Information Technology Editor's Pick

CHANNELS

Subscribe to the InfoTech eNewsletter

Editor's Pick

VoIP Veterans at ITEXPO Discuss Net Neutrality, Title II Reclassification
January 28, 2015 - 5:22 PM
We've been discussing net neutrality for many years. Recently, the debate over this controversial topic has begun heating up again.

OnRamp Founder Will Explore IT's Future at ITEXPO Miami
January 28, 2015 - 4:19 PM
The future is bright for IT, with powerful innovations hitting the market every day to offer companies a slew of new hosted and hybrid options. But with so much activity and attractive new services, it can be hard to predict which technology choices made now will be the smartest ones in the long run. Companies aren't just ensuring their security today-they're building business security for the future as well. Staying informed is a huge factor in sticking to a profitable strategy.

5 Reasons Why Right Brain Thinking is Driving Cloud and IT Decisions
January 28, 2015 - 12:50 PM
Have IT managers lost their minds? Or are they only using half their brains? And if so, which side are they using now? Which side may they be using more in 2015 and beyond?

Radware Integrates Platforms with Cisco Application-Centric Infrastructure
January 27, 2015 - 6:05 PM
Radware is known for its network load balancing and security software. As such, it has vested interest in the advancement of network infrastructures which can bridge the gap between platforms. Cisco, with its Application-Centric Infrastructure (ACI), attempts to do just that by creating an object-oriented networking layer which will provide a central point for virtual and physical resource management.

Making 'The Year of the Retail Breach' a Thing of the Past
January 26, 2015 - 2:04 PM
The steadily increasing frequency of data breach occurrences in 2014 has been both astounding and worrisome. From Target and Neiman Marcus to Michaels, Chick-fil-A and Home Depot, fraudsters are leaving no stone unturned, and the millions of customers unlucky enough to use infected point of sale (POS) machines at these retailers now need to worry about whether their sensitive information has fallen into the wrong hands.

Stealth Mode: Lying in Wait inside the White House's Network
January 26, 2015 - 1:52 PM
Recent data breaches involved an unclassified computer network used by President Obama's senior staff, prompting countermeasures by the administration resulting in temporary system outages. Officials said the attack did not appear to be aimed at destruction of either data or hardware, or assuming control of other systems at the White House, which poses the question - what were the hackers looking for?

Software Analysis and Measurement is a Critical but Often Overlooked Component of Development
January 26, 2015 - 12:54 PM
The value and importance of big data analytics is becoming a game changer as organizations look for new ways to gain intelligence and actionable insight from the vast amounts of data they generate. But rarely is any sort of in-depth analysis of software conducted, which is interesting, considering this type of assessment offers valuable information about quality, risk, security and other important factors.

NetMotion Announces Self-Diagnosing VPN Software
January 22, 2015 - 5:34 PM
It is essential for enterprises to support their operations with networks that are consistent in their reliability and speed - wasted seconds due to downtime translates directly to a loss of revenue. A network that can diagnose its own problems may seem out of reach, but the latest announcement from NetMotion, a developer of mobility management software, says it has done just that.

The New IP: Building a Virtually Unstoppable Workspace
January 21, 2015 - 9:28 AM
Whether you run your own business, or simply work for one, chances are you will be very familiar with the advantages - and challenges - of flexible working. In the Middle East, we are beginning to see a trend of employees working part-time or in flexible full-time roles and in future this is only going to increase. Businesses are therefore increasingly under pressure to take action and make sure they have the technology and processes in place to meet these employee demands.

Canadian Cyber Security Firm VPNWise Offers Smart DNS and VPN Services Under One Roof
January 19, 2015 - 10:58 AM
Like other Smart DNS services, Vpnwise.com bypasses geographic restrictions and enables access to hundreds of channels worldwide, allowing users to surf the Internet through proxy servers - anonymously and safely.

Keeping Up with the 24x7 Pace of Social Media for Business with Always-On Cloud Encryption
January 16, 2015 - 6:49 PM
Social media for business is a 24x7 flow of information and conversations. The world of social media today is well beyond its consumer beginnings, and is now heavily used by businesses. Most marketing departments will tell you they set aside resources, budget, and planning time to leverage this constant wave of information and influence.

Help! My Network is Congested
January 14, 2015 - 4:18 PM
You already know what's happening. With the explosion of broadband usage and online video, and especially streaming video from over-the-top (OTT) services like Netflix and YouTube, broadband service providers' networks are heavily tapped.

Meet the New InfiniBand - the Data Center's Best Friend
January 14, 2015 - 1:01 PM
NASA scientists created visco-elastic polyurethane foam to cushion astronauts' re-entry into Earth's atmosphere; when the patent was released to the public, it became Tempur-Pedic mattress foam. Teflon was first used in artillery shell fuses and in the production of nuclear material for the Manhattan Project before it became the standard for nonstick pans. The same principle of repurposing is emerging in the computing world as technologies from supercomputers find their way into data center architecture.

Top Security Risks in 2015 and How Middle East Organizations can Combat Them
January 14, 2015 - 9:12 AM
2014 brought with it slew of attacks of various types, 2015 could bring more sophisticated attacks with greater potential for causing harm. A10 Network's Glen Ogden outlines what to look for and how to provide proper protection.

New Year Resolutions for IT Security Professionals: The World Has Changed - Take Control
January 12, 2015 - 11:44 AM
We live in a different world than years ago. Most security professionals were content to have time to play with some logs, install a new Intrusion Prevention System, or get a sample of malware and try their hand at reversing. Generally though, most security professionals were relegated to a world of firewall administration, user authentication, and compliance (let alone the value-add security documentation that goes along with that…). As we've continued to see, times have changed and Chief Information Security Officers (CISO's) and their teams are expected to do considerably more now. The reality is that if you are CISO in today's world, you are on point to fight foreign military units and organized criminal enterprises.

Black Duck Software Makes Open Source Adoption Easier for the Enterprise
January 9, 2015 - 3:21 PM
Black Duck Software was recently named to the SD Times 100 for the seventh consecutive year. According to the press statement, Black Duck's OSS Logistics solutions help customers automate open source governance and compliance, continually monitoring for security vulnerabilities. The solution automates processes needed to manage the flow of open source throughout the enterprise, allowing companies to gain systematic control over how they acquire, approve, scan, monitor, secure, inventory, and deliver open source code.

Centerity Simplifies IT Network Monitoring
January 8, 2015 - 2:42 PM
With any kind of communication, IT network monitoring is essential to keep systems stable and going around the clock without interruption. IT managers and CIOs are under daily pressure to keep company business systems going. They have to maintain 24/7 IT services to drive growth, keep their customers satisfied or defend market share.

Datawatch Helps Harness Data Visually for a Clearer Picture
January 8, 2015 - 9:24 AM
When it comes to business, what can be measured gets done, and this is perhaps the key factor in why analyzing data leads to better performance by those organizations who religiously implement it. From healthcare to technology to retail, it is the data mined and analyzed that indicates the path of least resistance to success.

Gearing Up for ITEXPO with CGI's VP
January 8, 2015 - 6:00 AM
In true ITEXPO form, TMC has gathered industry thought leaders from around the globe to collaborate, share and learn about all the current trends as well as those expected down the road. Three weeks away from ITEXPO, CGI's VP of Global Communications Sector, Mobility & IoT Rene Sotola allowed TMC to pick his brain on Net Neutrality, mobility, WebRTC and much more.

Weaponizing Incident Response
January 6, 2015 - 10:57 AM
Cybersecurity solutions that reduce detection, response and recovery times are critical, but complex. That's because they require a variety of incident analysis and management tools that are automated, tightly integrated and, ideally, managed from a central command. Few companies have the time or expertise required to implement and run such a well-integrated, comprehensive cybersecurity program. Those companies that succeed find their implementation severely hindered by inadequate integration options and cross-platform incompatibilities.

Tech Trends 2015: Cloud-Based Communications and the Consumerization of IT
December 30, 2014 - 4:00 PM
Mobile computing, social media, and "the cloud" were once foreign concepts to most people. But today these technologies are fundamental to how we live, work, and play. So what's next? What new technologies will take the business world by storm in the coming year?

Are Firms Finally Moving Email to the Cloud?
December 30, 2014 - 10:39 AM
The reports of email's demise have been greatly exaggerated. For all the social media platform, unified communications offerings and other ways that people can communicate in 2015, email is still one of the most used and most basic.

MetricStream Makes 2015 Predictions
December 30, 2014 - 6:00 AM
As 2014 comes to an end, it is important that we reflect on trends and lessons learned in the past year, as well as anticipate what's ahead in 2015. There are several trends that captured our attention at MetricStream.

Cybersecurity Prevention Tips
December 29, 2014 - 1:06 PM
Looking back at the Sony Pictures Entertainment (SPE) attack, we must realize that now is the time, more than ever to take a more proactive approach to cybersecurity to prevent what happened to SPE from happening to your organization.

Xorcom: Productivity, Progress and Possibilities
December 29, 2014 - 12:37 PM
With the inevitable end of 2014 a few days away and ITEXPO just a few weeks away, Xorcom's CEO and Co-founder Eran Gal discussed apps, security, business communications an much more with TMC. Gal leaves little doubt as to why the Xorcom booth at ITEXPO will be a must stop at the upcoming industry event.

Greater Protection, Greater Revenue: Security as a Service for Hosting Providers
December 23, 2014 - 2:16 PM
According to the Identity Theft Resource Center, there had already been 744 data breaches and over 81 million recorders were exposed in the U.S. by Dec. of 2014, an increase of 24.8 percent over the same period last year. A 2013 survey conducted by the National Small Business Association found that 78 percent of organizations have experienced at least one data breach over the last two years. Not to mention the many high-profile security breaches that the big-name brands suffered in 2014, including Google.

Reflecting on 2014, Looking Ahead to 2015
December 23, 2014 - 11:58 AM
It is confirmed: 2014 has been a great year for Red Hat. Yesterday, we announced third quarter results of our fiscal year 2015 and, with that, celebrated our 51st consecutive quarter of revenue growth - more than 12 years of consecutive revenue growth. Thank you to the team of Red Hat customers, partners, open source contributors, and associates around the world, for helping us propel Red Hat to new heights. While 2014 has been a fantastic year for Red Hat, it has also been a banner year for open source.

Wheelings & Dealings: Carbonite to Acquire MailStore
December 22, 2014 - 3:14 PM
Data backup and recovery specialist Carbonite is beefing up its small and midsize business (SMB) proposition with the acquisition of MailStore, which is known for its email archiving capabilities, including full-text search and indexing capabilities.

EdgeWave Gains $2 Million from Additional Series A Funding
December 22, 2014 - 3:11 PM
EdgeWave, a San Diego-based cyber security firm, recently announced that it has closed $2 million in additional Series A equity funding. This round of financing, which was supplied by three investors, brings the company's total 2014 equity funding to $8 million.

Four Truths CIOs and CMOs Must Realize to Work in Harmony
December 22, 2014 - 6:00 AM
There is no doubt that marketing has risen in prominence. The rise of the internet has driven new behaviors in the customer base. In the B2B world, every buying center will research information online and it is the job of marketing to entice those buyers and bring them into their environment. Strategically, marketing are now the conduit for all business - yes, I did say "all" business. Tactically, this means driving inbound marketing programs, proactively working with sales on outbound initiatives and raising the brand of the company.

2015: A Strategic Year for Data Centers
December 22, 2014 - 6:00 AM
This past year has been one of tremendous innovation. With the Internet of Things growing at an exponential rate, new data streams are constantly being created to unlock significant value for both the technology companies that must evolve to stay ahead of the curve - but also their customers whose lives and businesses benefit from these new products and services.

Got Bots?
December 19, 2014 - 6:19 PM
Distil Networks had the opportunity to work with Peter Bernstein, Senior Editor at TMCNet, on a webinar discussing the problems posed by growing armies of bots and botnets. Peter's extensive experience in networking and communications, combined with Distil Networks' CEO Rami Essaid's expertise in the world of bots, made for a fascinating and enlightening hour.

New Nebula Solution Helps Enterprises Expedite OpenStack Adoption
December 19, 2014 - 3:30 PM
Nebula provides solution to enable the implementation of OpenStack solutions to go faster and smoother.

A Holiday Hunting We Will Go
December 18, 2014 - 9:38 AM
Cybercriminals fully realize that companies tend to be minimally staffed during the holidays. Rather than let the calendar year end on a sour note, I suggest your organization be proactive this year and spend time hunting for adversaries rather than sitting back and hoping your threat feed, MSSP or other mechanisms will lead to you catching something.

Improve Prevention? Or Default to Detection and Response?
December 16, 2014 - 4:13 PM
In today's hyper-connected world prevention is hard. Security chiefs find their perimeters constantly assaulted and too often breached. When that happens, there had better be a strong detection framework in place, so that culprits can't explore, corrupt, and download at their leisure, and a strong response framework to limit the reputational and economic damage.

The Network is Dead. Long Live the Network!
December 16, 2014 - 10:58 AM
The Internet permeates our lives, a complex global TCP/IP network that we take for granted whether we use it for shopping, research, or watching funny cat videos.

Put the Insider Threat in Your Sights
December 15, 2014 - 2:08 PM
With the seemingly endless barrage of high-profile hacks and data breaches, it can be easy to lose track of the insider threat hiding right under our noses. Regardless of how well we secure our assets from outside parties, we ultimately need to give access to our employees, contractors and partners in order for them to do their jobs. Misuse of this privileged access, whether through data theft or damage, is an unfortunate, yet inherent risk of doing business for most organizations.

Identity Theft and Medical Theft in the Workplace
December 15, 2014 - 8:07 AM
Medical theft is defined as, falsifying a victim's medical record with information from the perpetrator and crime. One major reason for medical theft is that it provides the criminals the necessary information to move forward and commit identity theft. Identity theft is when one person assumes another's identity and under false pretenses performs acts or makes purchases.

Tech Market in 2015 Ruled by Six C Principles
December 12, 2014 - 9:54 AM
It may be hard to believe, but there are already signs the tech market in 2015 will come to be dominated by a handful of core principles, all beginning with the letter C. That's a strange confluence of circumstances, but if a new report from 451 Research is right, we're about to all be C students in the very near future as just six C's rule the tech marketplace. Specifically, the six C's in question are containers, convergence, cloud security, closets, crowd workers, and coexistence-six C's that mean more to the market than some may anticipate.

Comings & Goings: Carbonite Names New CEO
December 12, 2014 - 9:51 AM
The online backup firm known as Carbonite announced late last week that it has a new CEO. Mohamad Ali is taking over effective immediately, succeeding former CEO David Friend. Friend is not leaving the Boston-based company completely as he will remain the executive chairman of the board of directors. He will also serve in an advisory role with the firm on a number of strategic endeavors Carbonite feels are important to its future.

2014's Tech Nightmares: From Sony Hack to iCloud Nudes
December 10, 2014 - 12:40 PM
There was little doubt that 2014 was a huge year for technology. Plenty of things happened, plenty of developments arrived, plenty of exciting new concepts were advanced. Some came to fruition, others did not. But in a field so thick with advances, there must too be some drawbacks. Into each life some rain must fall, as the old song once said, and the tech sector was no different. Continuum recently compiled a list of the 12 biggest disasters in information technology (IT) for 2014, and it was a list fraught with horrors many would rather be forgotten.

Disaster Recovery Gets a Little Easier for CenturyLink with DataGardens Acquisition
December 9, 2014 - 12:18 PM
There was once a Dilbert strip about disaster recovery, in which Alice revealed that the plan for disaster recovery involved a lot of running around and screaming. Alice further expressed the hope that, one day, the disaster recovery team would have a budget. We've come a long way since those days, of course, and now, disaster recovery is something businesses take seriously. For all the proof that could be asked for, just take a look at CenturyLink, who recently purchased DataGardens in a bid to drive its disaster recovery portfolio.

Why an SSL Certificate is Important to Google
December 9, 2014 - 11:21 AM
Internet security is something that should concern everyone, whether they are end-users, website owners or service providers.

2015 Cloud Predictions
December 9, 2014 - 10:49 AM
Now that cloud services have become part of IT's "new normal", commonly referred to as "Hybrid", it seems obvious that the approaches and tools we use to manage IT would also evolve and mature, though the pace of evolution varies amongst companies, of course. According to a Website Magazine article quoting a Gartner survey, more than 55 percent of CIOs indicate they would host all critical apps in the cloud by 2020. Cloud services use cases can vary greatly, but often hold common themes around converting traditional application to SaaS, or adding disaster recovery to your existing datacenter with RaaS.

Data Centers in the Crosshairs: Today's Most Dangerous Security Threats
December 8, 2014 - 10:51 AM
Every day attackers conspire to take down applications and steal data, leaving your data center infrastructure in the crosshairs. Storing the most valuable and most visible assets in your organization - your Web, DNS, database, and email servers - data centers have become the number one target of cyber criminals, hacktivists and state-sponsored attackers.

Top 5 Security Predictions for 2015
December 4, 2014 - 5:55 PM
Looking back on 2014, the two major themes that dominated security headlines were large-scale retail breaches and vulnerabilities in widely used software libraries. So, what cybersecurity bombshells are in store for us in 2015?

New York's New Chief Information Officer Offers Huge IT Background
December 4, 2014 - 12:19 PM
The state of New York recently made a roster move, bringing in a new chief information officer with a particular focus on overseeing the state government's computer operations. Maggie Miller, the state's new chief of information technology (IT), comes to the position with a substantial amount of experience in both private sector and public sector IT operations, making her a terrific replacement for outgoing chief Brian Digman.

Three Reasons Why Infrastructure-as-a-Service is Taking Off
December 2, 2014 - 9:20 AM
Infrastructure-as-a-Service (IaaS) is one of the fastest growing service models of cloud computing because it is an easy-to-handle, pay-as-you-grow business plan that focuses on the OpEx model and maximizes the ROI.

2015 Cloud Security Predictions
December 1, 2014 - 12:26 PM
If 2014 was the year of the cloud, 2015 is shaping up to be the year of cloud security. On the heels of some of the largest data breaches in history in 2014, organizations are doubling down and security is gaining board room visibility. Enterprise have spent the past few years building out private and hybrid cloud infrastructure to gain agility and improve ROI. Only now are internal auditors, risk and compliance officers and regulators recognizing that with new technology comes new risk.

Proximus Chooses Italtel to Deploy Upgrade to IP-based Network
November 26, 2014 - 2:28 PM
Proximus, a global telecommunications company, has announced its selection of Italtel, a leader of generation networks, value-added services and global IP-IP communication, to decommission its legacy fixed switched network in favor of a next generation network.

Key Pillars of Incident Resolution in Network and IT Operation Centers
November 25, 2014 - 12:46 PM
Large network and IT operation centers handle hundreds to thousands of incidents daily. Many of these incidents even impact the quality of service offered to customers and affect revenue and customer loyalty. It is imperative for these operations centers to have a robust software tools strategy to quickly and cost-effectively handle the resolution of these incidents. Despite trying numerous approaches like knowledge management and automation, these operations centers struggle to find a satisfactory approach to incident resolution.

Companies Have Good Reasons to Fear Data Migration
November 21, 2014 - 2:20 PM
I visited my dentist this morning for my regular cleaning and there was an air of excitement and nervousness throughout the office. While the practice is relatively small, both my dentist and hygienist were worried about an upcoming data migration that is happening this weekend as the office moves to updated IT equipment.

Radware Announces an Always on DDoS Mitigation Service
November 20, 2014 - 10:57 AM
The data breaches that cost Target and Home Depot tens of millions of dollars in losses as well as the personal information of more than 100 million customers is the extent to which the vast majority of people know about cyberattacks. But countless number of Distributed Denial of Service (DDoS) attacks go without making the headlines every single year, even though they cause just as much or more damage to businesses around the world.

Nimbix Extends JARVICE to Support Hybrid Cloud Implementations
November 17, 2014 - 4:50 PM
Cloud technology now provides virtually every component of information and communication technology (ICT) by allowing organizations access to enterprise grade applications, infrastructure, platforms, security and more at very affordable price points. This has introduced a level of flexibility and scalability that has resulted in exceptional growth for startups, SMBs and enterprises. The one concern that still continues to distress CIOs regarding cloud technology is security, but it is quickly being a non-issue as robust hybrid cloud solutions make it possible for enterprises to have a customer facing front-end while their existing data centers remain private.

State Department's Unclassified Network Goes Dark after Potential Hacking
November 17, 2014 - 10:35 AM
There's been no shortage of news about hacking efforts over the last several months, with companies like The Home Depot and a variety of others weighing in that networks have been compromised, information potentially taken, and so on. That hacking has even reached the United States government, and now the State Department joins in the chorus of those impacted. But the agency has let no grass grow beneath its feet, and has taken steps to secure its electronic borders.

Brocade Adds Aruba Technology to Acclaimed Subscription Program
November 13, 2014 - 5:34 PM
Brocade has entered an agreement with Aruba Networks to offer the latter company's wireless networking technology as part of the Brocade Network Subscription program. The two-year-old initiative offers networking technology to customers on a pay-as-you-go basis, granting businesses access to the solutions they need with maximum flexibility and scalability but minimal upfront costs. The addition of Aruba Networks' technology will likely expand Brocade's customer base to businesses who may have not considered it previously.

Industry Collaboration Drives 100G Foundation for Supercomputer Infrastructure
November 13, 2014 - 1:16 PM
Supercomputers were first introduced in the 1960s, and were considered to be at the frontline of process capacity and calculation speed. While the supercomputers of the 1970s used only a few processors, in the 1990s machines with thousands of processors began to appear. By the end of the 20th century, massively parallel supercomputers with tens of thousands of "off-the-shelf" processors were being used.

Making the Cloud Feel Local
November 12, 2014 - 7:10 AM
What workloads? The applications utilized everyday by businesses globally-email, document sharing and storage, collaboration, ERP, CRM, and more. These critical workloads will crush businesses if they aren't secure, available, and resilient.

Study: Certified Workstation Market Strong in Q3
November 11, 2014 - 11:43 AM
A new report by industry analyst IDC says that the certified workstation market is alive and growing. IDC's report said that the certified workstation market is actually showing some real momentum in 2014 with the third quarter of this year up 7.6 percent over the same period from a year ago. IDC points out this marks the sixth straight quarter this particular market has seen positive growth. The company did point out that the growth rate in the third quarter was slightly slowed compared to the previous quarter, which saw growth in the market of 12 percent.

How the Evolution of Power Has Become More Efficient
November 11, 2014 - 7:36 AM
Traditionally, data center power distribution models involve multiple (and inefficient) voltage power conversions between the electric utility and the server. Distribution transformers, uninterruptible power supply (UPS) systems and power distribution units (PDU) all introduce AC (alternating current) to DC (direct current) conversions and voltage transformations in the power chain, oftentimes resulting in wasted energy. The typical distribution model can include a:

The Lessons of Heartbleed and Shellshock
November 5, 2014 - 4:05 PM
By now, the Heartbleed vulnerability is old news. We heard about it last April along with how to fix the problem. So why should we still talk about it? Didn't everyone fix the problem and move on? If only it were that simple. Now that Shellshock - a similar but possibly more insidious vulnerability - has been identified, the industry must revisit the past to learn critical lessons on how to go forward.

Vectra Networks Report Reveals What Attackers Do Once Bypassing Perimeter Defenses
November 5, 2014 - 9:15 AM
The headlines are filled with a now constant drumbeat of data breaches. Post mortems on such events tend to focus on who was responsible, how long it took to discover and remediate the situation and how they accomplished their exploit. What typically does not get covered is what happens once the bad guys bypass your perimeter, i.e., can go undetected.

Cloud Players Position for Ongoing Increase in Public IT Cloud Services Spending
November 3, 2014 - 4:19 PM
Public IT cloud services spending this year should hit the $56.6 billion mark, with software as a service representing 70 percent of that. It is forecasted that by 2018 public IT cloud services spending is likely to grow to at least $127 billion.

DNS Based DDoS Attacks- What's in a Name?
November 3, 2014 - 2:19 PM
Recent press has shown a marked increase in DDoS attacks on ISPs around the world. According to Network World, DDoS attackers seem to have switched their attention from banks to gaming hosts, ISPs and even enterprises. At Infoblox our customers have been telling us the same thing, as DDoS attacks have intensified among our ISP customers. Initially everything was lumped together under the 'DDoS' heading. Then they became known as 'NXDomain' attacks, but as we sifted through the PCAP files of the actual attacks across different customers in different regions, a number of unique patterns emerged.

Skyera's skyHawk FS Packs Hefty Flash Storage
October 31, 2014 - 3:29 PM
It's been one of the biggest issues of personal preference since Coke took on Pepsi: hard drives or solid state drives? While the hard drive camp has a good point in that hard drives offer up huge amounts of storage for a minimum of expense, the solid state drive camp's focus on reliability and speed has its own points to consider. But even solid state these days is starting to really drive up the capacity, as seen in Skyera's new skyHawk FS, which fits a hefty slug of flash storage in one surprisingly handy package.

Security in the Cloud: How Hackers Are Going to Get Your Encryption Keys
October 30, 2014 - 4:28 PM
It has been well-studied, documented, and reported that our greatest concern with regard to acceptance of and migration to cloud computing is security. In 2014's "The Future of Cloud Computing" Survey, 49 percent of respondents cited security as an inhibitor to cloud adoption. And, trailing not far behind on the scale of inhibitors are privacy and regulatory compliance, with over 30 percent each.

Hewlett-Packard Looking to Sell Chinese Networking Branch
October 30, 2014 - 7:52 AM
Hewlett-Packard has slowly and surely been trying to reduce the scope of business when it comes to its central operations. Earlier this year, the firm announced it was basically spinning off its printers and PC ventures. Now there are numerous reports indicating the firm has begun talks with several private equity firms with the end goal being to sell its enterprise networking business to a Chinese purchaser.

HTML5 Standard Finalized After Years of Squabbling
October 29, 2014 - 4:35 PM
The World Wide Web Consortium (W3C) published its Recommendation of HTML5 on Tuesday, the fifth major revision of the format and cornerstone of the Open Web Platform. This is the first revision in a very long time, since the publishing of HTML4 specifications in 1997. With HTML5 developers can employ the latest improvements to the format and build cross-platform, feature-rich applications.

Blue Box Keeps its Promise with a Private Cloud for the Masses
October 29, 2014 - 4:16 PM
Jesse Proudman, founder and CTO of Blue Box, had a simple but grand vision: deploy a private cloud anywhere in the world in under an hour. In just five months, the company appears to be well on the way there and states that it has built "unbelievable momentum."

Bradford Augments Partnership with FireEye to Restrain Advanced Network Threats
October 29, 2014 - 9:21 AM
In the information age, wired and wireless networks are vulnerable to security threats. Making them hacker-proof is a horrendous task. Hence, it is essential for organizations to detect and contain advanced threats, including compromised endpoints, by combining advanced treat intelligence and rapid threat response.

Hitachi: Get More Control, Flexibility and Security in the Cloud
October 29, 2014 - 8:03 AM
Seeking to move away from the traditional delivery model and reap the many advantages of the cloud, many organizations are moving either to a private cloud or a combination of clouds- the hybrid cloud. Hitachi Data Systems Corporation (HDS), poised on the threshold of something big, is set to expand flexibility and control for the cloud.

Wheelings & Dealings: BigPanda Launches SaaS IT Incident Management Platform in Tandem with $7 Million Funding Round
October 28, 2014 - 6:37 PM
Upstart BigPanda, which is dedicated to managing IT issues in the data center, has scored $7 million in Series A funding. The funds come at an opportune time, as the company just launched its first data science platform for automated IT incident management. The new funding round will be used to grow the company and expand its development roadmap.

Virtual Racks Provide Endless Hardware Configurations
October 28, 2014 - 4:41 PM
Marketers of rack-based products have a very difficult task set before them: Differentiating a fragile, intricate piece of equipment, which often looks identical to competitor products and needs to be 'powered on' to effectively demonstrate.

Soft Machines Launches Virtual CPU Cores
October 28, 2014 - 12:18 PM
Although chip technology has made great advances, new developments see very little implementation unless they're integrated into the chips of major manufacturers, including AMD, ARM, Intel and Qualcomm. Soft Machines, a late-stage semiconductor startup with substantial funding, has launched virtual CPU cores with better performance across the board than traditional architecture for the IoT, mobile and cloud markets.

NaviSite Announces NaviCloud Director
October 28, 2014 - 11:55 AM
NaviSite, Inc., a provider of enterprise-class hosting, managed applications, managed messaging and managed cloud services, recently announced a new replication solution that provides high flexibility and customizability for its clients. The new NaviCloud Director solution, which gives companies the ability to quickly build applications and maintain them, is now providing disaster-recovery-as-a-service (DRaaS) technology. As a result, the virtual machines can now be replicated between NaviCloud Director (NCD) infrastructure-as-a-service (IaaS) environments, as well as from a customer's dedicated on-premise or virtual IT environments.

Broadview Networks Offers a New Twist to Self-Service
October 28, 2014 - 11:01 AM
Companies perhaps can never do enough to improve the customer experience; it's an ongoing process that has a beginning but no end.

Akamai Technologies Reports on the Increase in Size and Volume of DDoS Attacks
October 28, 2014 - 9:59 AM
The digital landscape in which virtually every public and private organization has a presence is under a relentless attack from many different sources, including organized crime, governments, hacktivists and your garden-variety hacker.

IBM Gives Travel and Transportation Industry What it Wants: Security
October 27, 2014 - 6:37 PM
Once upon a time, the travel and transportation industry, though still the most sought after, was manned by human beings and counting machines and didn't have to bother too much about security and data breaches; but with the advent of credit cards and online payment, travel has become one of the top products bought and sold on the Internet, making it a sitting duck for hackers. IBM is helping the industry to assess its current security posture and resolve potential threats or vulnerability.

VCE Will Now be EMC Business
October 27, 2014 - 6:06 PM
VCE has joined hands with EMC and Cisco to devise strategies for its next phase of development. In its new role, VCE's core business will be to simplify the installation of hybrid clouds.

KualiCo and Navigator Management Partners Announce Acquisitions
October 27, 2014 - 5:43 PM
KualiCo, a company that delivers open source administrative software, recently announced it is all set to acquire Kuali software as a service (SaaS) business from rSmart, a company that offers in administrative solutions for higher education. Also, Navigator Management Partners, a Kuali Commercial Affiliate, will acquire rSmart's Kuali consulting services. As a result of the acquisition, Chris Coppola, rSmart CEO and co-­founder, and 15 rSmart team members will join KualiCo and 14 rSmart consultants will join the Navigator team.

Friendly's TR-069 Device Management Solution Deployed by Tiscali
October 27, 2014 - 5:03 PM
Friendly Technologies, the unified device management company, confirmed that its TR-069 Device Management solution has been selected by Tiscali Italy, an alternative telecommunications companies in Italy.

Ericsson Exec Comments on Third Quarter Financials
October 24, 2014 - 12:07 PM
Networking giant Ericsson today reported financial results for what management called "a good and solid quarter" - in which net sales were 57.6 billion SEK.

New EC Digital Economy Commissioner Confirms Shift of EC Telecom Policy
October 24, 2014 - 11:21 AM
If you have followed European telecommunications market for any time, you might well agree that a major shift in regulatory thinking has happened in the European Community, which for decades has been more concerned with promoting competition than promoting investment in next generation networks.

Landmark UK Test Case Rules ISPs Must Do More to Block Sites Selling Counterfeit Goods
October 24, 2014 - 7:20 AM
When commerce started taking place on the Internet, it opened up a global marketplace in which virtually anyone was able to sell their goods online. This was a great opportunity for companies to increase their bottom line without having to invest in physical stores for consumers that wanted to purchase their products in countries around the world. But with minimal or no regulation governing Internet commerce, it also meant counterfeiters had the same access to the customers as legitimate companies.

Telefonica Adds Disaster Recovery as a Service to Its VDC Offering
October 23, 2014 - 5:57 PM
Telefonica, a telecommunications company, recently announced that its VDC clients now have the option to make use of its virtual private networks technology and Zerto's virtual replication to cost-effectively build applications for the cloud and in the cloud. The Telefonica VDC is equipped with Disaster Recovery as a Service (DRaaS) that safeguards mission critical applications and make them readily available even during disasters.

Halcyon Releases Password Reset Manger for IBM i Users
October 23, 2014 - 3:16 PM
Halcyon Software recently announced that it had released Password Reset Manager (PRM) for IBM Power Systems Servers running the IBM i OS. The solution will allow trusted users to change passwords without bothering support staff.

Verizon Shifts from Public Cloud to a Hybrid Model
October 23, 2014 - 12:26 PM
Cloud computing usage has grown exponentially thanks to its efficiency and the ability to cater to the needs of modern businesses that need access to more complicated IT infrastructures at a fraction of the cost, as a way to provide access to companies' resources to a diverse workforce distributed worldwide. The flexibility of cloud computing ensures that businesses always have the resources they need, as expected, to streamline their operations and boost productivity.

Vulnerability Shows How Quickly Cybercriminals Act to Deploy Exploit Kit
October 23, 2014 - 9:16 AM
These exploits typically take more than a week to construct. Since this exploit was built so soon after Adobe went public, it's conceivable that it came from a highly savvy attacker, who got leaked information in the time between ZDI's discovery of the vulnerability and the time Adobe issued the security bulletin.

Qualcomm Announces Availability of New Wi-Fi Chipsets
October 22, 2014 - 5:29 PM
A subsidiary of Qualcomm recently announced that it will seek to place high-speed wireless chipsets in homes and businesses en masse with its multi-user multi-input/multi-output (MU-MIMO) 802.11ac 2.0 products.

Vserv Serves a Smart Ace to Manipulate Exabytes of Information
October 21, 2014 - 6:29 PM
Exit big data-welcome to the world of 'smart data' - but are they really different? Put simply, big data can perhaps be equated to the many pieces in a jigsaw puzzle-when you put them together and get the real whole picture-then it becomes smart data - accurate, available in real-time and one that helps maximize business goals. Vserv's new business evolution and accompanying partnerships are all directed at smart data's head.

BTL Helps Pernod Ricard to Streamline Data Protection in EMEA
October 21, 2014 - 6:14 PM
Pernod Ricard, the wines and spirits leader has streamlined its data protection in EMEA with the help of Backup Technology and Asigra.

Wheelings & Dealings: Mirantis Receives Record $100M in Series B Funding
October 21, 2014 - 5:15 PM
In a huge boon for open source cloud infrastructure, OpenStack B2B software provider Mirantis has brought in a record $100 million in Series B funding. The investment, led by Insight Venture Partners, is the largest ever Series B financing round supporting open source solutions and one of the largest B2B investments of its kind.

Password Management Practices Form the Basis of a Secure Business
October 21, 2014 - 5:01 PM
For all the technical advances that businesses have adopted in recent years, it often still comes down to individual habits that can make or break security. One of the cornerstones of security is the password. All machines and systems rely on passwords to separate users from privileged data, and good passwords solidify that separation.

Connected Data Launches Private Cloud Storage Platform, 'Transporter Genesis'
October 21, 2014 - 7:00 AM
It's pretty clear by now that workers in general love the portability and accessibility of the cloud, for getting work done. Employers and IT folks? Not so much.

Networked IP and Hybrid Systems Delivering Value in Video Surveillance
October 20, 2014 - 6:49 PM
Traditional analog video surveillance systems were famous for providing low-quality images that often frustrated law enforcement officials and others that used the technology for different applications. As the technology in hardware and software continued to improve, the quality of the images captured by these new devices started delivering better results across the board. The introduction of broadband, HD cameras and cloud technology not only improved the quality by multiple factors, but it also made it possible to provide value added services, which could be monetized by surveillance companies.

Intronis Introduces File Sync and Collaboration Solution for SMBs
October 20, 2014 - 6:42 PM
Nowadays, SMBs struggle with how to share files and collaborate in a secure manner across remote employees, distributed business partners and every type of mobile device.

FrontRange's HEAT Client Management Selected by Bilfinger Group
October 20, 2014 - 5:07 PM
FrontRange, a provider of Hybrid Service Management software solutions, recently announced that its HEAT Client Management was selected by Bilfinger Group, an international engineering company and provider of technical, commercial, and infrastructure services. The solution will be deployed globally by Bilfinger for seamless software deployment and upgrading as well as to cut down on costs involved in frequent on-site engineer visits.

Center of Excellence in Dubai to help ICT Sector in Middle East
October 17, 2014 - 10:05 AM
In order to meet the emerging and ever evolving demands of the ICT sector and streamline efficient and effective regulation in the Middle East and North Africa, GSMA and the Telecommunications Regulatory Authority (TRA) of the United Arab Emirates are collaborating to launch a Center of Excellence in Dubai.

Microsoft Rolls out First Version of New, Free Video Chat App
October 16, 2014 - 5:35 PM
Microsoft recently introduced Skype Qik, a new, free communications app for Android, iPhone and Windows Phone devices.

MIPS Looks at Past and Future of 64-bit Architecture
October 16, 2014 - 5:32 PM
While 64-bit processors are becoming ubiquitous in PCs, embedded systems and even mobile devices, they actually have a history of over 20 years. Imagination Technologies, one of the major 64-bit processor makers, has released a new variant of its MIPS64 architecture the MIPS I6400 processors.

FOLLOW US

Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter