IT

Maximize Your Software-Defined Data Center Infrastructure Efficiency With RDMA-Enabled Interconnects

Maximize Your Software-Defined Data Center Infrastructure Efficiency With RDMA-Enabled Interconnects
December 2, 2015 2 Comments »

Introduction At the end of the twentieth century, there was consensus that the previous couple decades were the dawning of the world’s information-technology (IT) age. Within the first few years of the twenty-first century, however, it has become clear that ... Read More »

How to Increase IT Self-Service Adoption

How to Increase IT Self-Service Adoption
December 1, 2015 No Comments »

Self-service is everywhere. More and more consumers are using do-it-yourself stations to book movie or flight tickets, withdraw cash from ATMs, or simply make other banking transactions. Embracing this trend, many IT organizations have a self-service portal to the help ... Read More »

Drinking From the Firehose: Strategies for Overcoming Network & Application Performance Challenges

Drinking From the Firehose: Strategies for Overcoming Network & Application Performance Challenges
November 30, 2015 No Comments »

Today’s applications have a fundamentally different delivery and build than their predecessors. The introduction of high-speed connections, virtual server architecture, and virtual and collapsed network techniques are contributing to dramatically greater in-flight network deployments. With a wide array of disparate ... Read More »

Supply, Demand and Internet Taxation

Supply, Demand and Internet Taxation
November 25, 2015 1 Comment »

The Internet often operates (in many users’ minds, anyway) as though supply is unlimited. Unlike other utilities such as electricity and water, the typical user pays a monthly fee for as much Internet as he or she can consume. But ... Read More »

Getting the Network Up to Speed: The State of Network Appliances Today

Getting the Network Up to Speed: The State of Network Appliances Today
November 24, 2015 No Comments »

Big data has left the realm of catchphrase and entered the realm of stark reality for communications-service providers (CSPs) and network-equipment providers (NEPs), which must devise strategies to manage it. Not only is this data—generated by the billions of smartphones, ... Read More »

Managing Insider Threats With Active Directory Security

Managing Insider Threats With Active Directory Security
November 23, 2015 3 Comments »

“You mean this was an inside job?” It may seem like a scenario straight out of the movies, but insider threats to business data are real, frightening and costly. Whether caused by negligence or malicious intent, employees, service providers and ... Read More »

What the Paris Attacks Mean for Encryption

What the Paris Attacks Mean for Encryption
November 19, 2015 No Comments »

Erosion is the slow but inevitable process by which the constant forces of nature wear away a structure of some sort—be it a mountain, a building or an institution. The recent attacks in Paris are just the latest in a ... Read More »

Containers Enable DevOps and Hybrid Clouds, but Sandboxes Are Also Critical for IT Success

Containers Enable DevOps and Hybrid Clouds, but Sandboxes Are Also Critical for IT Success
November 17, 2015 No Comments »

Gartner predicts that by 2016, nearly 25% of the Global 2000 IT organizations will be mainstreaming DevOps methodologies for bringing applications into production IT. A recent 451 Research survey of enterprises found that 56% of application workloads will be in ... Read More »

4 Ways to Guarantee Success With Business Continuity

4 Ways to Guarantee Success With Business Continuity
November 16, 2015 1 Comment »

The horror stories related to enterprise data loss are well known at this point. Companies create and store more data than ever, and the volume isn’t going to slow. The threats you face are just as prevalent. Data disasters are ... Read More »

It’s Not You, It’s Me: Sharing the Responsibility for Cloud Security

It’s Not You, It’s Me: Sharing the Responsibility for Cloud Security
November 11, 2015 2 Comments »

Understanding Shared Security Responsibility Despite the rapid growth of cloud services, security is still the number-one concern for business owners moving their workloads to the cloud. Much has been documented about the financial, technical and efficiency advantages of moving business-critical ... Read More »

Pin It on Pinterest