In a tough economic climate, IT organizations will look to virtualization to reduce TCO, slash their energy costs, and keep up with competitors
The next front in the struggle to make IT “greener” will unfold at your fingertips -- on the ubiquitous end-user desktop
According to Gartner, cloud computing still has some maturing to do
Virtualization can create single points of failure. We show you how to protect yourself.
Security vendors are stepping up their efforts to close the gap between security and operations
With mergers and acquisitions and the growing need to cut data center costs, data center consolidation is on the minds of many enterprises. We look at the steps IT can take to make for a successful consolidation project.
What technologies and best practices can make a data center greener?
When used together, server virtualization with N-Port ID Virtualization (NPIV), blade servers, and Fibre Channel SANs provide a mature, robust infrastructure for data centers.
Both NetMaster and SysView boast GUI and usability improvements. Along with a lower-cost software licensing option and you have pair of old tools reborn.
Microsoft's decision to exit the consumer security space reflects a fundamental shift in the market.
All of the Energy Stars in the world will not keep the lights from going out.
All things considered, 2008 was a quiet but industrious year on the security front.
It was a pretty good year, for IT spending at least.
Even before green got hot, it was apparent to many IT mavens that storage was actually consuming the most power and generating the most heat in their shops.
Adopters cite OSS' low-cost licensing, flexibility, and -- crucially -- freedom from a Microsoft lock-in as its most attractive features.
Full-disk encryption specifications developed by the Trusted Computing Group (TCG), including key management and self-encrypting drives, can keep data safe.
Mainframe pros have joined with IBM to tout the virtues of Big Iron-based cloud computing.
Encryption directly on the storage device provides the simplest and most effective means to obtain a trusted storage system.
Organizations should either implement a more secure version of WPA or switch to WPA2, the impregnable successor to WPA
We explore the challenges of capacity planning and how IT can best balance performance and risk in virtualized environments.