Channel Marker


June 20, 2011  8:30 PM

The cloud vs. converged hardware

badarrow Barbara Darrow Profile: badarrow

As Oracle, Cisco  and Hewlett-Packard try to convince the world that every data center needs Oracle or Cisco or HP’s own unique brand of converged hardware–that mythical IT beast that somehow combines the best of every breed plus absolute adherence to industry standards–there seems to be a growing realization in the real world that there just ain’t much of a market for such products.

Continued »

June 16, 2011  2:45 PM

Oracle-HP slap fight continues

badarrow Barbara Darrow Profile: badarrow

It would be sad if it weren’t so entertaining: The HP-versus-Oracle spat ratcheted up again this week with Hewlett-Packard suing Oracle.

Again. Continued »


June 14, 2011  1:29 PM

HP shakeup: Livermore kicked upstairs

badarrow Barbara Darrow Profile: badarrow

Ann Livermore, the respected Hewlett-Packard veteran once considered a prime CEO candidate, is relinquishing day-to-day responsibilities and will take a seat on the HP board. Here’s HP’s official statement . Continued »


June 13, 2011  7:08 PM

IT channel merger activity continues apace

Heather Clancy Heather Clancy Profile: Heather Clancy

Since I wrote my article last month about the spike in channel mergers and acquisitions, two more big deals have come to my attention — one aimed at expanding the service footprint of the acquiring company and the other marking a geographic extension of the acquiring company’s sales territory. Continued »


June 9, 2011  2:18 AM

Oracle hardware: It is a mystery

badarrow Barbara Darrow Profile: badarrow

It’s really not news that Oracle sales people go into a discounting frenzy at the close of the fiscal year. And, that discounting has netted Oracle some Exadata deals in its fourth quarter ending May 31. At least one buyer was a large financial services company that had previously discontinued any future Oracle-Sun hardware purchases.

Continued »


June 7, 2011  4:57 PM

Rumor alert: Dell to buy Brocade?

PatOuellette Pat Ouellette Profile: PatOuellette


There are rumors swarming that
Dell may buy Brocade Communications Systems Inc. Brocade is respected for its high-end SAN networking gear and owns 70% of the SAN switching market, and would be a good target for Dell because of its Ethernet switching. Or at least that’s what several Wall Streeters say. Continued »


June 6, 2011  9:00 AM

Why the BYO device phenom is great service opp

Heather Clancy Heather Clancy Profile: Heather Clancy

There have been many prognostications about the bring-your-own-device movement, the phrase used to describe the phenomenon of people using their own IT equipment for work purposes. Mainly, it covers mobile devices from smartphones to notebooks. No one doubts it is happening, the question is the depths to which it will penetrate. Instead of looking at this as resale revenue lost, you might want to start thinking about this as security service revenue gained. That’s because a new member survey from ISACA, a security technology association, finds that more than half of U.S.-based IT decision makers view these non-sanctioned devices as a bigger security threat than those supplied by the company.

The 2011 ISACA IT Risk/Reward Barometer also found that 27 percent of the respondents, however, felt that the benefits of these mobile systems were worth the risks. My guess is that often the people who bring mobile devices into their workplace wouldn’t be on the list for a company-requisitioned device, which means they are probably more productive than they would be otherwise. There were approximately 2,800 people surveyed as part of the data-gathering process.

Said John Pironti, a security expert who is an advisor to ISACA and president of IP Architects:

“[BYOD] lets both employees and organizations take advantage of the latest technology innovations at limited cost to the organization. Unfortunately, it also introduces new vulnerabilities, due to the limited ability of most organizations to effectively manage and secure employee-owned devices accessing their information infrastructure. Organizations should educate their employees on their BYOD security requirements and implement a comprehensive mobile device policy that aligns with their organization’s risk profile.”

Smells like a managed service to me, everything from assessment to mobile device management. This is especially timely given another finding in the survey: That organizations believe that IT security and risk management should be embraced more closely in overall enterprise risk management strategy.

Check out more IT channel news on SearchITChannel.com and follow us on Twitter! Here’s how to follow Heather Clancy directly.


June 5, 2011  11:55 PM

Business users buy Macs–with their own dough

badarrow Barbara Darrow Profile: badarrow

It’s not news that almost anything Apple is hot  (iTunes hate notwithstanding). What is news is who’s buying this Apple gear and for what purpose.

Continued »


May 31, 2011  7:17 PM

VCE boosts distribution

badarrow Barbara Darrow Profile: badarrow

Our good buddies at The Virtual Computing Environment Co., last week added four distributors – Arrow, Avnet, Ingram Micro and Magirus–to its channel roster. that means a VCE VAR selling Vblocks can source all the component pieces–from Cisco, from EMC, from VMware–from one source whereas in the past that order might have involved any number of those vendors or distribution partners. Continued »


May 31, 2011  6:03 PM

Research: Digital signage market could triple by 2016

Heather Clancy Heather Clancy Profile: Heather Clancy

When I first started covering the market for digital signage solutions — all those electronic displays that can deliver messages in places from retail floors to board rooms along with the software content and connectivity to deliver those messages– it was difficult to get many people to look behind the obvious margin they would get from installing the hardware. Continued »


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: