Expert Analysis
Content posted in June 2012
Page 1 / 3   >   >>
Big Data's Impact On Storage
News  |  6/29/2012  | 
Storage vendors are innovating to help data center managers cope with big data and the information explosion.
Report: BYOD, Virtualization, Mobile Will Make 45% of Networks Obsolete by 2016
News  |  6/29/2012  | 
As more technologies devour more enterprise network resources, fewer will be able to keep up with the demands by 2016, according to Dimension Data's Network Barometer 2012 report.
How To Improve Network Security
News  |  6/29/2012  | 
BYOD policies, mobile devices, IT compliance, Wi-Fi access, and other demands are all affecting network security. Experts offer five network design tips to help increase IT functionality and improve security.
How To Maximize Your SSD Investment
Commentary  |  6/29/2012  | 
Some servers benefit from solid state drives more than others. An SSD deployment strategy will help you get the biggest bang for your buck.
Google Compute Engine Is No Threat to Amazon, Microsoft, RackSpace
News  |  6/29/2012  | 
With limited configurations, virtual machine and operating system support, the beta version of Compute Engine isn't likely to steal users from Amazon and other IaaS leaders.
Red Hat Ships Storage Server 2.0, Announces Vendor Partners
News  |  6/28/2012  | 
The new version of what was formerly known as the Gluster cluster file system has been announced, along with a partner ecosystem that includes Cisco, Groupware, Intel, Mainline and Synnex.
LinkedIn Breach: Leading CISOs Share 9 Protection Tips
News  |  6/28/2012  | 
In the wake of LinkedIn's high-profile data breach, could your company suffer a similar fate? Leading chief information security officers share their techniques for building a better security program.
The Biggest Threat to Your Private-Cloud Deployment: Your IT Staff
Commentary  |  6/28/2012  | 
Your IT staff is likely full of technologists, which won't help you find success with a private-cloud deployment. Here's why shifting to an IT service catalog approach may ease your transition to the cloud.
Network Performance Monitoring Pressure Ratchets Up
News  |  6/28/2012  | 
As more enterprises turn to cloud computing, IT administrators are finding there's no single administrative viewpoint that can look across the entire network.
IT Rates IBM's Q1 Labs Top SIEM Performer
News  |  6/27/2012  | 
Our IT Pro Ranking Survey evaluates eight SIEM vendors.
Eucalyptus, NetSocket Roll Out Cloud Management Tools
News  |  6/27/2012  | 
New features in Eucalyptus 3.1, available today, enable faster deployment of on-premises clouds and more; NetSocket's Cloud Experience Manager provides visibility into network issues. Learn more about both products.
Server SSD Isn't Necessarily PCIe
Commentary  |  6/27/2012  | 
SSDs aren't for just laptops and desktops--there is room for server SSDs. Learn why, and why people are gun-shy about server-side SSD use.
FBI Busts Massive International Carding Ring
News  |  6/27/2012  | 
Two-year, 13-country investigation results in 28 people charged with online trafficking of stolen credit card, bank account, or other personal information.
More Changes in the SSD Market
Commentary  |  6/27/2012  | 
Acquisitions and integrations are making for an interesting time in the SSD market. Get some thoughts on PMC-Sierra, DensBits and other SSD controller makers in the news.
Pano System for Cloud Brings VDI to the Browser, via Google's Chrome
News  |  6/27/2012  | 
Pano System eliminates the need for a local operating system and delivers virtual desktop infrastructure through Chrome browser sessions.
Public Cloud Is Neither More Nor Less Secure Than Private Cloud
Commentary  |  6/26/2012  | 
Claims that public cloud is more secure than private cloud are pure FUD and ignore the responsibilities that each party plays in information security. What matters is how well your applications and VM are protected. Learn why.
Nomadix Tackles Runaway Anytime, Anywhere Access Demand
News  |  6/26/2012  | 
The AG 5800 supports 250 to 4,000 simultaneous devices; the Nomadix Internet Traffic Optimizer identifies and prioritizes traffic through deep-packet inspection. Discover more about both products.
Five Ways to Engineer Better Network Security
News  |  6/26/2012  | 
BYOD policies, mobile devices, IT compliance, Wi-Fi access and other demands are all affecting network security. Experts offer five network design tips to help increase IT functionality and improve security.
LulzSec Members Confess To DDoS Attacks
News  |  6/26/2012  | 
Ryan Cleary and Jake Davis admit to participating in hacktivist group's 2011 online attack spree which hit the CIA, Sony, HBGary Federal, and numerous other organizations.
Aerohive Teams With JAMF Software, Cozies Up on Apple iDevice MDM
Commentary  |  6/26/2012  | 
Aerohive's HiveOS is now integrated with JAMF's Casper Suite to ensure that Apple iDevices are properly configured. But what's behind the company's entrenched interest in Apple integrations?
IBM Keeps a Sharp Edge with Smarter Storage
Commentary  |  6/25/2012  | 
IBM rolls out its Smarter Storage concept, which joins Smarter Computing, SmartCloud and Smarter Analytics. Discover its three key principles and more about Smarter Storage.
Open Compute Racks: Are We Going to Use Them in Our Data Centers?
Commentary  |  6/25/2012  | 
The Open Compute Project from Facebook may serve as a framework that could lead to cheaper, more efficient data center resources. But will we use Open Compute racks?
Survey: Gen Y Workers Want Mobile Devices; Prep Your BYOD Policies
News  |  6/25/2012  | 
A new survey finds that one in three Gen Y workers will work around BYOD policies in order to use mobile devices while on the job. Learn why, and how enterprises should tackle the bring-your-own-device dilemma.
F5 Brings Context, Scalability Added Security to Big-IP v11.2
News  |  6/25/2012  | 
IP Intelligence Service can pool threat detection capabilities and block malicious IP addresses, while DNS Services can cut in-network response latency by up to 80% and scale systems up to 10 times as required. Discover more about the enhancements to Big-IP v11.2.
Mitel Boosts Unified Communications and Collaboration Offerings
News  |  6/22/2012  | 
UC360 Collaboration Point allows up to four participants to meet on an audio or video bridge without needing a computer, and share presentations via the cloud or a USB stick.
Data Center, Fibre Channel, Ethernet Spending on the Rise--Kind of
News  |  6/22/2012  | 
First-quarter sales of data center equipment grew year over year, but were down from Q4 2011. Fibre Channel and Ethernet products saw highs, but that won't last, according to Infonetics Research. Learn why, and how virtualization and convergence factor into the picture.
Standardized Cloud APIs Aren't Possible
Commentary  |  6/21/2012  | 
Standards lead to lock-in. Learn why that works for some technologies, but why it wouldn't for cloud APIs, according to our blogger.
I Have Seen the Future of Solid-State Storage, and It's Scale-Out
Commentary  |  6/21/2012  | 
As solid-state storage becomes the dominant storage media, vendors are finding their processors are running short on compute power. Scale-out architectures are the answer. Learn why.
HP's Project Moonshot to Feature Intel Centerton in Gemini Servers
News  |  6/21/2012  | 
Project Moonshot introduces Gemini servers with the Intel Centerton processor, but it will be a while before enterprises see benefits.
WebEx Meetings Move Beyond SMB Offices
News  |  6/21/2012  | 
With an eye on small and midsize business users, Cisco adds mobile tools, a persistent free account, and collaboration features to its online meetings suite.
Cisco WebEx Gets Social Collaboration-Fueled Upgrade
News  |  6/21/2012  | 
The Quad social platform and Callway video bridging service are now part of Cisco WebEx. Learn what other features have been added to the Web conferencing offering.
Bromium Unveils MicroVMs for Endpoint Security
News  |  6/20/2012  | 
Learn more about the technology, which utilizes Intel's hardware-assisted virtualization technology to isolate tasks into microVMs.
WAN Optimization Meets Application Acceleration in Riverbed Upgrades
News  |  6/20/2012  | 
Riverbed integrates new Web content optimization and traffic management technology into its Stingray WAN optimization solutions.
Caringo Rolls Out Cloud Storage Products
News  |  6/20/2012  | 
Storage vendor Caringo debuts data protection, multi-tenant, billing and metering, and indexing and search products.
Twitter Takes Center Stage At Enterprise 2.0
Commentary  |  6/20/2012  | 
Once derided as too short and silly for business, Twitter has emerged as a metaphor for how business has changed to adapt to the social environment.
HP Announces New Services to Help SMBs Corral Data From Mobile Devices
News  |  6/20/2012  | 
HP Converged Infrastructure arms IT generalists with tools to manage and secure mobile devices. Learn more about the new networking offerings, which includes the HP 1910 8G Switch Series, HP Client Virtualization and more.
ShoreTel Jumps Into Cloud UC for Mobile Devices
Commentary  |  6/19/2012  | 
ShoreTel Mobility is a new app for iDevices that can turn smartphones into full-featured office phones. Our blogger dives into the cloud UC option.
5 Social Networks To Achieve 10 Business Tasks
Slideshows  |  6/19/2012  | 
We examine several popular social networks to determine which is best for each of 10 business tasks, from engaging customers to hiring new employees.
Upgrades from Zyrion, Arkeia Address Hybrid Cloud Monitoring, Backup
News  |  6/19/2012  | 
Zyrion adds Citrix CloudStack support to its network monitoring software, while Arkeia updates its Network Backup Suite. Learn more about the tools.
Virtualization Environments Still Pose a Challenge in the Data Center
News  |  6/19/2012  | 
Organizations may have embraced and launched virtualization environments, but they're still working out some issues: Just 3% have iron-clad standardized platform policies. Learn what else the 2012 State of the Data Center survey uncovered.
Visibility and Control Still an Issue With BYOD Policies
News  |  6/19/2012  | 
Sourcefire rolls out two mobile products to address potential security issues introduced by BYOD policies. Learn more about FireSight and FireAmp Mobile.
Facebook Buys Face.com: At What Privacy Cost?
News  |  6/19/2012  | 
Face.com's facial recognition technology will give Facebook users quicker and easier photo tagging abilities, but privacy concerns come along for the ride.
Page 1 / 3   >   >>


Cartoon
Slideshows
Audio Interviews
Archived Audio Interviews
Jeremy Schulman, founder of Schprockits, a network automation startup operating in stealth mode, joins us to explore whether networking professionals all need to learn programming in order to remain employed.
White Papers
Register for Network Computing Newsletters
Current Issue
2014 State of Unified Communications
2014 State of Unified Communications
If you thought consumerization killed UC, think again: 70% of our 488 respondents have or plan to put systems in place. Of those, 34% will roll UC out to 76% or more of their user base. And there’s some good news for UCaaS providers.
Video
Twitter Feed