Your IP is:

216.73.216.0

[More Detail]


Instant Port Checker

IP:[get my ip] Port1:[EL2/PR2/PM3]   [XON NVR] Port2: Port3:

Skip to content

Mobile Biometrics: The Next Phase of Enterprise Authentication?

Smartphones and tablets equipped with fingerprint readers or other biometric hardware have the potential to drive greater adoption of biometric authentication in the enterprise—if we can get the hardware, software and business processes right.
Network Computing

Categories: General.

Tags: , , , , ,

Network Overlays: An Introduction

Network overlays dramatically increase the number of virtual subnets that can be created on a physical network, which in turn supports multitenancy, virtualization features such as VM mobility, and can speed configuration of new or existing services. We’ll look at how network overlays work and examine pros and cons.
Network Computing

Categories: General.

Tags: , ,

Red Hat Speeds Up Open Source Virtualization Race

Red Hat last week enhanced its open source alternative to Microsoft and VMware, Enterprise Virtualization 3.1, with the ability to mount larger virtual machines and achieve live migration across more storage systems than before.

It also cited the continued high performance of its kernel virtual machine, or open source KVM, in its Dec. 5th announcement.


Enterprise Virtualization 3.1 allows the creation of a virtual machine with up to 160 virtual CPUs and 2 TB of memory, said Red Hat’s Chuck Dubuque, senior manager of product marketing. That’s larger than the maximum 64 virtual CPUs and 1 TB of memory supported by Microsoft System Center’s Virtual Machine Manager or VMware’s vSphere 5.1.
Network Computing

Categories: General.

Tags: , , , ,

Savvis Cloud Storage Takes On Amazon, Google

Savvis is moving more convincingly into standard cloud services. The managed hosting provider launched Savvis Direct as a beta compute service Monday, following on its Dec. 3 launch of Symphony Cloud Storage, its long-term storage equivalent to Amazon’s S3.

Categories: General.

Tags: , , , , ,

Does Microsoft Really Need To Make Its Own Hardware?

Steve Ballmer says Microsoft is seriously considering making more of its own hardware. It seems that even with the old guard of IBM, Dell, Toshiba, Sony and HP, and the new guard of Samsung, Lenovo, LG and Asus, and all those white-box manufacturers, Microsoft just can’t find a reliable design partner.


Have we come full circle to where we started 50 years ago, when hardware and software were inextricably intertwined and necessarily provided by the same company?


Looking at the actions of some of the world’s largest software houses, you could easily come to that conclusion. Microsoft now makes Surface, and it has made the Xbox for years. Google bought Motorola’s phone division, probably for its patent portfolio but also to make the Droids it thinks people want. Google also makes the Chromebook. Even Oracle had to have its own hardware division, though the performance of Sun doesn’t bear out the wisdom of that move. Its real play is purpose-built machines such as Exadata and Exalogic.
Network Computing

Categories: General.

Tags: , , ,

Hot Flash: Researchers Use Heat to Counter NAND Flash Wear-n-Tear

Engineers have announced a new technique using heat to extend flash write/erase cycles from 10,000 to 100 million or more. But while tech breakthroughs are great, prudent management may be a better solution to flash’s lack of endurance.
Network Computing

Categories: General.

Tags: , , , , ,

5 Steps For Good Database Hygiene

Some of the most important ways to reduce risk boil down to the fundamentals of security. Keep systems well-patched, prevent data from spreading around, make sure systems are properly segmented, and watch where you store valuable log-in data. Much like flossing, these good habits require day-to-day maintenance that will reap long-term benefits.

Here are what the experts say about the kinds of actions necessary to keep up on good database hygiene.

Categories: General.

Tags: , , ,

Must ‘Cloud’ Translate To ‘Ungovernable’?

When IT services come from a mix of inside and outside assets, we need more control, not less. Enter ITSM.
Network Computing

Categories: General.

Tags: , , ,

A UC Deployment’s Most Important Ingredient: the VAR

Picking the right UC technology is important, but unless you have unlimited IT resources you’ll be relying on outside services for deployment, training and more. The right VAR can make a UC rollout shine.
Network Computing

Categories: General.

Tags: , , ,

Object Storage’s Path to the Enterprise

Object storage is a smart fit for enterprise use cases such as backup, but the need to write to custom APIs impedes adoption.
Network Computing

Categories: General.

Tags: , , ,