Search Results | Network hardware
PREV 1...30   40   50...71   72   73   74   75   76   77   78   79   80...   90   100   110...111 NEXT
Sort by:  Most Relevant  |  Date
Why I Love EMC :-)

Blog  I love EMC. I really really do. Heres why. When I was in VMworld: Las Vegas last year I was on the cusp of releasing my book on Site Recovery Manager. I met up with a lot of the SRM Team there, and they helped me introduce me to many of the storage folks responsible for developing the SRAs (Site ...

Last updated: Apr 9, 2009   2:32 AM GMT  |  Blog: RTFM Education – Virtualization, VMware, Citrix
Ricoh's plans for transformation

Blog   Ricoh recently held its first industry analyst summit in Tokyo. The event focused on communicating Ricoh's focus on its services-led business transformation through its 18th Mid-Term Plan.Ricoh is in the midst of transformation, actively streamlining its company structure to accelerate growth ...

Last updated: Oct 6, 2014   2:11 PM GMT  |  Blog: Quocirca Insights   |      Uncategorized
Commercial IoT environments require shared edge infrastructure

Blog  As enterprises continue to implement IoT for customer experiences, smart building systems, automation and more, we see that the workflow from the sensor to the cloud often exists within its own, individual silo. The result of this is that many businesses today are operating multiple, siloed, IoT app...

Last updated: Dec 3, 2018   5:42 PM GMT  |  Blog: IoT Agenda   |      Edge computing, Internet of Things, iot
Machine learning is transforming brand protection

Blog  Marc Andreessen, founder of Netscape and now a pre-eminent Valley venture capitalist, says "software is eating the world." Algorithms available on-demand in the cloud and on our smartphones are changing the rules for every facet of our lives. Now machine learning is changing how consumer product bra...

Last updated: Nov 28, 2018   6:42 PM GMT  |  Blog: IoT Agenda   |      Authentication, brand protection, device identity
How manufacturers, service providers, consumers can improve IoT security

Blog  Security is one of the greatest threats facing any business today, and this threat is compounded for companies producing, supporting or leveraging connected devices. Data transmission between devices can drive tremendous efficiency increases, from supply chain automation to software updates, to self...

Last updated: Jan 30, 2017   7:16 PM GMT  |  Blog: IoT Agenda   |      Authentication, Internet of Things, iot
It's time for fog/edge computing in the internet of things

Blog  The marketing team at Cisco introduced its fog computing vision in January 2014, also known as edge computing for other more purist vendors. However, it took until 2017 for fog to collect its most popular headlines thanks to the internet of things. A study by IDC estimated that by 2020 10% of the w...

Last updated: Jul 11, 2017   3:56 PM GMT  |  Blog: IoT Agenda   |      cloud, Edge computing, Enterprise IoT
Storage Considerations for Virtual Desktops- Part 3: Key storage features to ensure VDI success (Sponsored Post)

Blog  This is a sponsored guest post byVikram Belapurkar,a solutions marketing manager at Dell focused on storage virtualization and consolidation solutions. Good morning folks! This is my last post in this three part blog series. In the last two posts, I highlighted the critical success factors for ...

Last updated: Apr 27, 2011   5:06 PM GMT  |  Blog: Enterprise IT Watch Blog
Not just for cryptocash: How blockchain tech could help secure IoT

Blog  The internet of things isn't coming, it's already here. New healthcare, industrial, home and personal devices are being connected every day, right under our noses. Gartner predicts that by 2020, nearly 21 billion IoT devices will be online. Yet as exciting as this explosive growth may be, it also br...

Last updated: Feb 13, 2017   7:06 PM GMT  |  Blog: IoT Agenda   |      Blockchain, Internet of Things, iot
IBM expands 'Studio' line of facilities for coders

Blog  IBM tells us it likes developers, but don't be fooled -- everyone has been saying that since a certain bald headed CEO started bouncing around the stage screaming the word. But down at the guts level, we know IBM's intentions are pure enough i.e. the firm has spent years now validating its work wit...

Last updated: Nov 3, 2015   6:50 PM GMT  |  Blog: CW Developer Network   |      Uncategorized
Do we need an open source GPS alternative?

Blog  Although occasionally infuriating around roundabouts and new developments, we have placed an inordinate amount of faith in Global Positioning System (GPS) satellites as they exist for in-car and/or smartphone usage. So why would we need an open source alternative? Well the GPS system was created a...

Last updated: Feb 22, 2013   11:35 AM GMT  |  Blog: Open Source Insider   |      Uncategorized
acpitabl.dat hanging during safe mode boot, log on screen is black on regular boot

Answer  I have a Windows Server 2003 server that hosts mail using Exchange 2003 and was recently was updated to SP2. Additionally, more RAM was added. The server was fine for a few days. Now when it boots it comes to the log on screen but the background is black and the log on boxes are not visible. I'm...

Last updated: Nov 1, 2007   10:00 PM GMT   |    Microsoft Exchange 2003, Microsoft Windows Server 2003, SP2
Visibility the key to meeting compliance standards and data protection

Blog  As IT managers struggle to meet the latest compliance standards, there is one challenge that remains constant: knowing what types of data you have and which subset of that data must be protected, and bringing in the appropriate data protection. This may sound like an easy task, but in reality it ca...

Last updated: Sep 20, 2010   3:02 PM GMT  |  Blog: IT Compliance Advisor
Mobility requires more than just a BYOD policy

Blog  The iPhone came out in 2007, but it's taken nearly a decade for many IT admins to wrap their heads around mobility in the enterprise. Eight years later, a good chunk of organizations now acknowledge that employees work from their smartphones and tablets, which means IT has to create a secure environ...

Last updated: Nov 12, 2015   7:33 AM GMT  |  Blog: Modern Mobility   |      Box, BYOD, Enterprise mobility
Desktop Virtualization Round Up

Blog  It's been a pretty busy month around IT Knowledge Exchange, and we've learned a lot about desktop virtualization. We've compiled some of the highlights to serve as your go-to list for some of the top considerations from planning to deployment. Blogging About Virtual Desktops Desktop virtualizatio...

Last updated: Jan 27, 2011   9:26 PM GMT  |  Blog: Enterprise IT Watch Blog
Cisco Live 2011! prepares to rally the base

Blog  Next Sunday, I'm packing up and shipping back to Vegas for Cisco Live! 2011, the IT giant's annual user conference. Last year, they proudly announced the Cisco Cius, the tablet built for enterprise which has been lingering on the horizon for a year, limply promising a video-driven tablet that will d...

Last updated: Jul 7, 2011   1:18 PM GMT  |  Blog: Enterprise IT Watch Blog
Evaluating SBC vendors for cloud communications infrastructure

Blog  As more organizations move their communications infrastructure to the cloud, session border controllers must follow suit. In 2016, nearly 40% of North American business users were using some form of IP telephony, such as SIP trunking, voice over IP and cloud unified communications, according to Fro...

Last updated: Nov 2, 2017   7:28 PM GMT  |  Blog: Unified Communications Nation   |      cloud, Cloud communications, Cloud infrastructure
Too many flavors might slow desktop virtualization

Blog   Too many desktop virtualization platform options, deployment choices and licensing paths might stimmying desktop virtualization. As CIO's Kevin Fogarty reports: Desktop virtualization now comes in so many varieties that even vendors confuse terms referring to the flavors. Market leader Citrix Syst...

Last updated: May 3, 2010   5:56 PM GMT  |  Blog: Enterprise IT Watch Blog
Pains and innovations with data backup software

Blog  If you're like me, you've yelled, cussed, and screamed over frustrations brought on by backup software. Let me share my experiences. First off, I remember, back in the late 80s/early 90s, using a Colorado drive (remember those?!) with DOS-based software that just worked. Besides the occasional hard...

Last updated: Jun 18, 2010   11:22 AM GMT  |  Blog: Enterprise IT Watch Blog
Acquisition of Quest Software would fit Dell's strategy

Blog  Many Oracle database administrators know Quest Software as the company that produces Toad, the popular third-party Oracle Database management tool. So how does it make sense that Dell, maker of desktops and laptops and pizza-box servers, might acquire it? Those DBAs might feel a little better to kn...

Last updated: Jun 26, 2012   1:57 PM GMT  |  Blog: Eye on Oracle
Tackling the MSP challenge

Blog  MSPs are in kind of a tough situation. Their customers are increasingly looking at outsourced IT services from cloud providers, potentially taking away a big chunk of what has traditionally been their bread-and-butter client base. To keep these customers, an MSP is faced with some unpleasant options...

Last updated: Jun 28, 2011   7:26 PM GMT  |  Blog: Storage Channel Pipeline
PREV 1...30   40   50...71   72   73   74   75   76   77   78   79   80...   90   100   110...111 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: