With IT budgets relatively static and data on the rise, storage virtualization isn’t just an option, according to one expert: It’s a necessity.
Network Computing
The Importance of Storage Virtualization
Comments Off
Categories: General.
Juniper Delivers With Simply Connected Portfolio
While so many products fall short of their promises, Juniper follows through with Simply Connected. Learn how the portfolio can help simplify access.
Network Computing
Comments Off
Categories: General.
RIM Focuses on Future with BlackBerry 10
RIM president and CEO Thorsten Heins seemed upbeat and optimistic giving his first ever BlackBerry World keynote this morning. While some–myself included–have questioned whether or not RIM has a future at all, RIM demonstrated throughout the keynote that it believes the future is bright, and it’s called BlackBerry 10.
Heins began the BlackBerry World keynote by highlighting smartphone usage statistics. According to the data shared by RIM, the 77 million BlackBerry users around the globe are more engaged with social networking, and interact more from their BlackBerry devices than the averages for smartphones in general.
Comments Off
Categories: General.
The Cloud, Day 26: Too Much Cloud Can Be a Bad Thing

30 Days with the Cloud: Day 26
On Day 25 of the 30 Days with the Cloud series, I spelled out why I believe that cloud-based data storage and syncing is becoming mandatory thanks to mobile devices and SSD drives. Today I’m going to put a caveat on there, though.
Am I backing off from the idea that mobile devices and smaller SSD drives make cloud-based storage mandatory? No. However, using too many cloud services at once cancels out the convenience and simplicity I’m using the cloud storage for in the first place.
Comments Off
Categories: General.
IBM Extends PureSystems, Mobile Focus
IBM kicked off this week’s SOA and WebSphere-related conference with a number of PureSystems announcements, as well as a major escalation in its mobility capabilities. In addition to making it easier to create the “patterns of expertise”software capability for its PureSystems family of expert integrated systems, the company also unveiled Mobile Foundation, software and services targeted at enterprise mobile environments.
Network Computing
Comments Off
Categories: General.
Fabric Wars: Too Soon To Pick A Winner
While the networking giants – Cisco Systems, Brocade and Juniper Networks – battle it out for domination of the emerging fabric networking segment, a host of new competitors are nipping at their heels. Both other networking companies, like Avaya, Enterasys and Alcatel-Lucent, as well as computer companies edging into the networking space, like HP and Dell, are among those joining the fray.
Network Computing
Comments Off
Categories: General.
Feds Greatest Security Fear? Hacktivists!
Potential cyberthreats from foreign governments play second fiddle to concerns over hacktivists and the insider threat, report finds. BYOD and mobility second only to social media, are the biggest vulnerabilities.
Network Computing
Comments Off
Categories: General.
Defining Cloud SLAs Is Critical
Industry experts say that as many IT functions are increasingly being moved to the cloud, it’s important to carefully define your goals in service level agreement so that corners are not cut in an effort to increase the provider’s bottom line. SLAs written with cloud providers must remain“specific, measurable, achievable, relevant and timely, and should leave no ambiguity as to what both service providers and service consumers expect.
Network Computing
Comments Off
Categories: General.
New App Grades Facebook Apps on Privacy
When someone plays Zynga’s Words with Friends on Facebook they obviously expect to share that experience with whichever Facebook contact they play against. However, by authorizing Words with Friends–or other Facebook apps–users might be sharing much more than they’re aware of.
Facebook is a social network. By definition, the point of being on Facebook at all is to share with others. However, people like to choose which information to share, and who to share it with–they’re funny that way. Apps that collect or share information without the explicit consent of the user are shady, and infringe on the privacy users expect.
Comments Off
Categories: General.
Kemp Balances Great Functionality, Affordability
Kemp Technologies is unveiling the successor to its flagship LoadMaster 5500, the newest addition to its family of load balancers and application delivery controllers. The LoadMaster 5300 appliance delivers faster processing, more throughput and double the concurrent connections while continuing the company’s focus on balancing performance and price for small and midsize enterprises.
Network Computing
Comments Off
Categories: General.
