management is increasingly important, but it is also increasingly complex and is set to get worse, says Gartner.
- March 16, 2015
16 Mar'15
Qumulo sets out to scale data, not storage
Isilon founders launch Qumulo Core, software designed to manage scale-out NAS with real-time analytics.
- March 16, 2015
16 Mar'15
Microsoft releases EMET 5.2
Microsoft has updated its Enhanced Mitigation Experience Toolkit (EMET) to version 5.2 and added several new features, but users are reporting a bug involving IE 11.
- March 13, 2015
13 Mar'15
Does Rowhammer mean trouble for hardware?
Experts agree that the Rowhammer vulnerability likely isn't an immediate threat to enterprises, but disagree on whether hardware vulnerabilities are about to reach a tipping point.
- March 13, 2015
13 Mar'15
Google Nearline starts cold storage war with Amazon
Google Cloud Storage Nearline takes on Amazon Glacier, promising restore times in seconds rather than the hours it takes for Glacier customers.
- March 13, 2015
13 Mar'15
Verizon PCI DSS report a wake-up call, says PCI SSC
Verizon's payment card industry data security standard (PCI DSS) compliance report should be a wake-up call for business, says industry body.
- March 13, 2015
13 Mar'15
Microsoft promises an increase in Windows 10 builds
Microsoft has told beta testers to buckle their seat belts as it promises to shift from zero builds to... greater than zero builds.
- March 13, 2015
13 Mar'15
Juniper targets open enterprise clouds with SDN switches
Juniper Networks has introduced a line of SDN switches that give corporations a choice in open and proprietary technology for building public and private clouds.
- March 13, 2015
13 Mar'15
Japan recruits hackers for cyber security force
The Japanese government plans to recruit hackers to identify and protect against cyber security threats.
- March 13, 2015
13 Mar'15
IDC piles on the PC misery
Just a day after Intel warned that the corporate PC market was in trouble, IDC has downgraded forecasts for the hardware this year.
- March 13, 2015
13 Mar'15
Switch abstraction will be next wave of SDN, says Dell
Dell submits a proposal for a switch abstraction interface to the Open Compute Project to advance software-defined networking.
- March 13, 2015
13 Mar'15
Lookout bets on big data analytics to secure enterprise mobiles
Mobile security SaaS provider Lookout is betting on its cloud-based big data analytics capability to attract enterprise customers.
- March 13, 2015
13 Mar'15
Amazon bolsters IoT strategy with 2lemetry acquisition
Amazon quietly purchases M2M startup 2lemetry as it begins to draw up its battle plan for the Internet of Things.
- March 13, 2015
13 Mar'15
Enterprise Connect preview: Message app market shakeup?
UC expert Irwin Lazar previews Enterprise Connect, saying the messaging apps market is one to watch as chat collaboration becomes a big topic this year.
- March 13, 2015
13 Mar'15
New RDSH apps highlight VMware Horizon 6 release
A year after its release, VMware shores up Horizon 6 with RDSH capabilities, GPU virtualization and Linux support to chip away at Citrix's EUC supremacy.
- March 12, 2015
12 Mar'15
Google offers rapid access to cloud cold storage
Google rolls out Nearline, its cloud cold storage answer to Amazon Glacier, offering low cost, limitless capacity and access to data in seconds.
- March 12, 2015
12 Mar'15
Data centers expect payoff from hyper-converged boxes
Converged and hyper-converged infrastructure can be pricey, but IT shops that use these all-in-one boxes see long-term cost benefits.
- March 12, 2015
12 Mar'15
Q&A: Talent analytics can help in hiring and retention
Technology markets are consolidating, and most of the new HR platforms are in the cloud. Companies can access much more data about their people than ever before.
- March 12, 2015
12 Mar'15
What UC services and products will you see at Enterprise Connect?
Check out some of the anticipated UC service and product announcements coming out of Enterprise Connect 2015.
- March 11, 2015
11 Mar'15
Verizon: PCI compliance easier to get, harder to keep
The 2015 edition of the Verizon PCI report shows enterprises are, on the whole, getting better at achieving full PCI compliance. Unfortunately, few can sustain it.
- March 11, 2015
11 Mar'15
Kicking the tires on AWS C4 instances
Amazon Web Services' new line of C4 instances can offer greater CPU horsepower, but is it worth the price? IT pros evaluating the instances weigh in.
- March 11, 2015
11 Mar'15
X-IO Technologies adds ISE 800, its first all-flash array
X-IO Technologies brings out its first system designed to have all solid state drives, the ISE 800, while keeping their five-year maintenance guarantee.
- March 11, 2015
11 Mar'15
New Venafi service tackles certificate misuse
Cybersecurity firm Venafi has launched a new reputation service to combat rising abuse of security certificates and cryptographic keys.
- March 11, 2015
11 Mar'15
Apple and Microsoft patch Freak vulnerability
Apple and Microsoft have joined Google in releasing security updates for the so-called Freak security vulnerability.
- March 11, 2015
11 Mar'15
Business demand for information security set to grow in 2015
Businesses expect pressure to secure their organizations to increase this year, according to Trustwave's 2015 Security Pressures Report.
- March 11, 2015
11 Mar'15
Microsoft and Cisco cloud tie-up yields app deployment platform
Microsoft and Cisco claim new cloud platform will allow service providers to take advantage of DevOps-style app deployment speeds.
- March 11, 2015
11 Mar'15
Intel, ARM rivalry spreads to IoT SoC networking
With the Internet of Things market expected to soar, Intel and ARM are preparing to do battle with IoT SoCs aimed at infrastructure gear headed for the edge of the network.
- March 11, 2015
11 Mar'15
HP's security strategy: Acquisitions galore
Through acquisitions Hewlett-Packard has built a formidable lineup of enterprise security offerings, but experts question whether a strong brand can overcome legacy technology and a lacking endpoint strategy.
- March 11, 2015
11 Mar'15
US government CIO tells cloud buyers to get tough on suppliers
US Department of Labor CIO Dawn Leaf shares her learnings from helping 19,000 employees move off-premises at Cloud Expo 2015.
- March 10, 2015
10 Mar'15
Apple launches medical research framework
iPhone maker combines IoT, Big Data and crowdsourcing to lend a hand to the field of medical research.
- March 10, 2015
10 Mar'15
IT security still immature, says HP security exec
Enterprise IT security is still relatively immature, with many organizations failing to achieve basic security hygiene, says HP security executive.
- March 10, 2015
10 Mar'15
IBM CEO outlines cloud and big data future
The IBM CEO has used her annual letter to investors to outline just how the company is changing to place itself in a good position for the future.
- March 10, 2015
10 Mar'15
Rowhammer opens new hardware security threats
Google's Project Zero has detailed a new proof-of-concept exploiting the "rowhammer" DRAM flaw to allow for root access on various operating systems.
- March 10, 2015
10 Mar'15
Security professionals look to workload security in the cloud
The first Cloud Security Spotlight Report shows broad cloud adoption and move towards workload security.
- March 10, 2015
10 Mar'15
Is there a secret behind averted AWS reboot?
In a surprise move, Amazon Web services was able to patch a Xen hypervisor security flaw without a mass reboot of its EC2 infrastructure. So how did AWS pull it off?
- March 10, 2015
10 Mar'15
After facing criticism, Venmo aims to improve mobile app security
The mobile payment app maker responds to criticism by stepping up security with better verifications and notifications for email and phone number changes.
- March 10, 2015
10 Mar'15
Patch Tuesday: Microsoft fixes FREAK
Microsoft's March 2015 Patch Tuesday bulletins include a fix for the FREAK vulnerability, as well as five critical fixes, but surprisingly an expert says one of the fixes deemed non-critical actually demands immediate attention.
- March 10, 2015
10 Mar'15
Apple Watches give IT admin one more device to manage
When Apple Watches arrive, they will be yet another mobile device for IT to manage, and enterprises should get busy on determining its best use.
- March 09, 2015
09 Mar'15
Group claiming links to Isis hacks small business websites
The FBI is investigating the hacking of a number of SME websites in the US and Europe by people claiming affiliation with Islamic State.
- March 09, 2015
09 Mar'15
Redmond folks confirm Windows is susceptible to FREAK
Hundreds of millions of users could be at risk from the FREAK bug, says Microsoft in a security advisory.
- March 09, 2015
09 Mar'15
Threat intel valuable, but ROI proves elusive
Threat intelligence programs are taking root in many enterprises, but experts say variables like disparate service offerings, pricing models and response capabilities make ROI evaluation a vexing proposition.
- March 09, 2015
09 Mar'15
US cyber crime indictment prompts calls for zero tolerance
A newly-revealed US indictment of three suspected cyber criminals has prompted a call for zero tolerance for cyber intrusions.
- March 09, 2015
09 Mar'15
Oracle unveils new switches, server, modular system
Oracle highlighted several new systems and networking products, including the ES2-72 and ES2-64 switches, at the Mobile World Congress 2015 show in Barcelona, Spain.
- March 09, 2015
09 Mar'15
Cyber criminals turn attention to cloud service credentials
Cyber criminals are turning their attention to cloud-based services to steal credentials, warn researchers.
- March 09, 2015
09 Mar'15
X-IO debuts in all-flash array market with ISE 800 series
X-IO – known for self-healing, long-life spinning disk hard drives – makes debut in the all-flash array market with the ISE 800 series.
- March 06, 2015
06 Mar'15
Global server market grows in 2014
Both IDC and Gartner have released their figures, confirming that the global server market grew in 2014.
- March 06, 2015
06 Mar'15
IBM hopes cognitive computing provider brings more IT wins
IBM acquired cognitive computing provider AlchemyAPI in the hopes it can whip up an application elixir that gives Watson new life.
- March 06, 2015
06 Mar'15
IT job openings outweigh candidates in 2015
Many companies need to fill IT jobs this year, but there's a shortage of available talent, and many haven't figured out the mobile skills they need.
- March 06, 2015
06 Mar'15
Docker buys SocketPlane to scale container virtualization
Docker's acquisition of SocketPlane is expected to help bring greater scalability to container virtualization, making the emerging hypervisor alternative more enterprise-ready.