by admin | Sep 9, 2014 | Storage
The excitement at VMWorld about DataGravity (VMWorld 2014 Best New Technology and Best In Show) has not worn off for many, while others may not yet be aware of the product. DataGravity is revolutionizing storage and data management by combining primary storage, data...
by admin | Aug 22, 2014 | Infrastructure
An often asked question: Is DCIM overkill for data centers that have less than 1000 square feet white space or those with connected power less than 500 KW? This question comes up because of a commonly held myth that DCIM is only about power savings. The argument here...
by admin | Aug 19, 2014 | Storage
DataGravity is officially launching today at VMworld. Sure to create buzz across the industry, DataGravity places itself in a unique market niche that can provide new capabilities to your organization. DataGravity unlocks the value of your data with data aware...
by admin | Aug 19, 2014 | Security
Many years ago when Internet fraud was in its infancy, I had a credit card number stolen online. This was in the mid 1990’s. It was used for numerous charges world-wide until I noticed it. While I hadn’t noticed the first few sub $100 charges, I did notice them when...
by admin | Aug 12, 2014 | Storage
“Software Defined Storage” is one of the latest buzz words in the industry, and everyone wants to jump on board. The term has been defined many ways, however the most standard definition is a storage solution that abstracts services from physical storage hardware....
by admin | Aug 8, 2014 | Networking
Erate is changing in 2015 dramatically. Here are some of the top things to know about the changes to erate, how it will affect you and how to prepare for it. Everyone needs to apply because there is money for everyone Recommended bandwidth levels per student for...
by admin | Aug 5, 2014 | Security
Writing security policy is a complicated task that should involve input from players from upper management, human resources, staff representatives, IT, physical security, legal, and marketing / public relations. In small businesses one person may take on multiple...
by admin | Aug 1, 2014 | Security
Businesses find themselves in many different stages of development when it comes to information technology and security. Smaller businesses may not have anyone on staff dedicated to IT or security. Those functions that go beyond basic computer knowledge that the...
by admin | Jul 29, 2014 | Security
Security issues continue to make headlines, but does your business care? Are you using the common arguments: We’re too small to be targeted. We have nothing worth stealing. Security is too expensive. It’s too difficult. We’re too small to be targeted: False. Everyone...
by admin | Jul 7, 2014 | Security
Hot off the press Apple is teaming up with IBM for an Enterprise push. This article speaks more like a business presentation report with the buzzword “verticals” mentioned over and over rather than providing insight into a true product that can benefit the...