Search Results | Network hardware
PREV 1...20   30   40...64   65   66   67   68   69   70   71   72   73...   80   90   100...111 NEXT
Sort by:  Most Relevant  |  Date
Virtualization: Why Microsoft cares

Blog  Have you ever wondered why Microsoft cares so much about server virtualization? After all, its only a software representation of a physical machine. Microsoft has been very content over the last nearly 30 years letting the likes of Dell, Hewlett-Packard and IBM build physical servers with nary a ...

Last updated: May 26, 2009   1:42 PM GMT  |  Blog: The Virtualization Room
Cigital's Gary McGraw talks cloud security with Chris Hoff

Blog  Security needs to pay more attention to the protocols which bind the applications and infrastructure together. That's where the cracks are appearing. What is cloud computing? In an interview with Cigital's software security expert Gary McGraw, Network security expert Christopher Hoff tries to answ...

Last updated: Oct 24, 2009   2:41 PM GMT  |  Blog: Security Bytes
The top 10 percent list, Part 3

Blog  In the third installment of my top 10 percent review of products that I was briefed on this year, Ill discuss a couple of products from two well-known vendors. Quantum has been in the tape and dedupe space for a long time; it has also been a leader in the SAN file system and archive space with St...

Last updated: Nov 7, 2011   5:35 PM GMT  |  Blog: Storage Channel Pipeline
Bare-metal instances augment AWS' IaaS options

Blog  Infrastructure was AWS' focus in May, as the cloud provider made good on several of its promises with features that provide more diverse compute options -- including some that directly challenge two of its biggest foes. Customers in five regions can now use EC2 bare-metal instances, which enable ac...

Last updated: May 31, 2018   5:09 PM GMT  |  Blog: AWS Cloud Cover
Tanium updates core endpoint visibility platform

Blog  Unified endpoint management and security platform company Tanium has come forward with a set of platform and portfolio enhancements that it says are focused on reinforcing fundamental needs in speed, simplicity and scale. Where operational software silos grow, the ability to get visibility into eve...

Last updated: Nov 20, 2019   2:22 PM GMT  |  Blog: CW Developer Network
The NSAs Data Center Adventure

Blog  by Mark Harris, Vice President of Marketing and Data Center Strategy for Nlyte Software Over the past year, the NSA has come under intense public scrutiny on its intelligence gathering and data mining practices, and if that wasnt bad enough, in a recent set of articles published in the Wall Stre...

Last updated: Dec 3, 2013   4:59 PM GMT  |  Blog: Vendor Tech Talk   |      Data Center, DCIM
Holding Up the Third Leg of the Tripod: Physical Security

Blog  Information security experts like to talk abouta metaphorical three-legged security model called the security tripod, or more simply, the tripod. In this model, one leg comes from perimeter security, which addresses the barrier and safeguards used to protect the boundary between internal and exter...

Last updated: May 24, 2010   10:49 PM GMT  |  Blog: Windows Enterprise Desktop
Why HP wants the whole cloud stack

Blog  HP's clumsy cloud leak this week sheds a little bit more light on the printer giant's cloud computing plans, but the details signal a much bigger trend. The major IT players feel they must own the whole cloud stack. Why? According to The Reg story HP's Scott McCllelan posted the following informa...

Last updated: May 4, 2011   8:26 PM GMT  |  Blog: The Troposphere
Software as a Service: The Hype Must End

Blog  Software as a Service (SaaS) can't possibly live up to the hype that's being lavished upon it these days. Despite all the talk about creating a channel--or to borrow a more in-vogue term, an "ecosystem"--around Saas as a platform, and some significant early successes, it's time to snap out of the re...

Last updated: Mar 7, 2007   3:36 PM GMT  |  Blog: Channel Marker
SMBs and the great cloud video opportunity

Blog  When most people discuss the benefits of cloud for video surveillance, they tend to do so from the lens of enterprise end users. Enterprise investments in camera technology can run into tens of millions of dollars depending on the size of the organization and converting this massive upfront cost int...

Last updated: Nov 27, 2019   5:04 PM GMT  |  Blog: IoT Agenda   |      AI and IoT, cloud benefits, Data strategy
The Value of the VCP (VMware Certified Professional)

Blog  The VMware Certified Professional exam isn't the easiest exam in the world, nor the hardest (many diverge on whether Red Hat, Citrix, or Cisco win that title for their premier certification levels), but it's rapidly becoming one of the most sought-after enterprise certifications available. Since I'm...

Last updated: Oct 12, 2007   4:33 PM GMT  |  Blog: The Virtualization Room
Global Crossing on Latin America: 'The future is going to be bright'

Blog  It would be unfair to make blanket characterizations about a region as vast and diverse as Latin America. But we know this much is true: Throughout less developed parts of Central and South America, service providers are seeing an opportunity for mobile services in areas where wireline telecom infra...

Last updated: Oct 14, 2010   8:55 PM GMT  |  Blog: Telecom Timeout
GDPR: Why print is a crucial element of endpoint security

Blog  The EU General Data Protection Regulation (GDPR), which takes effect on 25th May 2018, could prove to be a catalyst tochange theexistinghaphazard approachto print security. Networked printers and multifunction printers (MFPs) are often overlooked when it comes to wider information security ...

Last updated: May 9, 2017   8:58 AM GMT  |  Blog: Quocirca Insights   |      GDPR, MPS, Security
'Secure by default' should be the motto for all IoT device manufacturers

Blog  By 2020, over 25 billion devices, by conservative estimates, will be connected to the internet, and each one of those connections must be secure to mitigate risks and protect organizations and individuals from malicious attacks. To give you an idea of challenge this presents, consider that 10 years...

Last updated: Nov 8, 2017   6:20 PM GMT  |  Blog: IoT Agenda   |      Authentication, Consumer IoT, Enterprise IoT
Software is devouring the edge -- are you ready?

Blog  Software is bringing complex business logic and artificial intelligence to the edge, enabling enhanced applications and raising user expectations. But what changes should IoT executives make to their hardware-oriented business to ensure they're not left behind? In my previous article, I discussed h...

Last updated: Jul 26, 2019   5:50 PM GMT  |  Blog: IoT Agenda   |      Edge computing, Internet of Things, iot
How IoT and AI are fueling the autonomous enterprise of the future

Blog  IoT technology has reached critical mass. Today, there are more than 10 billion IoT devices in use around the world. Approximately 127 new devices are connected every second, according to PYMNTS' monthly Intelligence of Things Tracker report. That's more than 2,000 new connections since you started ...

Last updated: Aug 22, 2019   2:32 PM GMT  |  Blog: IoT Agenda   |      AI and IoT, Automation, Internet of Things
Maarten Ectors explains what open source wireless means for developers

Blog  Open source software has completely transformed the opportunities for software development. Now, Canonical is launching a new effort to bring these principles to programmable software defined radios and industrial equipment. Developers will be able to experiment with different wireless protocols for...

Last updated: Jun 26, 2017   10:04 PM GMT  |  Blog: Coffee Talk: Java, News, Stories and Opinions   |      Open source
The worlds of IT and OT collide within IIoT

Blog  To begin, let's take a look at the definitions of IT and OT separately. Information Technology (IT) refers to the "entire spectrum of technologies for information processing, including software, hardware, communications technologies and related services. In general, IT does not include embedded tech...

Last updated: Nov 2, 2016   3:47 PM GMT  |  Blog: IoT Agenda   |      IIoT, Industrial IoT, Internet of Things
Insecurity, Part III: A State Agencys Data Security Posture

Blog   Perhaps one of the most egregious problems facing the agency is network performance and security. The workstations frequently lose their wireless connection to the server, and internet access drops. Work is frequently lost sometimes a lot of work: clients can lose most of an online appli...

Last updated: May 20, 2010   7:55 PM GMT  |  Blog: The Business-Technology Weave
Is IoT turning into the Internet of Thugs?

Blog  In a story that circulated worldwide last week, it was reported that a hotel in Austria, the Seehotel Jaegerwirt, had been attacked by hackers who disabled the guestroom cardkey system, locking guests in their rooms until the hotel paid a Bitcoin ransom. That's not exactly accurate, but enough of it...

Last updated: Jan 30, 2017   10:08 PM GMT  |  Blog: Head in the Clouds: SaaS, PaaS, and Cloud Strategy   |      Application security, Hacking, iot security
PREV 1...20   30   40...64   65   66   67   68   69   70   71   72   73...   80   90   100...111 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: