Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Data Protection Channel

News and Analysis

VMware's Casado: Network Virtualization The Right Way

The true benefits from network virtualization will come from simplifying the network and applying it to broader use cases, rather than bickering about the finer points of vendors' SDN products, according to VMware's Martin Casado.

More News and Analysis

More News and Analysis in Data Protection Channel »

Architectures

Cloud-Based Security Helps Aspen Fend Off Malware

Cloud security service cuts down on malware infections and provides relief for small network team in Colorado.

More Architectures

More Architectures in Data Protection Channel »

Reviews & Workshops

Mobile Biometrics: The Next Phase of Enterprise Authentication?

Smartphones and tablets equipped with fingerprint readers or other biometric hardware have the potential to drive greater adoption of biometric authentication in the enterprise—if we can get the hardware, software and business processes right.

More Reviews & Workshops

More Reviews & Workshops in Data Protection Channel »

Blogs

user-pic

Is RAID Fading Into The Sunset?

April 15, 2014 01:10 PM
Posted by Jim O'Reilly

With the arrival of faster networks and SSDs, RAID can no longer keep up. Data protection alternatives such as replication and erasure codes are gaining traction.

See all blogs by Jim O'Reilly

| Full Post

Tags: RAID, SSDs, data protection, replication, erasure codes, cloud service providers, Cleversafe

Channel: Tapes and Disks, Cloud Storage, Data Center, Data Protection, Cloud Computing,

user-pic

Easing The Backup Burden

March 04, 2014 12:19 PM
Posted by Frank J. Ohlhorst

Here's a look at how Paragon Protect & Restore 3 tackles today's backup and recovery challenges.

See all blogs by Frank J. Ohlhorst

| Full Post

Tags: backup and recovery, Paragon Protect & Restore, backup server, disaster recovery, VMware, dual-tier storage, virtual machine backups

Channel: Data Protection, Servers & Storage, Virtualization, Storage & Mgmt, Cloud Storage, , Tapes and Disks

user-pic

6 Information Security New Year's Resolutions

December 30, 2013 11:49 AM
Posted by Michele Chubirka

2013 was another rough year for information security pros. Let's resolve to make some changes to improve security in 2014, starting with increased data encryption.

See all blogs by Michele Chubirka

| Full Post

Tags: information security pros, data encryption, NSA, check-box compliance, APT, FUD

Channel: Data Protection, Content Management, Networking & Mgmt

user-pic

Avoid Cloud Storage Disasters: 6 Questions To Ask

December 17, 2013 01:48 PM
Posted by Peter Long

Organizations could put their data at risk if they don't ask the right questions when evaluating cloud providers.

See all blogs by Peter Long

| Full Post

Tags: cloud storage, cloud storage providers, BYOD, protect corporate data

Channel: Cloud Computing, Data Protection, Public Cloud, Cloud Storage, , Security, Storage & Mgmt

user-pic

Scale-Out Storage For Hyper-V

December 02, 2013 11:19 AM
Posted by Howard Marks

Gridstore takes an innovative approach to scale-out storage and is the first storage system optimized for Microsoft Hyper-V environments.

See all blogs by Howard Marks

| Full Post

Tags: scale-out storage, Microsoft Hyper-V, Gridstore, storage system, Dell

Channel: Data Center, Cloud Computing, Storage & Mgmt, Virtualization, , Data Protection

user-pic

Disk Drive Failure: An Unavoidable Reality

November 22, 2013 01:40 PM
Posted by Howard Marks

A recent study by an online backup service showed that disk drives aren't as reliable as the industry says they are.

See all blogs by Howard Marks

| Full Post

Tags: disk drive failure, disk drive reliability, Backblaze, SATA drive, USB drives, Google

Channel: Storage & Mgmt, Data Protection, Data Center

Next >>


Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013



TechWeb Careers