Information Technology Editor's Pick


Subscribe to the InfoTech eNewsletter

Editor's Pick

Allot Buys Cloud-Based Security Firm Optenet
February 26, 2015 - 5:07 PM
Allot Communications Ltd. this week announced it is buying security company Optenet for $5.5 million.

Putting 2014, 'The Year of the Breach' into Context
February 26, 2015 - 11:04 AM
With an average of more than two breaches occurring every day, the headlines begin to sound like an overwhelming, broken record. To take these huge numbers out of the abstract and give the breaches some context, they will be compared to human populations.

Ipanema Technologies Appoints Ben Heisler as Senior Vice-President of Sales in the Americas
February 25, 2015 - 12:58 PM
Ipanema Technologies announced it has appointed Ben Heisler as Senior Vice-President of sales in the Americas. An industry leader in network solutions, Ipanema provides enterprises with the solutions they need to guarantee business application performance, regardless of IT complexity.

Hyperconverged and Hyperscale: A New Day in Storage Dawns
February 25, 2015 - 9:57 AM
As data rapidly increases in today's information-based economy, storage demands are increasing right along with them. The cost of hardware alone makes it too expensive to build out traditional storage infrastructure, making its rate of scale too slow to be an effective option. Being able to expand rapidly is a key element of any organization's growth strategy. Enterprises today need flexible, scalable storage approaches if they hope to keep up with rising data demands.

Microsoft Moves Quickly to Remove Potentially Dangerous Adware From Lenovo Computers
February 24, 2015 - 12:31 PM
Malware and hackers have become such a problem for the computer business and computer owners that it almost seems like a new story pops up every day. While hackers and malware used to confine themselves to attempting to get into home computers or business hubs, networks have been the name of the game most recently. That doesn't mean these baddies are leaving home computers alone entirely. Most recently reports began surfacing that Lenovo had left its computers vulnerable thanks to preinstalling an adware program called Superfish Visual Discovery.

Wheelings & Dealings: NS-Technologies Acquired by Dialogic
February 23, 2015 - 4:43 PM
Without standardization, we end up with a combination of various and usually disparate networks. Dialogic, Inc. is one company whose goal is to boost the reliability of any-to-any network connections. Dialogic is able to efficiently connect these disparate networks through an assortment of networks and networking protocols that include IP, SIP and IMS.

When Gaming Isn't A Game: Three Best Practices to Protect Your Hosting Service Against DDoS Attacks
February 23, 2015 - 11:41 AM
The unprecedented number of security breaches, hacks and DDoS attacks on gaming communities, software manufacturers and even Hollywood studios grew to epic proportions in Q4 of 2014. Gaming sites and their hosting providers are particularly susceptible, and you don't have to be a giant in the industry to be affected. In this article, we will explore why gaming sites are so hard-hit and how hosting providers can most effectively defend themselves.

Equation Malware Unstoppable Until Hard Drive Is Destroyed
February 19, 2015 - 7:58 AM
While there are all kinds of different malware threats out there these days, one has risen above the rest to become the most feared. A cyberespionage group that has a skill set very similar to that of U.S. Intelligence agencies, has managed to get into key installations in both Russia and Iran using a form of malware that is so destructive and so dangerous that destroying the hard drive is the only way to stop its spread.

NetSwap Launches for Local Backup for Amazon S3, Google Cloud
February 18, 2015 - 5:24 PM
Storage specialist Highly Reliable Systems has released the NetSwap family of network-attached appliances, which provide reverse-cloud server backup for several bigwig data storage environments, like Amazon S3, Google Cloud Storage, DreamHost DreamCloud and Dropbox.

Rethinking Network Acceleration in a Third Platform World
February 18, 2015 - 8:12 AM
In order to enable a more robust network in today's fast-paced environments and stay ahead of the ever-expanding data growth curve, network management and security appliances will now, more than ever, need to remain in front of advancing network speeds to ensure apps run quickly, videos stream smoothly and end-user data is secure and accessible.

The Year of Threat Intelligence Sharing: Bringing Structure to the Chaos of Big Security Data
February 17, 2015 - 3:19 PM
?We've seen the security ecosystem evolve from all-in-one systems to point solutions to a bi-directionally integrated fabric knitting these silos together. This year that will extend into community-based, big security data digesting TIP systems.

Pulse Supply Delivers Solutions as Well as Product
February 17, 2015 - 12:41 PM
In businesses' hyper-connected world today, many are having trouble simply keeping up, yet alone getting ahead. Technology is moving so fast that some companies are getting left in the dust. That's where Pulse Supply steps in.

Docker Adoption is Ahead of Schedule
February 12, 2015 - 5:37 PM
As virtualization and container apps continue to catch fire in the enterprise, a new survey has revealed that Docker adoption in particular is ahead of schedule, just four months after exiting stealth mode.

Comings & Goings: WHOA Names New Chief Strategy Officer
February 11, 2015 - 7:43 AM
It is clear to see why WHOA is ecstatic about the hire; Varma's results speak for themselves. Over his eight years with Peer 1, he was integral in increasing the company's revenue from $35 million to nearly $200 million at the time of his departure.

ePlus Technology Receives Cisco Customer Satisfaction Award
February 10, 2015 - 6:11 PM
ePlus Inc. announced today that one of its subsidiaries has received a Cisco Customer Satisfaction Excellence Gold Star for its performance of customer service as a Cisco partner.

Technology Consolidation Bridges Application Delivery Gap
February 10, 2015 - 2:34 PM
I love bridges. I'm fascinated by the architecture that provides the foundation for a strong and stable layer below the roadway to safely and quickly deliver traffic. For centuries, these marvels have connected otherwise impassable and isolated areas to more populated road systems and communities.

Opengear Keeps Moving Forward with New Ideas
February 10, 2015 - 11:59 AM
To the ordinary lay person, a phrase like "out of band technology" might not be that easily decipherable. But to someone like Shirish Nilekar, Director of Product Strategy & Management at Opengear, the phrase means everything.

Firewall Monitoring Solutions Critical for Maintaining Security and Compliance
February 10, 2015 - 11:55 AM
2014 might very well go down in the history books as the year of security breaches. From Sony to iCloud to Target to eBay to Home Depot, malicious activity abounded and it seems no market sector was spared. If these attacks taught business owners anything at all, it's that the days of buying and installing a firewall and walking away are long gone.

How to Avoid These 5 Key Solution Outages
February 3, 2015 - 11:26 AM
The New Year brings new opportunities to look back, and-more importantly-look forward. In 2015, many IT managers will resolve to keep their systems up and running 24/7 without fail. And no wonder: An average service outage can result in $385,000 in related revenue loss.

The Cloud is Becoming Pervasive in Help Desk and ITSM Markets
February 3, 2015 - 11:08 AM
All areas of the IT world are being impacted by the cloud, but the benefits are especially pronounced when it comes to the help desk and IT service management (ITSM) market. The cloud is an ideal delivery mechanism for IT service and IT asset management (ITAM) solutions and early adopters are beginning to reap the benefits of the cloud and software-as-a-service (SaaS) models.

IBM and eBay Enterprise to Improve Magento's Global Presence
February 3, 2015 - 10:43 AM
Long before Carl Icahn pushed the hand of eBay CEO John Donahoe to split from PayPal, the company had acquired Magento in 2011. That acquisition is beginning to pay off as it gets integrated in to eBay Enterprise and become a growing piece of the company's ecommerce platform. In order to improve the Magento Hosting Partner ecosystem and increase its expansion globally, IBM and eBay announced an agreement to introduce Magento's ecommerce clients to IBM's enterprise cloud.

The Increasing Importance of DNS as an Attack Vector: How Middle East Businesses Can Keep it Secure
February 3, 2015 - 10:29 AM
The Domain Name System, or DNS, is a foundational Internet technology used in every non-trivial IP-based transaction and which, if it's not working properly, can bring the Web to a standstill. Since its invention over 30 years ago, DNS has been continually evolving to become the core component of the Internet today. Unfortunately, this has made it one of the most attractive targets for hackers and malware criminals.

FireEye Integrates Adallom into Threat Analytics Platform
February 2, 2015 - 2:34 PM
FireEye, Inc., a global cybersecurity solutions provider, recently announced an agreement with cloud access security broker Adallom to integrate the latter company's security visibility for cloud applications into FireEye's Threat Analytics Platform (TAP) suite.

Detection-Based Security Fails at Preventing Web Browser Malware According to Ponemon Institute
February 2, 2015 - 1:52 PM
Insecure browsers are set to allow Web-borne malware to infiltrate more than 75 percent of enterprises, according to some frightening new research from the Ponemon Institute. The firm queried 645 IT and IT security professionals for its new report, "The Challenge of Preventing Browser-Borne Malware," and the results point to some very serious gaps in data privacy and protection.

Calling All IT Directors: The Future Is Now, Argue ITEXPO Panelists
January 30, 2015 - 4:55 PM
When it comes to the disruptive changes that will rock the technology sector over the next three to five years, almost all ITEXPO panelists and keynoters this week agreed: we are entering a world dictated by the Internet of Things (IoT), big data and cloud computing.

The Cost of Monitoring (but Not Automating)
January 30, 2015 - 12:46 PM
Any IT professional who has used monitoring tools for any length of time is most likely perfectly comfortable setting up new devices, such as servers, routers, switches and the like. Adding sub-elements, such as disks and interfaces are probably a snap, too. There's also a good chance they've set up their fair share of reports and data exports. Not to mention alerts.

The Future of Storage in the Web-Scale World
January 29, 2015 - 2:55 PM
IDC predicts that 2015 will be a year of accelerating innovation on the Third Platform of computing-social, mobile, cloud and big data-that is rapidly transforming IT. The analyst firm is noticing early-stage enterprise investment in "Third Platform" workloads that leverage web-scale architectures typically seen in hyperscale environments. Enterprises in the Asia Pacific sphere (APAC), for example, are focusing IT spending on Web-scale cloud systems built by agile development teams to enable new business capabilities.

McAfee Exec: We Need to Do More to Secure Smartphones, IoT
January 29, 2015 - 12:26 PM
With all the high profile network breaches in recent months of everyone from CENTCOM to Sony and Target, we are all by now aware of the potential for hackers to gain unauthorized access to our networks and our data. Yet most of us don't bother to take the simple step of PIN protecting our smartphones.

VoIP Veterans at ITEXPO Discuss Net Neutrality, Title II Reclassification
January 28, 2015 - 5:22 PM
We've been discussing net neutrality for many years. Recently, the debate over this controversial topic has begun heating up again.

OnRamp Founder Will Explore IT's Future at ITEXPO Miami
January 28, 2015 - 4:19 PM
The future is bright for IT, with powerful innovations hitting the market every day to offer companies a slew of new hosted and hybrid options. But with so much activity and attractive new services, it can be hard to predict which technology choices made now will be the smartest ones in the long run. Companies aren't just ensuring their security today-they're building business security for the future as well. Staying informed is a huge factor in sticking to a profitable strategy.

5 Reasons Why Right Brain Thinking is Driving Cloud and IT Decisions
January 28, 2015 - 12:50 PM
Have IT managers lost their minds? Or are they only using half their brains? And if so, which side are they using now? Which side may they be using more in 2015 and beyond?

Radware Integrates Platforms with Cisco Application-Centric Infrastructure
January 27, 2015 - 6:05 PM
Radware is known for its network load balancing and security software. As such, it has vested interest in the advancement of network infrastructures which can bridge the gap between platforms. Cisco, with its Application-Centric Infrastructure (ACI), attempts to do just that by creating an object-oriented networking layer which will provide a central point for virtual and physical resource management.

Making 'The Year of the Retail Breach' a Thing of the Past
January 26, 2015 - 2:04 PM
The steadily increasing frequency of data breach occurrences in 2014 has been both astounding and worrisome. From Target and Neiman Marcus to Michaels, Chick-fil-A and Home Depot, fraudsters are leaving no stone unturned, and the millions of customers unlucky enough to use infected point of sale (POS) machines at these retailers now need to worry about whether their sensitive information has fallen into the wrong hands.

Stealth Mode: Lying in Wait inside the White House's Network
January 26, 2015 - 1:52 PM
Recent data breaches involved an unclassified computer network used by President Obama's senior staff, prompting countermeasures by the administration resulting in temporary system outages. Officials said the attack did not appear to be aimed at destruction of either data or hardware, or assuming control of other systems at the White House, which poses the question - what were the hackers looking for?

Software Analysis and Measurement is a Critical but Often Overlooked Component of Development
January 26, 2015 - 12:54 PM
The value and importance of big data analytics is becoming a game changer as organizations look for new ways to gain intelligence and actionable insight from the vast amounts of data they generate. But rarely is any sort of in-depth analysis of software conducted, which is interesting, considering this type of assessment offers valuable information about quality, risk, security and other important factors.

NetMotion Announces Self-Diagnosing VPN Software
January 22, 2015 - 5:34 PM
It is essential for enterprises to support their operations with networks that are consistent in their reliability and speed - wasted seconds due to downtime translates directly to a loss of revenue. A network that can diagnose its own problems may seem out of reach, but the latest announcement from NetMotion, a developer of mobility management software, says it has done just that.

The New IP: Building a Virtually Unstoppable Workspace
January 21, 2015 - 9:28 AM
Whether you run your own business, or simply work for one, chances are you will be very familiar with the advantages - and challenges - of flexible working. In the Middle East, we are beginning to see a trend of employees working part-time or in flexible full-time roles and in future this is only going to increase. Businesses are therefore increasingly under pressure to take action and make sure they have the technology and processes in place to meet these employee demands.

Canadian Cyber Security Firm VPNWise Offers Smart DNS and VPN Services Under One Roof
January 19, 2015 - 10:58 AM
Like other Smart DNS services, bypasses geographic restrictions and enables access to hundreds of channels worldwide, allowing users to surf the Internet through proxy servers - anonymously and safely.

Keeping Up with the 24x7 Pace of Social Media for Business with Always-On Cloud Encryption
January 16, 2015 - 6:49 PM
Social media for business is a 24x7 flow of information and conversations. The world of social media today is well beyond its consumer beginnings, and is now heavily used by businesses. Most marketing departments will tell you they set aside resources, budget, and planning time to leverage this constant wave of information and influence.

Help! My Network is Congested
January 14, 2015 - 4:18 PM
You already know what's happening. With the explosion of broadband usage and online video, and especially streaming video from over-the-top (OTT) services like Netflix and YouTube, broadband service providers' networks are heavily tapped.

Meet the New InfiniBand - the Data Center's Best Friend
January 14, 2015 - 1:01 PM
NASA scientists created visco-elastic polyurethane foam to cushion astronauts' re-entry into Earth's atmosphere; when the patent was released to the public, it became Tempur-Pedic mattress foam. Teflon was first used in artillery shell fuses and in the production of nuclear material for the Manhattan Project before it became the standard for nonstick pans. The same principle of repurposing is emerging in the computing world as technologies from supercomputers find their way into data center architecture.

Top Security Risks in 2015 and How Middle East Organizations can Combat Them
January 14, 2015 - 9:12 AM
2014 brought with it slew of attacks of various types, 2015 could bring more sophisticated attacks with greater potential for causing harm. A10 Network's Glen Ogden outlines what to look for and how to provide proper protection.

New Year Resolutions for IT Security Professionals: The World Has Changed - Take Control
January 12, 2015 - 11:44 AM
We live in a different world than years ago. Most security professionals were content to have time to play with some logs, install a new Intrusion Prevention System, or get a sample of malware and try their hand at reversing. Generally though, most security professionals were relegated to a world of firewall administration, user authentication, and compliance (let alone the value-add security documentation that goes along with that…). As we've continued to see, times have changed and Chief Information Security Officers (CISO's) and their teams are expected to do considerably more now. The reality is that if you are CISO in today's world, you are on point to fight foreign military units and organized criminal enterprises.

Black Duck Software Makes Open Source Adoption Easier for the Enterprise
January 9, 2015 - 3:21 PM
Black Duck Software was recently named to the SD Times 100 for the seventh consecutive year. According to the press statement, Black Duck's OSS Logistics solutions help customers automate open source governance and compliance, continually monitoring for security vulnerabilities. The solution automates processes needed to manage the flow of open source throughout the enterprise, allowing companies to gain systematic control over how they acquire, approve, scan, monitor, secure, inventory, and deliver open source code.

Centerity Simplifies IT Network Monitoring
January 8, 2015 - 2:42 PM
With any kind of communication, IT network monitoring is essential to keep systems stable and going around the clock without interruption. IT managers and CIOs are under daily pressure to keep company business systems going. They have to maintain 24/7 IT services to drive growth, keep their customers satisfied or defend market share.

Datawatch Helps Harness Data Visually for a Clearer Picture
January 8, 2015 - 9:24 AM
When it comes to business, what can be measured gets done, and this is perhaps the key factor in why analyzing data leads to better performance by those organizations who religiously implement it. From healthcare to technology to retail, it is the data mined and analyzed that indicates the path of least resistance to success.

Gearing Up for ITEXPO with CGI's VP
January 8, 2015 - 6:00 AM
In true ITEXPO form, TMC has gathered industry thought leaders from around the globe to collaborate, share and learn about all the current trends as well as those expected down the road. Three weeks away from ITEXPO, CGI's VP of Global Communications Sector, Mobility & IoT Rene Sotola allowed TMC to pick his brain on Net Neutrality, mobility, WebRTC and much more.

Weaponizing Incident Response
January 6, 2015 - 10:57 AM
Cybersecurity solutions that reduce detection, response and recovery times are critical, but complex. That's because they require a variety of incident analysis and management tools that are automated, tightly integrated and, ideally, managed from a central command. Few companies have the time or expertise required to implement and run such a well-integrated, comprehensive cybersecurity program. Those companies that succeed find their implementation severely hindered by inadequate integration options and cross-platform incompatibilities.

Tech Trends 2015: Cloud-Based Communications and the Consumerization of IT
December 30, 2014 - 4:00 PM
Mobile computing, social media, and "the cloud" were once foreign concepts to most people. But today these technologies are fundamental to how we live, work, and play. So what's next? What new technologies will take the business world by storm in the coming year?

Are Firms Finally Moving Email to the Cloud?
December 30, 2014 - 10:39 AM
The reports of email's demise have been greatly exaggerated. For all the social media platform, unified communications offerings and other ways that people can communicate in 2015, email is still one of the most used and most basic.

MetricStream Makes 2015 Predictions
December 30, 2014 - 6:00 AM
As 2014 comes to an end, it is important that we reflect on trends and lessons learned in the past year, as well as anticipate what's ahead in 2015. There are several trends that captured our attention at MetricStream.

Cybersecurity Prevention Tips
December 29, 2014 - 1:06 PM
Looking back at the Sony Pictures Entertainment (SPE) attack, we must realize that now is the time, more than ever to take a more proactive approach to cybersecurity to prevent what happened to SPE from happening to your organization.

Xorcom: Productivity, Progress and Possibilities
December 29, 2014 - 12:37 PM
With the inevitable end of 2014 a few days away and ITEXPO just a few weeks away, Xorcom's CEO and Co-founder Eran Gal discussed apps, security, business communications an much more with TMC. Gal leaves little doubt as to why the Xorcom booth at ITEXPO will be a must stop at the upcoming industry event.

Greater Protection, Greater Revenue: Security as a Service for Hosting Providers
December 23, 2014 - 2:16 PM
According to the Identity Theft Resource Center, there had already been 744 data breaches and over 81 million recorders were exposed in the U.S. by Dec. of 2014, an increase of 24.8 percent over the same period last year. A 2013 survey conducted by the National Small Business Association found that 78 percent of organizations have experienced at least one data breach over the last two years. Not to mention the many high-profile security breaches that the big-name brands suffered in 2014, including Google.

Reflecting on 2014, Looking Ahead to 2015
December 23, 2014 - 11:58 AM
It is confirmed: 2014 has been a great year for Red Hat. Yesterday, we announced third quarter results of our fiscal year 2015 and, with that, celebrated our 51st consecutive quarter of revenue growth - more than 12 years of consecutive revenue growth. Thank you to the team of Red Hat customers, partners, open source contributors, and associates around the world, for helping us propel Red Hat to new heights. While 2014 has been a fantastic year for Red Hat, it has also been a banner year for open source.

Wheelings & Dealings: Carbonite to Acquire MailStore
December 22, 2014 - 3:14 PM
Data backup and recovery specialist Carbonite is beefing up its small and midsize business (SMB) proposition with the acquisition of MailStore, which is known for its email archiving capabilities, including full-text search and indexing capabilities.

EdgeWave Gains $2 Million from Additional Series A Funding
December 22, 2014 - 3:11 PM
EdgeWave, a San Diego-based cyber security firm, recently announced that it has closed $2 million in additional Series A equity funding. This round of financing, which was supplied by three investors, brings the company's total 2014 equity funding to $8 million.

Four Truths CIOs and CMOs Must Realize to Work in Harmony
December 22, 2014 - 6:00 AM
There is no doubt that marketing has risen in prominence. The rise of the internet has driven new behaviors in the customer base. In the B2B world, every buying center will research information online and it is the job of marketing to entice those buyers and bring them into their environment. Strategically, marketing are now the conduit for all business - yes, I did say "all" business. Tactically, this means driving inbound marketing programs, proactively working with sales on outbound initiatives and raising the brand of the company.

2015: A Strategic Year for Data Centers
December 22, 2014 - 6:00 AM
This past year has been one of tremendous innovation. With the Internet of Things growing at an exponential rate, new data streams are constantly being created to unlock significant value for both the technology companies that must evolve to stay ahead of the curve - but also their customers whose lives and businesses benefit from these new products and services.

Got Bots?
December 19, 2014 - 6:19 PM
Distil Networks had the opportunity to work with Peter Bernstein, Senior Editor at TMCNet, on a webinar discussing the problems posed by growing armies of bots and botnets. Peter's extensive experience in networking and communications, combined with Distil Networks' CEO Rami Essaid's expertise in the world of bots, made for a fascinating and enlightening hour.

New Nebula Solution Helps Enterprises Expedite OpenStack Adoption
December 19, 2014 - 3:30 PM
Nebula provides solution to enable the implementation of OpenStack solutions to go faster and smoother.

A Holiday Hunting We Will Go
December 18, 2014 - 9:38 AM
Cybercriminals fully realize that companies tend to be minimally staffed during the holidays. Rather than let the calendar year end on a sour note, I suggest your organization be proactive this year and spend time hunting for adversaries rather than sitting back and hoping your threat feed, MSSP or other mechanisms will lead to you catching something.

Improve Prevention? Or Default to Detection and Response?
December 16, 2014 - 4:13 PM
In today's hyper-connected world prevention is hard. Security chiefs find their perimeters constantly assaulted and too often breached. When that happens, there had better be a strong detection framework in place, so that culprits can't explore, corrupt, and download at their leisure, and a strong response framework to limit the reputational and economic damage.

The Network is Dead. Long Live the Network!
December 16, 2014 - 10:58 AM
The Internet permeates our lives, a complex global TCP/IP network that we take for granted whether we use it for shopping, research, or watching funny cat videos.

Put the Insider Threat in Your Sights
December 15, 2014 - 2:08 PM
With the seemingly endless barrage of high-profile hacks and data breaches, it can be easy to lose track of the insider threat hiding right under our noses. Regardless of how well we secure our assets from outside parties, we ultimately need to give access to our employees, contractors and partners in order for them to do their jobs. Misuse of this privileged access, whether through data theft or damage, is an unfortunate, yet inherent risk of doing business for most organizations.

Identity Theft and Medical Theft in the Workplace
December 15, 2014 - 8:07 AM
Medical theft is defined as, falsifying a victim's medical record with information from the perpetrator and crime. One major reason for medical theft is that it provides the criminals the necessary information to move forward and commit identity theft. Identity theft is when one person assumes another's identity and under false pretenses performs acts or makes purchases.

Tech Market in 2015 Ruled by Six C Principles
December 12, 2014 - 9:54 AM
It may be hard to believe, but there are already signs the tech market in 2015 will come to be dominated by a handful of core principles, all beginning with the letter C. That's a strange confluence of circumstances, but if a new report from 451 Research is right, we're about to all be C students in the very near future as just six C's rule the tech marketplace. Specifically, the six C's in question are containers, convergence, cloud security, closets, crowd workers, and coexistence-six C's that mean more to the market than some may anticipate.

Comings & Goings: Carbonite Names New CEO
December 12, 2014 - 9:51 AM
The online backup firm known as Carbonite announced late last week that it has a new CEO. Mohamad Ali is taking over effective immediately, succeeding former CEO David Friend. Friend is not leaving the Boston-based company completely as he will remain the executive chairman of the board of directors. He will also serve in an advisory role with the firm on a number of strategic endeavors Carbonite feels are important to its future.

2014's Tech Nightmares: From Sony Hack to iCloud Nudes
December 10, 2014 - 12:40 PM
There was little doubt that 2014 was a huge year for technology. Plenty of things happened, plenty of developments arrived, plenty of exciting new concepts were advanced. Some came to fruition, others did not. But in a field so thick with advances, there must too be some drawbacks. Into each life some rain must fall, as the old song once said, and the tech sector was no different. Continuum recently compiled a list of the 12 biggest disasters in information technology (IT) for 2014, and it was a list fraught with horrors many would rather be forgotten.

Disaster Recovery Gets a Little Easier for CenturyLink with DataGardens Acquisition
December 9, 2014 - 12:18 PM
There was once a Dilbert strip about disaster recovery, in which Alice revealed that the plan for disaster recovery involved a lot of running around and screaming. Alice further expressed the hope that, one day, the disaster recovery team would have a budget. We've come a long way since those days, of course, and now, disaster recovery is something businesses take seriously. For all the proof that could be asked for, just take a look at CenturyLink, who recently purchased DataGardens in a bid to drive its disaster recovery portfolio.

Why an SSL Certificate is Important to Google
December 9, 2014 - 11:21 AM
Internet security is something that should concern everyone, whether they are end-users, website owners or service providers.

2015 Cloud Predictions
December 9, 2014 - 10:49 AM
Now that cloud services have become part of IT's "new normal", commonly referred to as "Hybrid", it seems obvious that the approaches and tools we use to manage IT would also evolve and mature, though the pace of evolution varies amongst companies, of course. According to a Website Magazine article quoting a Gartner survey, more than 55 percent of CIOs indicate they would host all critical apps in the cloud by 2020. Cloud services use cases can vary greatly, but often hold common themes around converting traditional application to SaaS, or adding disaster recovery to your existing datacenter with RaaS.

Data Centers in the Crosshairs: Today's Most Dangerous Security Threats
December 8, 2014 - 10:51 AM
Every day attackers conspire to take down applications and steal data, leaving your data center infrastructure in the crosshairs. Storing the most valuable and most visible assets in your organization - your Web, DNS, database, and email servers - data centers have become the number one target of cyber criminals, hacktivists and state-sponsored attackers.

Top 5 Security Predictions for 2015
December 4, 2014 - 5:55 PM
Looking back on 2014, the two major themes that dominated security headlines were large-scale retail breaches and vulnerabilities in widely used software libraries. So, what cybersecurity bombshells are in store for us in 2015?

New York's New Chief Information Officer Offers Huge IT Background
December 4, 2014 - 12:19 PM
The state of New York recently made a roster move, bringing in a new chief information officer with a particular focus on overseeing the state government's computer operations. Maggie Miller, the state's new chief of information technology (IT), comes to the position with a substantial amount of experience in both private sector and public sector IT operations, making her a terrific replacement for outgoing chief Brian Digman.

Three Reasons Why Infrastructure-as-a-Service is Taking Off
December 2, 2014 - 9:20 AM
Infrastructure-as-a-Service (IaaS) is one of the fastest growing service models of cloud computing because it is an easy-to-handle, pay-as-you-grow business plan that focuses on the OpEx model and maximizes the ROI.

2015 Cloud Security Predictions
December 1, 2014 - 12:26 PM
If 2014 was the year of the cloud, 2015 is shaping up to be the year of cloud security. On the heels of some of the largest data breaches in history in 2014, organizations are doubling down and security is gaining board room visibility. Enterprise have spent the past few years building out private and hybrid cloud infrastructure to gain agility and improve ROI. Only now are internal auditors, risk and compliance officers and regulators recognizing that with new technology comes new risk.

Proximus Chooses Italtel to Deploy Upgrade to IP-based Network
November 26, 2014 - 2:28 PM
Proximus, a global telecommunications company, has announced its selection of Italtel, a leader of generation networks, value-added services and global IP-IP communication, to decommission its legacy fixed switched network in favor of a next generation network.

Key Pillars of Incident Resolution in Network and IT Operation Centers
November 25, 2014 - 12:46 PM
Large network and IT operation centers handle hundreds to thousands of incidents daily. Many of these incidents even impact the quality of service offered to customers and affect revenue and customer loyalty. It is imperative for these operations centers to have a robust software tools strategy to quickly and cost-effectively handle the resolution of these incidents. Despite trying numerous approaches like knowledge management and automation, these operations centers struggle to find a satisfactory approach to incident resolution.

Companies Have Good Reasons to Fear Data Migration
November 21, 2014 - 2:20 PM
I visited my dentist this morning for my regular cleaning and there was an air of excitement and nervousness throughout the office. While the practice is relatively small, both my dentist and hygienist were worried about an upcoming data migration that is happening this weekend as the office moves to updated IT equipment.

Radware Announces an Always on DDoS Mitigation Service
November 20, 2014 - 10:57 AM
The data breaches that cost Target and Home Depot tens of millions of dollars in losses as well as the personal information of more than 100 million customers is the extent to which the vast majority of people know about cyberattacks. But countless number of Distributed Denial of Service (DDoS) attacks go without making the headlines every single year, even though they cause just as much or more damage to businesses around the world.

Nimbix Extends JARVICE to Support Hybrid Cloud Implementations
November 17, 2014 - 4:50 PM
Cloud technology now provides virtually every component of information and communication technology (ICT) by allowing organizations access to enterprise grade applications, infrastructure, platforms, security and more at very affordable price points. This has introduced a level of flexibility and scalability that has resulted in exceptional growth for startups, SMBs and enterprises. The one concern that still continues to distress CIOs regarding cloud technology is security, but it is quickly being a non-issue as robust hybrid cloud solutions make it possible for enterprises to have a customer facing front-end while their existing data centers remain private.

State Department's Unclassified Network Goes Dark after Potential Hacking
November 17, 2014 - 10:35 AM
There's been no shortage of news about hacking efforts over the last several months, with companies like The Home Depot and a variety of others weighing in that networks have been compromised, information potentially taken, and so on. That hacking has even reached the United States government, and now the State Department joins in the chorus of those impacted. But the agency has let no grass grow beneath its feet, and has taken steps to secure its electronic borders.

Brocade Adds Aruba Technology to Acclaimed Subscription Program
November 13, 2014 - 5:34 PM
Brocade has entered an agreement with Aruba Networks to offer the latter company's wireless networking technology as part of the Brocade Network Subscription program. The two-year-old initiative offers networking technology to customers on a pay-as-you-go basis, granting businesses access to the solutions they need with maximum flexibility and scalability but minimal upfront costs. The addition of Aruba Networks' technology will likely expand Brocade's customer base to businesses who may have not considered it previously.

Industry Collaboration Drives 100G Foundation for Supercomputer Infrastructure
November 13, 2014 - 1:16 PM
Supercomputers were first introduced in the 1960s, and were considered to be at the frontline of process capacity and calculation speed. While the supercomputers of the 1970s used only a few processors, in the 1990s machines with thousands of processors began to appear. By the end of the 20th century, massively parallel supercomputers with tens of thousands of "off-the-shelf" processors were being used.

Making the Cloud Feel Local
November 12, 2014 - 7:10 AM
What workloads? The applications utilized everyday by businesses globally-email, document sharing and storage, collaboration, ERP, CRM, and more. These critical workloads will crush businesses if they aren't secure, available, and resilient.

Study: Certified Workstation Market Strong in Q3
November 11, 2014 - 11:43 AM
A new report by industry analyst IDC says that the certified workstation market is alive and growing. IDC's report said that the certified workstation market is actually showing some real momentum in 2014 with the third quarter of this year up 7.6 percent over the same period from a year ago. IDC points out this marks the sixth straight quarter this particular market has seen positive growth. The company did point out that the growth rate in the third quarter was slightly slowed compared to the previous quarter, which saw growth in the market of 12 percent.

How the Evolution of Power Has Become More Efficient
November 11, 2014 - 7:36 AM
Traditionally, data center power distribution models involve multiple (and inefficient) voltage power conversions between the electric utility and the server. Distribution transformers, uninterruptible power supply (UPS) systems and power distribution units (PDU) all introduce AC (alternating current) to DC (direct current) conversions and voltage transformations in the power chain, oftentimes resulting in wasted energy. The typical distribution model can include a:

The Lessons of Heartbleed and Shellshock
November 5, 2014 - 4:05 PM
By now, the Heartbleed vulnerability is old news. We heard about it last April along with how to fix the problem. So why should we still talk about it? Didn't everyone fix the problem and move on? If only it were that simple. Now that Shellshock - a similar but possibly more insidious vulnerability - has been identified, the industry must revisit the past to learn critical lessons on how to go forward.

Vectra Networks Report Reveals What Attackers Do Once Bypassing Perimeter Defenses
November 5, 2014 - 9:15 AM
The headlines are filled with a now constant drumbeat of data breaches. Post mortems on such events tend to focus on who was responsible, how long it took to discover and remediate the situation and how they accomplished their exploit. What typically does not get covered is what happens once the bad guys bypass your perimeter, i.e., can go undetected.

Cloud Players Position for Ongoing Increase in Public IT Cloud Services Spending
November 3, 2014 - 4:19 PM
Public IT cloud services spending this year should hit the $56.6 billion mark, with software as a service representing 70 percent of that. It is forecasted that by 2018 public IT cloud services spending is likely to grow to at least $127 billion.

DNS Based DDoS Attacks- What's in a Name?
November 3, 2014 - 2:19 PM
Recent press has shown a marked increase in DDoS attacks on ISPs around the world. According to Network World, DDoS attackers seem to have switched their attention from banks to gaming hosts, ISPs and even enterprises. At Infoblox our customers have been telling us the same thing, as DDoS attacks have intensified among our ISP customers. Initially everything was lumped together under the 'DDoS' heading. Then they became known as 'NXDomain' attacks, but as we sifted through the PCAP files of the actual attacks across different customers in different regions, a number of unique patterns emerged.

Skyera's skyHawk FS Packs Hefty Flash Storage
October 31, 2014 - 3:29 PM
It's been one of the biggest issues of personal preference since Coke took on Pepsi: hard drives or solid state drives? While the hard drive camp has a good point in that hard drives offer up huge amounts of storage for a minimum of expense, the solid state drive camp's focus on reliability and speed has its own points to consider. But even solid state these days is starting to really drive up the capacity, as seen in Skyera's new skyHawk FS, which fits a hefty slug of flash storage in one surprisingly handy package.

Security in the Cloud: How Hackers Are Going to Get Your Encryption Keys
October 30, 2014 - 4:28 PM
It has been well-studied, documented, and reported that our greatest concern with regard to acceptance of and migration to cloud computing is security. In 2014's "The Future of Cloud Computing" Survey, 49 percent of respondents cited security as an inhibitor to cloud adoption. And, trailing not far behind on the scale of inhibitors are privacy and regulatory compliance, with over 30 percent each.

Hewlett-Packard Looking to Sell Chinese Networking Branch
October 30, 2014 - 7:52 AM
Hewlett-Packard has slowly and surely been trying to reduce the scope of business when it comes to its central operations. Earlier this year, the firm announced it was basically spinning off its printers and PC ventures. Now there are numerous reports indicating the firm has begun talks with several private equity firms with the end goal being to sell its enterprise networking business to a Chinese purchaser.

HTML5 Standard Finalized After Years of Squabbling
October 29, 2014 - 4:35 PM
The World Wide Web Consortium (W3C) published its Recommendation of HTML5 on Tuesday, the fifth major revision of the format and cornerstone of the Open Web Platform. This is the first revision in a very long time, since the publishing of HTML4 specifications in 1997. With HTML5 developers can employ the latest improvements to the format and build cross-platform, feature-rich applications.

Blue Box Keeps its Promise with a Private Cloud for the Masses
October 29, 2014 - 4:16 PM
Jesse Proudman, founder and CTO of Blue Box, had a simple but grand vision: deploy a private cloud anywhere in the world in under an hour. In just five months, the company appears to be well on the way there and states that it has built "unbelievable momentum."

Bradford Augments Partnership with FireEye to Restrain Advanced Network Threats
October 29, 2014 - 9:21 AM
In the information age, wired and wireless networks are vulnerable to security threats. Making them hacker-proof is a horrendous task. Hence, it is essential for organizations to detect and contain advanced threats, including compromised endpoints, by combining advanced treat intelligence and rapid threat response.

Hitachi: Get More Control, Flexibility and Security in the Cloud
October 29, 2014 - 8:03 AM
Seeking to move away from the traditional delivery model and reap the many advantages of the cloud, many organizations are moving either to a private cloud or a combination of clouds- the hybrid cloud. Hitachi Data Systems Corporation (HDS), poised on the threshold of something big, is set to expand flexibility and control for the cloud.

Wheelings & Dealings: BigPanda Launches SaaS IT Incident Management Platform in Tandem with $7 Million Funding Round
October 28, 2014 - 6:37 PM
Upstart BigPanda, which is dedicated to managing IT issues in the data center, has scored $7 million in Series A funding. The funds come at an opportune time, as the company just launched its first data science platform for automated IT incident management. The new funding round will be used to grow the company and expand its development roadmap.


Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter