FrontRange Solutions, which delivers IT Service Management products to business and enterprise customers, has now adapted its flagship product for Software-as-a-Service (SaaS) environments. The product, which includes comprehensive service management, service catalog and asset management capabilities, will be the first FrontRange product released under its new SaaSIT brand.
Network Computing
FrontRange Adapts ITSM Tool For SaaS Environments
Comments Off
Categories: General.
F5 Networks Offers Remote Access For Apple Wireless Devices
F5 Networks, an application delivery networking provider, has introduced versions of its Big-IP Edge Client and Big-IP Edge Portal applications that can run on wireless devices from Apple, including the iPhone, iPad and iPod Touch. The applications, which operate on a virtual private network, enable workers to access files and other content on the corporate network remotely, but conform to the security and compliance requirements set for devices that operate behind the firewall.
Network Computing
Comments Off
Categories: General.
Talari Takes Big Bite Out Of WAN Costs
The latest addition Talari Networks’ Adaptive Private Networking (APN) family, the Mercury T750 appliance, is targeted at midsize enterprises with up to 24 remote sites. Intended for deployment in the data center, and starting at $ 21,995, the 1U rack-mountable T750 can be used with the company’s branch office (T730), SOHO (T200) and data center (T3000) products. The new appliance supports WAN bandwidth aggregation up to 120Mbps downstream and 60Mbps upstream, while doing 128-bit AES encryption. Running the same APN software as the T3000, the T750 comes with nine user-configurable Gigabit Ethernet ports, two bypass port pairs, a management interface, solid-state disk and high-availability configuration with two units.
Network Computing
Comments Off
Categories: General.
Huawei Comes Out Of Stealth Mode
Known as ‘the biggest company you’ve never heard of’, Huawei is taking the wraps off of its 2-year-old presence in North America, with the unveiling of its cloud computing strategy and the opening of an R&D facility. The China-based telecommunications equipment vendor has been averaging annual growth in the 30 percent range, says John Roese, who was recently appointed head of R&D in North America for Huawei.
Network Computing
Comments Off
Categories: General.
EMC Hosts A ‘Record-Breaking’ Event
EMC has spent the first couple of weeks of 2011 building what it hoped was excitement for the “Record Breaking Event” here in New York on Tuesday. After receiving a cardboard broken record via FedEx, and innumerable e-mails, I braved the freezing rain to attend the dog and pony show. Some of the announcements indicate that EMC gets that it has to stop promoting the storage priesthood and make its systems more accessible.
Network Computing
Comments Off
Categories: General.
Announcing Network Computing Pro: For IT, By IT
I am very happy to announce the launch of Network Computing Pro. NWC Pro is a subscription service with access to more than 450 technical analyst reports covering topics in application optimization, cloud computing, data center, storage, virtualization, wireless and more. Written by our cadre of Network Computing real-world experts and InformationWeek Analytics analysts, Network Computing Pro is the ultimate resource for IT, by IT.
Network Computing
Comments Off
Categories: General.
Cisco, Panda Identify Cybercrime Trends
The cybercrime landscape is continuing to evolve–with the emergence of advanced persistent threats as the most potentially damaging and, given the volume, the most threatening, says Mary Landesman, market intelligence manager at Cisco. Together with data theft and trojans, advanced persistent threats (APTs) are the main dangers, according to the company’s annual security report for 2010. Although primarily gathered from large enterprises, the data offers guidance for organizations of all sizes, says Landesman.
Network Computing
Comments Off
Categories: General.
CA Technologies Steps Up Its Focus on Security
CA Technologies has long had a strong presence in security; its CA ACF2 and CA Top Secret solutions for the mainframe world (z/OS) immediately come to mind. However, the company is making a notably strong push in security with a vision of Content Aware Identity and Access Management (IAM), as well as a focus on securing virtualized environments. Of course, CA Technologies is not unique among its competitors in evolving the security market, but what CA Technologies is really doing is illustrative of the necessary evolution of both the IT management and security markets.
Network Computing
Comments Off
Categories: General.
Is NFS A Viable Protocol For Converged Networking?
Last week’s piece on Ethernet’s “Goldilocks” problem generated some thought provoking responses, but one really caught my attention: if we are to suggest that iSCSI is a viable alternative storage protocol for converged networking, where does that leave NFS? After all, storage vendors are increasingly pushing NFS as an alternative to iSCSI for the storage of virtual machine environments. If it’s good enough for VMware ESX, doesn’t it deserve a place at the adult table when discussing converged networking?
Network Computing
Comments Off
Categories: General.
HP And Microsoft Jointly Develop BI And Data Warehouse Appliances
HP has introduced a line of appliances specially designed and configured to run Microsoft business software, including Exchange, SharePoint, SQL Server and other programs, in order to deliver business intelligence and data warehousing technology to business and enterprise customers. The appliances are designed to be easy to deploy and to avoid the complexity that frustrates IT staffs trying to match hardware and software on their own.
Network Computing
Comments Off
Categories: General.
