Information Technology Editor's Pick


Subscribe to the InfoTech eNewsletter

Editor's Pick

Key Pillars of Incident Resolution in Network and IT Operation Centers
November 25, 2014 - 12:46 PM
Large network and IT operation centers handle hundreds to thousands of incidents daily. Many of these incidents even impact the quality of service offered to customers and affect revenue and customer loyalty. It is imperative for these operations centers to have a robust software tools strategy to quickly and cost-effectively handle the resolution of these incidents. Despite trying numerous approaches like knowledge management and automation, these operations centers struggle to find a satisfactory approach to incident resolution.

Companies Have Good Reasons to Fear Data Migration
November 21, 2014 - 2:20 PM
I visited my dentist this morning for my regular cleaning and there was an air of excitement and nervousness throughout the office. While the practice is relatively small, both my dentist and hygienist were worried about an upcoming data migration that is happening this weekend as the office moves to updated IT equipment.

Radware Announces an Always on DDoS Mitigation Service
November 20, 2014 - 10:57 AM
The data breaches that cost Target and Home Depot tens of millions of dollars in losses as well as the personal information of more than 100 million customers is the extent to which the vast majority of people know about cyberattacks. But countless number of Distributed Denial of Service (DDoS) attacks go without making the headlines every single year, even though they cause just as much or more damage to businesses around the world.

Nimbix Extends JARVICE to Support Hybrid Cloud Implementations
November 17, 2014 - 4:50 PM
Cloud technology now provides virtually every component of information and communication technology (ICT) by allowing organizations access to enterprise grade applications, infrastructure, platforms, security and more at very affordable price points. This has introduced a level of flexibility and scalability that has resulted in exceptional growth for startups, SMBs and enterprises. The one concern that still continues to distress CIOs regarding cloud technology is security, but it is quickly being a non-issue as robust hybrid cloud solutions make it possible for enterprises to have a customer facing front-end while their existing data centers remain private.

State Department's Unclassified Network Goes Dark after Potential Hacking
November 17, 2014 - 10:35 AM
There's been no shortage of news about hacking efforts over the last several months, with companies like The Home Depot and a variety of others weighing in that networks have been compromised, information potentially taken, and so on. That hacking has even reached the United States government, and now the State Department joins in the chorus of those impacted. But the agency has let no grass grow beneath its feet, and has taken steps to secure its electronic borders.

Brocade Adds Aruba Technology to Acclaimed Subscription Program
November 13, 2014 - 5:34 PM
Brocade has entered an agreement with Aruba Networks to offer the latter company's wireless networking technology as part of the Brocade Network Subscription program. The two-year-old initiative offers networking technology to customers on a pay-as-you-go basis, granting businesses access to the solutions they need with maximum flexibility and scalability but minimal upfront costs. The addition of Aruba Networks' technology will likely expand Brocade's customer base to businesses who may have not considered it previously.

Industry Collaboration Drives 100G Foundation for Supercomputer Infrastructure
November 13, 2014 - 1:16 PM
Supercomputers were first introduced in the 1960s, and were considered to be at the frontline of process capacity and calculation speed. While the supercomputers of the 1970s used only a few processors, in the 1990s machines with thousands of processors began to appear. By the end of the 20th century, massively parallel supercomputers with tens of thousands of "off-the-shelf" processors were being used.

Making the Cloud Feel Local
November 12, 2014 - 7:10 AM
What workloads? The applications utilized everyday by businesses globally-email, document sharing and storage, collaboration, ERP, CRM, and more. These critical workloads will crush businesses if they aren't secure, available, and resilient.

Study: Certified Workstation Market Strong in Q3
November 11, 2014 - 11:43 AM
A new report by industry analyst IDC says that the certified workstation market is alive and growing. IDC's report said that the certified workstation market is actually showing some real momentum in 2014 with the third quarter of this year up 7.6 percent over the same period from a year ago. IDC points out this marks the sixth straight quarter this particular market has seen positive growth. The company did point out that the growth rate in the third quarter was slightly slowed compared to the previous quarter, which saw growth in the market of 12 percent.

How the Evolution of Power Has Become More Efficient
November 11, 2014 - 7:36 AM
Traditionally, data center power distribution models involve multiple (and inefficient) voltage power conversions between the electric utility and the server. Distribution transformers, uninterruptible power supply (UPS) systems and power distribution units (PDU) all introduce AC (alternating current) to DC (direct current) conversions and voltage transformations in the power chain, oftentimes resulting in wasted energy. The typical distribution model can include a:

The Lessons of Heartbleed and Shellshock
November 5, 2014 - 4:05 PM
By now, the Heartbleed vulnerability is old news. We heard about it last April along with how to fix the problem. So why should we still talk about it? Didn't everyone fix the problem and move on? If only it were that simple. Now that Shellshock - a similar but possibly more insidious vulnerability - has been identified, the industry must revisit the past to learn critical lessons on how to go forward.

Vectra Networks Report Reveals What Attackers Do Once Bypassing Perimeter Defenses
November 5, 2014 - 9:15 AM
The headlines are filled with a now constant drumbeat of data breaches. Post mortems on such events tend to focus on who was responsible, how long it took to discover and remediate the situation and how they accomplished their exploit. What typically does not get covered is what happens once the bad guys bypass your perimeter, i.e., can go undetected.

Cloud Players Position for Ongoing Increase in Public IT Cloud Services Spending
November 3, 2014 - 4:19 PM
Public IT cloud services spending this year should hit the $56.6 billion mark, with software as a service representing 70 percent of that. It is forecasted that by 2018 public IT cloud services spending is likely to grow to at least $127 billion.

DNS Based DDoS Attacks- What's in a Name?
November 3, 2014 - 2:19 PM
Recent press has shown a marked increase in DDoS attacks on ISPs around the world. According to Network World, DDoS attackers seem to have switched their attention from banks to gaming hosts, ISPs and even enterprises. At Infoblox our customers have been telling us the same thing, as DDoS attacks have intensified among our ISP customers. Initially everything was lumped together under the 'DDoS' heading. Then they became known as 'NXDomain' attacks, but as we sifted through the PCAP files of the actual attacks across different customers in different regions, a number of unique patterns emerged.

Skyera's skyHawk FS Packs Hefty Flash Storage
October 31, 2014 - 3:29 PM
It's been one of the biggest issues of personal preference since Coke took on Pepsi: hard drives or solid state drives? While the hard drive camp has a good point in that hard drives offer up huge amounts of storage for a minimum of expense, the solid state drive camp's focus on reliability and speed has its own points to consider. But even solid state these days is starting to really drive up the capacity, as seen in Skyera's new skyHawk FS, which fits a hefty slug of flash storage in one surprisingly handy package.

Security in the Cloud: How Hackers Are Going to Get Your Encryption Keys
October 30, 2014 - 4:28 PM
It has been well-studied, documented, and reported that our greatest concern with regard to acceptance of and migration to cloud computing is security. In 2014's "The Future of Cloud Computing" Survey, 49 percent of respondents cited security as an inhibitor to cloud adoption. And, trailing not far behind on the scale of inhibitors are privacy and regulatory compliance, with over 30 percent each.

Hewlett-Packard Looking to Sell Chinese Networking Branch
October 30, 2014 - 7:52 AM
Hewlett-Packard has slowly and surely been trying to reduce the scope of business when it comes to its central operations. Earlier this year, the firm announced it was basically spinning off its printers and PC ventures. Now there are numerous reports indicating the firm has begun talks with several private equity firms with the end goal being to sell its enterprise networking business to a Chinese purchaser.

HTML5 Standard Finalized After Years of Squabbling
October 29, 2014 - 4:35 PM
The World Wide Web Consortium (W3C) published its Recommendation of HTML5 on Tuesday, the fifth major revision of the format and cornerstone of the Open Web Platform. This is the first revision in a very long time, since the publishing of HTML4 specifications in 1997. With HTML5 developers can employ the latest improvements to the format and build cross-platform, feature-rich applications.

Blue Box Keeps its Promise with a Private Cloud for the Masses
October 29, 2014 - 4:16 PM
Jesse Proudman, founder and CTO of Blue Box, had a simple but grand vision: deploy a private cloud anywhere in the world in under an hour. In just five months, the company appears to be well on the way there and states that it has built "unbelievable momentum."

Bradford Augments Partnership with FireEye to Restrain Advanced Network Threats
October 29, 2014 - 9:21 AM
In the information age, wired and wireless networks are vulnerable to security threats. Making them hacker-proof is a horrendous task. Hence, it is essential for organizations to detect and contain advanced threats, including compromised endpoints, by combining advanced treat intelligence and rapid threat response.

Hitachi: Get More Control, Flexibility and Security in the Cloud
October 29, 2014 - 8:03 AM
Seeking to move away from the traditional delivery model and reap the many advantages of the cloud, many organizations are moving either to a private cloud or a combination of clouds- the hybrid cloud. Hitachi Data Systems Corporation (HDS), poised on the threshold of something big, is set to expand flexibility and control for the cloud.

Wheelings & Dealings: BigPanda Launches SaaS IT Incident Management Platform in Tandem with $7 Million Funding Round
October 28, 2014 - 6:37 PM
Upstart BigPanda, which is dedicated to managing IT issues in the data center, has scored $7 million in Series A funding. The funds come at an opportune time, as the company just launched its first data science platform for automated IT incident management. The new funding round will be used to grow the company and expand its development roadmap.

Virtual Racks Provide Endless Hardware Configurations
October 28, 2014 - 4:41 PM
Marketers of rack-based products have a very difficult task set before them: Differentiating a fragile, intricate piece of equipment, which often looks identical to competitor products and needs to be 'powered on' to effectively demonstrate.

Soft Machines Launches Virtual CPU Cores
October 28, 2014 - 12:18 PM
Although chip technology has made great advances, new developments see very little implementation unless they're integrated into the chips of major manufacturers, including AMD, ARM, Intel and Qualcomm. Soft Machines, a late-stage semiconductor startup with substantial funding, has launched virtual CPU cores with better performance across the board than traditional architecture for the IoT, mobile and cloud markets.

NaviSite Announces NaviCloud Director
October 28, 2014 - 11:55 AM
NaviSite, Inc., a provider of enterprise-class hosting, managed applications, managed messaging and managed cloud services, recently announced a new replication solution that provides high flexibility and customizability for its clients. The new NaviCloud Director solution, which gives companies the ability to quickly build applications and maintain them, is now providing disaster-recovery-as-a-service (DRaaS) technology. As a result, the virtual machines can now be replicated between NaviCloud Director (NCD) infrastructure-as-a-service (IaaS) environments, as well as from a customer's dedicated on-premise or virtual IT environments.

Broadview Networks Offers a New Twist to Self-Service
October 28, 2014 - 11:01 AM
Companies perhaps can never do enough to improve the customer experience; it's an ongoing process that has a beginning but no end.

Akamai Technologies Reports on the Increase in Size and Volume of DDoS Attacks
October 28, 2014 - 9:59 AM
The digital landscape in which virtually every public and private organization has a presence is under a relentless attack from many different sources, including organized crime, governments, hacktivists and your garden-variety hacker.

IBM Gives Travel and Transportation Industry What it Wants: Security
October 27, 2014 - 6:37 PM
Once upon a time, the travel and transportation industry, though still the most sought after, was manned by human beings and counting machines and didn't have to bother too much about security and data breaches; but with the advent of credit cards and online payment, travel has become one of the top products bought and sold on the Internet, making it a sitting duck for hackers. IBM is helping the industry to assess its current security posture and resolve potential threats or vulnerability.

VCE Will Now be EMC Business
October 27, 2014 - 6:06 PM
VCE has joined hands with EMC and Cisco to devise strategies for its next phase of development. In its new role, VCE's core business will be to simplify the installation of hybrid clouds.

KualiCo and Navigator Management Partners Announce Acquisitions
October 27, 2014 - 5:43 PM
KualiCo, a company that delivers open source administrative software, recently announced it is all set to acquire Kuali software as a service (SaaS) business from rSmart, a company that offers in administrative solutions for higher education. Also, Navigator Management Partners, a Kuali Commercial Affiliate, will acquire rSmart's Kuali consulting services. As a result of the acquisition, Chris Coppola, rSmart CEO and co-­founder, and 15 rSmart team members will join KualiCo and 14 rSmart consultants will join the Navigator team.

Friendly's TR-069 Device Management Solution Deployed by Tiscali
October 27, 2014 - 5:03 PM
Friendly Technologies, the unified device management company, confirmed that its TR-069 Device Management solution has been selected by Tiscali Italy, an alternative telecommunications companies in Italy.

Ericsson Exec Comments on Third Quarter Financials
October 24, 2014 - 12:07 PM
Networking giant Ericsson today reported financial results for what management called "a good and solid quarter" - in which net sales were 57.6 billion SEK.

New EC Digital Economy Commissioner Confirms Shift of EC Telecom Policy
October 24, 2014 - 11:21 AM
If you have followed European telecommunications market for any time, you might well agree that a major shift in regulatory thinking has happened in the European Community, which for decades has been more concerned with promoting competition than promoting investment in next generation networks.

Landmark UK Test Case Rules ISPs Must Do More to Block Sites Selling Counterfeit Goods
October 24, 2014 - 7:20 AM
When commerce started taking place on the Internet, it opened up a global marketplace in which virtually anyone was able to sell their goods online. This was a great opportunity for companies to increase their bottom line without having to invest in physical stores for consumers that wanted to purchase their products in countries around the world. But with minimal or no regulation governing Internet commerce, it also meant counterfeiters had the same access to the customers as legitimate companies.

Telefonica Adds Disaster Recovery as a Service to Its VDC Offering
October 23, 2014 - 5:57 PM
Telefonica, a telecommunications company, recently announced that its VDC clients now have the option to make use of its virtual private networks technology and Zerto's virtual replication to cost-effectively build applications for the cloud and in the cloud. The Telefonica VDC is equipped with Disaster Recovery as a Service (DRaaS) that safeguards mission critical applications and make them readily available even during disasters.

Halcyon Releases Password Reset Manger for IBM i Users
October 23, 2014 - 3:16 PM
Halcyon Software recently announced that it had released Password Reset Manager (PRM) for IBM Power Systems Servers running the IBM i OS. The solution will allow trusted users to change passwords without bothering support staff.

Verizon Shifts from Public Cloud to a Hybrid Model
October 23, 2014 - 12:26 PM
Cloud computing usage has grown exponentially thanks to its efficiency and the ability to cater to the needs of modern businesses that need access to more complicated IT infrastructures at a fraction of the cost, as a way to provide access to companies' resources to a diverse workforce distributed worldwide. The flexibility of cloud computing ensures that businesses always have the resources they need, as expected, to streamline their operations and boost productivity.

Vulnerability Shows How Quickly Cybercriminals Act to Deploy Exploit Kit
October 23, 2014 - 9:16 AM
These exploits typically take more than a week to construct. Since this exploit was built so soon after Adobe went public, it's conceivable that it came from a highly savvy attacker, who got leaked information in the time between ZDI's discovery of the vulnerability and the time Adobe issued the security bulletin.

Qualcomm Announces Availability of New Wi-Fi Chipsets
October 22, 2014 - 5:29 PM
A subsidiary of Qualcomm recently announced that it will seek to place high-speed wireless chipsets in homes and businesses en masse with its multi-user multi-input/multi-output (MU-MIMO) 802.11ac 2.0 products.

Vserv Serves a Smart Ace to Manipulate Exabytes of Information
October 21, 2014 - 6:29 PM
Exit big data-welcome to the world of 'smart data' - but are they really different? Put simply, big data can perhaps be equated to the many pieces in a jigsaw puzzle-when you put them together and get the real whole picture-then it becomes smart data - accurate, available in real-time and one that helps maximize business goals. Vserv's new business evolution and accompanying partnerships are all directed at smart data's head.

BTL Helps Pernod Ricard to Streamline Data Protection in EMEA
October 21, 2014 - 6:14 PM
Pernod Ricard, the wines and spirits leader has streamlined its data protection in EMEA with the help of Backup Technology and Asigra.

Wheelings & Dealings: Mirantis Receives Record $100M in Series B Funding
October 21, 2014 - 5:15 PM
In a huge boon for open source cloud infrastructure, OpenStack B2B software provider Mirantis has brought in a record $100 million in Series B funding. The investment, led by Insight Venture Partners, is the largest ever Series B financing round supporting open source solutions and one of the largest B2B investments of its kind.

Password Management Practices Form the Basis of a Secure Business
October 21, 2014 - 5:01 PM
For all the technical advances that businesses have adopted in recent years, it often still comes down to individual habits that can make or break security. One of the cornerstones of security is the password. All machines and systems rely on passwords to separate users from privileged data, and good passwords solidify that separation.

Connected Data Launches Private Cloud Storage Platform, 'Transporter Genesis'
October 21, 2014 - 7:00 AM
It's pretty clear by now that workers in general love the portability and accessibility of the cloud, for getting work done. Employers and IT folks? Not so much.

Networked IP and Hybrid Systems Delivering Value in Video Surveillance
October 20, 2014 - 6:49 PM
Traditional analog video surveillance systems were famous for providing low-quality images that often frustrated law enforcement officials and others that used the technology for different applications. As the technology in hardware and software continued to improve, the quality of the images captured by these new devices started delivering better results across the board. The introduction of broadband, HD cameras and cloud technology not only improved the quality by multiple factors, but it also made it possible to provide value added services, which could be monetized by surveillance companies.

Intronis Introduces File Sync and Collaboration Solution for SMBs
October 20, 2014 - 6:42 PM
Nowadays, SMBs struggle with how to share files and collaborate in a secure manner across remote employees, distributed business partners and every type of mobile device.

FrontRange's HEAT Client Management Selected by Bilfinger Group
October 20, 2014 - 5:07 PM
FrontRange, a provider of Hybrid Service Management software solutions, recently announced that its HEAT Client Management was selected by Bilfinger Group, an international engineering company and provider of technical, commercial, and infrastructure services. The solution will be deployed globally by Bilfinger for seamless software deployment and upgrading as well as to cut down on costs involved in frequent on-site engineer visits.

Center of Excellence in Dubai to help ICT Sector in Middle East
October 17, 2014 - 10:05 AM
In order to meet the emerging and ever evolving demands of the ICT sector and streamline efficient and effective regulation in the Middle East and North Africa, GSMA and the Telecommunications Regulatory Authority (TRA) of the United Arab Emirates are collaborating to launch a Center of Excellence in Dubai.

Microsoft Rolls out First Version of New, Free Video Chat App
October 16, 2014 - 5:35 PM
Microsoft recently introduced Skype Qik, a new, free communications app for Android, iPhone and Windows Phone devices.

MIPS Looks at Past and Future of 64-bit Architecture
October 16, 2014 - 5:32 PM
While 64-bit processors are becoming ubiquitous in PCs, embedded systems and even mobile devices, they actually have a history of over 20 years. Imagination Technologies, one of the major 64-bit processor makers, has released a new variant of its MIPS64 architecture the MIPS I6400 processors.

Ubiquiti and ECS Announce Distribution Agreement
October 16, 2014 - 5:04 PM
ECS, a major technology distributor, has entered into a distribution agreement with Ubiquiti Networks, a global connectivity technology company, that will allow it to market and sell all of Ubiquiti's product lines to resellers in China, Malaysia and the Philippines.

Neonode Announces Ground-Breaking Technology zForce EDGE
October 16, 2014 - 1:31 PM
The optical-touch technology company, Neonode Inc. recently launched an innovative technology, called zForce EDGE.

Asia-Pacific APM Market to Remain Buoyant
October 16, 2014 - 1:18 PM
Currently, things are looking good for the Asia-Pacific Application Performance Management (APM) market as it continues its rise. This perhaps is not surprising; for in an age, where organizations run multiple applications to manage multiple Web-based services, there is a high demand for solutions that will help to manage mission-critical applications and enhance their performance as well. The Asia-Pacific market report forecasts such a trend.

Dataguise Dgsecure Platform Now Supports Hadoop-in-the-Cloud
October 16, 2014 - 11:35 AM
The market for Hadoop-in-the-Cloud is projected to grow to $16.1 billion by 2020, according to a research report. Hadoop-in-the-Cloud is to be a replacement to on-premises Hadoop, as it is comprised of data storage in the cloud and its data analysis through Hadoop.

Wheelings & Dealings: NetScout Set to Land Danaher's Communications Arm
October 15, 2014 - 2:04 PM
A fairly major move arrived in the communications field recently as NetScout made an agreement to pick up the communications arm of Danaher Corporation.

Dynatrace Synthetic Monitoring Now Features New Capabilities
October 15, 2014 - 1:26 PM
Dynatrace, a major player in user-centric application performance management, recently launched the new Dynatrace Synthetic Monitoring, which boasts of a breakthrough analytics engine.

Wheelings & Dealings: EMC Agrees to Purchase Rising Startup Cloudscaling Group Inc.
October 15, 2014 - 1:14 PM
The critically-acclaimed cloud infrastructure pioneer EMC Corp. made the official announcement on Oct. 13 that the company is making moves to acquire a cloud-computing startup called Cloudscaling Group Inc. The deal will help to make EMC's cloud products better connect both with one another and other public cloud networks operated by groups like Amazon and Google. In addition, EMC will be able to offer vastly improved management infrastructure thanks to Cloudscaling's innovations.

Top Eight Reasons Why the CSO Needs Multi-Factor Authentication
October 15, 2014 - 9:14 AM
It's enough to make even the most seasoned executive dread the morning news. Is today the day that my company has been hacked? It's a rude awakening for those who lead the business. The role used to be far more straightforward: drive company growth, maintain a competitive edge and manage the success of the firm.

Report: Companies Spending More of their Mobile Ad Budgets on Video
October 15, 2014 - 7:05 AM
A recent report by Vdopia found that the vast majority of money spent on mobile advertising was spent on video and rich media. More people are engaged by video advertising that entertains, while banner advertising on mobile devices continues to decline.

eHarmony Adds Velocify for Salesforce to Manage Matchmaking process
October 14, 2014 - 5:31 PM
Good news, eHarmony users! eH+, a new premium dating service by eHarmony has enhanced the experience of its users who want a higher level of service from their online dating site. The company has selected Velocify for Salesforce to connect with its customers.

The Cost of (NOT) Monitoring
October 14, 2014 - 9:57 AM
However, IT pros know this couldn't be further from the truth. All that's required to help others understand why, is to answer a single question: how much will not monitoring cost?

Will Tokenization Transform Payment Security?
October 13, 2014 - 3:10 PM
Apple recently launched is Apple Pay mobile wallet offering, and tucked away inside it is a security feature considered to be one of the most fraud-proof and secure payment mechanisms available: tokenization. Consumers need to feel a strong sense of trust these days, in the wake of nonstop data breaches that have exposed millions of sensitive records. Apple's use of tokenization positions the company as a trustworthy provider of mobile payment services.

Intellectual Property Rights Less Cut & Dried in the Cloud
October 13, 2014 - 2:25 PM
Intellectual property rights have been an issue for a good long while now, and perhaps the biggest problem when it comes to this field is that each side has at least one good point to its credit. But while the debate rages on in terms of things like fair use and parody and similar matters, one key point has cropped up that has changed the nature of a great many debates before it, and likely many more to come after it. Specifically, it's the nature of cloud computing, and the kind of impact it's having on intellectual property discussions.

Logicbroker Brings the Best Out of Whatever System You Are Using
October 13, 2014 - 1:12 PM
Logicbroker is an EDI and e-commerce integration platform, which provides a supply chain integration hub.

Infinitely Virtual Donates Cloud Infrastructure for Budapest Computer Science Class
October 13, 2014 - 1:11 PM
Many countries around the world lack the resources to deliver quality IT education to their students in primary, secondary and in some instances even at the university level. This is especially true in developing countries that are deploying the infrastructure to support the delivery of the technology to all their citizens.

Extreme Networks Provides a Competitive Advantage to Businesses
October 13, 2014 - 1:01 PM
Extreme Networks - whose offerings are used by several winning pro football teams - is a competitive provider of software and business analytics.

European Community Deregulates Fixed Network Voice
October 13, 2014 - 7:49 AM
There no longer is any reason to regulate European Community fixed network voice services, the European Community recently concluded.

Dear Symantec: A Breakup Letter From Within May Be Approaching
October 10, 2014 - 6:03 PM
A company needs to have its effort moving toward a common goal. Recently we saw how some are recommending greater empowerment in customer service, but at the same time a greater stressing of standards in the company itself such that customer service departments work toward that common goal. Most companies look to expansion to fuel progress toward that goal, but sometimes it just doesn't work out that way, and that's when divestiture needs to come into play.

Cloudmark Unveils Real-Time Software Solution to Stop DNS Threats
October 10, 2014 - 10:30 AM
In recent years, there have been major security breaches in DNS infrastructure that compromise IP-based networks, which often brings down companies' web-based communications in the process. DNS security has become a main concern of service providers, who are looking out for different ways to tackle and withstand the attacks, which can be expensive and complicated.

Are Bermuda Businesses Any Safer from Cybercriminals?
October 10, 2014 - 9:55 AM
The recent cyberattack on JP Morgan Chase clearly shows even the best-resourced organization is challenged to effectively respond to the growing threat of a security breach. Apparently, to outsmart these hackers, a different solution is needed - one that combines human intelligence and machine learning. Logic Communications along with Masergy may just provide that sort of managed network security to Bermuda businesses.

Setting a New Standard in Remote Network Management
October 10, 2014 - 9:52 AM
How do you allow for management of the network when your IT doesn't work on site? Do your branch locations have to wait for the IT tech to show up before a problem can be resolved? If this is the case, chances are they are handicapped until someone can get there. This may stop processes or even render the network at risk.

How Lantronix is Helping to Fight IT Laziness
October 10, 2014 - 9:36 AM
There are times when I question how far I need to take convenience when it hits the point of laziness. I have an office in my basement, which means that's where I house the router, the server and the printer. When I open a file on my iPhone and want a quick print, it would be great if all I had to do was to hit print and the Bluetooth in my phone would talk to my printer. The capability may be there, but I haven't completed the digging to find out.

SSH Communications Security Debuts Secure Shell HealthCheck
October 10, 2014 - 9:30 AM
SSH Communications Security, a company that specializes in developing advanced security solutions has announced the release of its new governance, risk and compliance (GRC) service called, Secure Shell HealthCheck, aimed particularly at data center.

Apple Cracks Unexpected New Ground in PC Sales Figures
October 9, 2014 - 11:49 AM
Most anyone already knew that Apple was a major name when it came to smartphones, as well as tablets. For mobile devices, Apple was one of the biggest names around with a loyal user base that seemed only too happy to pick up the next version of an Apple device whenever it emerged. But a new report from IDC suggests that Apple's broken some wholly new ground recently, as sales of its Mac line of desktop devices have surged sufficiently to make Apple one of the top five global vendors in the PC market.

Nedbank Builds Online Trust with Gemalto's PKI Solution
October 9, 2014 - 10:37 AM
The convenience of online banking cannot be denied, but as banks increase the number of their online offerings they need to provide a framework of trust online so that customers feel safe and secure in the digital world. That's why Nedbank, a commercial bank in South Africa deployed Gemalto's new PKI solution, built on its field-proven Ezio technology.

The Future of Application Management May Start with Stackato
October 9, 2014 - 10:25 AM
Do you rely on applications to help you manage your day? If you're in a business environment, this is probably more true than you realize. We sometimes think of apps as only those things that we download to our smartphones to manage music, play games or sync documents. In reality, there are so many others that integrate with legacy and new devices that it can get overwhelming.

Elite Communications Selects EMC as Its VSAT Provider
October 8, 2014 - 6:16 PM
Elite Communications is a provider of full-service telecommunications solutions, with a strong reputation in the energy market. Recently, the firm announced that it has picked Emerging Markets Communications as its satellite connectivity provider for its oil and gas customers based in North America.

AppliedMicro Launches HeliX Family of Embedded Processors
October 8, 2014 - 6:12 PM
The high-end embedded market is transitioning from 32-bit to 64-bit. Hence, the demand for ARMv8-A-based computing processors have increased, because the ARMv8 architecture features support for 64-bit with a focus on power-efficient implementation while maintaining compatibility with existing 32-bit software.

FlexITy Solutions Welcomes Shane Warnez to its Leadership Team
October 8, 2014 - 5:41 PM
FlexITy Solutions Inc. recently expanded its leadership team with the appointment of industry expert Shane Warnez as Vice President of Sales and Operations for FlexITy's Western Canadian offices.

Increased Complexity in Enterprise IT Environments Requires Improved Security Techniques
October 8, 2014 - 12:31 PM
When cloud technology came to the enterprise, it was a liberating experience for many companies. Upgrading software, installing new hardware and backing up data became the cloud provider's problem. It freed up time and resources for businesses to focus on their core expertise, especially those that were less tech-savvy.

Redfish Server Specification Could Eliminate Data Center Vendor Lock-In
October 8, 2014 - 12:25 PM
Industry leaders in hardware manufacturing are working on a new hardware management specification called Redfish that supports out-of-band management and multi-vendor compatibility, which has important implications for the growing data center business model in particular.

Open Source Middleware Provides a Platform for Innovation and Competitive Advantage for Financial Institutions in the Middle East
October 8, 2014 - 9:38 AM
Banks in the Middle East are not only performing strongly in regional markets, they are now looking to expanding overseas and grow their footprints across the globe. According to Deloitte's latest report, "rising world trade flows, increased gross domestic product (GDP), a growing middle class and new technologies are expected to help banks based in emerging markets expand into developed markets in the coming year." The growing ambitions of the region's banking sector are driving up demand for effective IT. However, most (if not all) banks and financial institutions these days have cost reduction programs in place.

Personal Cloud Storage: IT's Growing Compliance Nightmare
October 8, 2014 - 7:35 AM
Personal cloud storage services such as Dropbox, Box, and Google Drive are a convenient resource for saving desktop space, aiding collaboration and providing access to files from any device. However, enterprise employees are increasingly using these cloud services to save and store files in the workplace.

The National Cyber Security Alliance Launches New PSA Campaign
October 6, 2014 - 6:16 PM
The National Cyber Security Awareness Month PSA Campaign launching in October couldn't have come at a more opportune time. Hackers around the world, whether they be government sponsored attacks or criminal enterprises, are getting more sophisticated, which is resulting in very lucrative paydays. The recent Home Depot breach has been recognized as the biggest cybercrime event, resulting in the theft of more than 56 million credit and debit card information from customers in Canada and the U.S. With so much bad news in the press about security breaches, consumers often ask, how can I protect myself better than a multinational organization with more resources?

Delta Electronics Rolls Out New Outdoor Power Supply and Rectifier
October 6, 2014 - 3:13 PM
Delta Electronics recently rolled out its new energy-efficient outdoor power supply called Advantage 1kW, which is useful for small cell applications.

Managing Silos to Reduce Encryption Sprawl
October 6, 2014 - 2:47 PM
Encrypting information has played a vital role in security throughout human history. In 700 B.C., the Scytale cipher tool enabled secure communications so that the Greek States could defend their lands from the Persians. The Enigma machine helped Allies crack enemy codes during World War II. Today's Advanced Encryption Standards (AES) help businesses keep their data safe. Several experts have in fact referred to 2014 as "The Year of Encryption."

Panduit Recognized by Gartner
October 6, 2014 - 1:23 PM
Panduit Corp., a provider of next-generation Data Center Infrastructure Management (DCIM) solutions, recently announced that Gartner, Inc. has positioned the company in the "Visionaries" quadrant of the first-ever Magic Quadrant for Data Center Infrastructure Management (DCIM) Tools. The company stood tall on 16 criteria for completeness of vision and ability to execute.

ePlus Technology Becomes Part of Microsoft Devices Program
October 6, 2014 - 1:17 PM
ePlus Inc., an integrator of technology solutions, recently announced that its subsidiary, ePlus Technology, Inc., has become a new member of the Microsoft Devices Program. As a result, ePlus Technology will now be able to offer Surface through authorized resellers. The company's customers will also be able to enjoy Microsoft's extended warranty and accidental damage along with numerous value-added services.

Peaxy Unveils Hyperfiler
October 6, 2014 - 1:06 PM
Data is important for organizations; but gathering and systematically evaluating such data can be a daunting task. In these days of the information superhighway, managing a large volume of unstructured data requires special expertise.

Arbor Networks Upgrades Capacity for Arbor Cloud DDoS Protection Service
October 6, 2014 - 12:54 PM
In the first half of 2014, the number of DDoS attacks has been on the rise, which has made the attack events difficult for companies to cope with. According to Arbor Networks, the number of DDoS events reaching over 20Gbps has doubled in comparison to similar attacks in 2013.

Lack of Integration Leads to Silos
October 6, 2014 - 10:40 AM
When a network works harmoniously and data is able to be shared evenly to the appropriate groups, each group can work in an effective and efficient manner. When integration is not applied however, different groups begin to work independently from each other and they begin to form stovepipe or 'silo' environments, which can lead to a disjointed and segmented network. As a result, groups begin to act like separate entities and the concept of rights and privileges as well as network sharing, become misused. Groups also begin to access resources they should not have access to and begin to introduce software and hardware to the network that should not be allowed. These actions destroy continuity and weaken the network as a whole.

Wheelings & Dealings: StackEngine Nabs $1M in Funding for Docker Deployment Platform
October 3, 2014 - 12:22 PM
A startup focused on Docker app development, StackEngine, has formally exited stealth mode and announced $1 million in seed funding from Silverton Partners and LiveOak Venture Partners.

Protect Against Data Breaches? Not Likely, Say SafeNet Survey Respondents
October 3, 2014 - 11:57 AM
For those of us who shop online-and in ever-increasing numbers, that describes a large portion of us-a new study from SafeNet, Inc. should have stomachs dropping somewhere near the floor. We've all seen data breaches in one store or another, especially lately, but the news from SafeNet suggests that online shopping might not be as safe as some would hope.

Comings & Goings: PCTEL Selects Dolezal as New Chief Marketing Officer, Expects Rapid Growth
October 2, 2014 - 5:16 PM
PCTEL announced earlier this week that Carolyn Dolezal would become the vice president, strategy and chief marketing officer. Dolezal previously served on PCTEL's board as compensation committee chair and has leadership experience in technical and communications related companies.

Sway from Microsoft Lessens the Office Bloat
October 2, 2014 - 3:23 PM
My father would often tell me "Too much is like not enough." The meaning behind this is that everything, or at least most things, should be done in moderation. This is an expression that is true in so many different occasions whether it be eating, or yes, even applications. In fact, this mostly seems to be true when it comes to applications.

Send Anywhere Upgrades P2P File Transfer Utility
October 2, 2014 - 2:51 PM
Sending files between two or more devices can be difficult. For many people, there has always been email, and it is perfectly functional for unencrypted transfers that are not too large and have little chance of being marked as spam. For others, text messaging programs can sometimes contain file transfer mechanisms, but those can also have their difficulties because they can be unwieldy, slow, or only able to send files-just like email-up to a certain size. Then there are public clouds and physical transfers of flash drives or DVDs-both of which have numerous security concerns. One company, a Korean startup called Send Anywhere, is trying to relieve users of those headaches.

Hikvision Selects Smartvue Cloud Video Surveillance Solutions
October 2, 2014 - 2:22 PM
Cloud-based video surveillance systems are gaining popularity among video surveillance service companies because of their affordability. Compared to traditional surveillance systems, cloud based systems are easy to install and simple to run.

Radware Provides Protection from Bash Bug Shellshock Vulnerability
October 2, 2014 - 11:49 AM
"Bash bug" (Shellshock) is the latest technology used by hackers on Linux operating systems. It allows hackers to gain control of computers running on Linux operating systems with simple commands. Bash is a program used to execute command line instructions and scripts.

Bel Power Solutions Partners with Cosel
October 2, 2014 - 11:35 AM
Electricity is often an unsung hero in the performance of data centers. All those grid sectors, generators and many other sources of power mostly run in the background and hence, an average person often doesn't grasp the importance of power in a data center.

Bing Working to Better Detect Malicious Websites
October 2, 2014 - 9:52 AM
With the growing number of companies coming under the attacks hackers, some of the bigger Internet firms are taking some extreme actions. Hacked websites are not just a problem for webmasters who are the victims of the hacking. These websites can lead to malware and spy proliferation, and that becomes a problem for everyone on the Internet. This is why Microsoft has improved its algorithm for detecting hacked websites.


Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter