How to Get Started with Software-Defined Storage
In the previous post, we explained software-defined storage (SDS) and why the SDS storage model is gaining traction. With SDS, control is separated from hardware, and storage infrastructure is...
View ArticleMaking VDI on Hyper-V Easier
Microsoft Hyper-V is a growing force in the virtualization market. According to IDC estimates, Hyper-V accounted for one-third of x86 hypervisor deployments in 2014. Microsoft’s solution has become...
View ArticleWhy Hyper-Converged Infrastructure Is Driving VDI
At VMworld 2014, VMware introduced EVO:RAIL, a hyper-converged infrastructure appliance that enables hardware vendors to build all-in-one, hyper-converged solutions using VMware products. VMware...
View ArticleThe Pros and Cons of Application Containers
At the recent DockerCon event in San Francisco, competitors Docker and CoreOS joined forces to announce the launch of the Open Container Project (OCP). The goal of this initiative, which is being...
View ArticleIs ‘Cloud Native’ the Future of IT?
In our last post we talked about the Open Container Project and the growing effort to develop industry standards for application containers. Application containers take disparate software components...
View ArticleWhat the New E-Rate Rules Mean for K-12 IT
As the new school year opens, many K-12 districts are anticipating funding for technology projects from the federal E-Rate program. Officially known as the Schools and Libraries Program, E-Rate...
View ArticleMaking Wi-Fi Networks as Fast as Wired LANs
A wireless network was once a “nice-to-have” technology that companies set up in the conference room for executives with laptops. No longer. Organizations of all sizes have come to rely upon their...
View ArticlePreparing for Migration to the 802.11ac Wi-Fi Standard
In our last post we discussed the critical importance of Wi-Fi in today’s IT environment. Once considered a convenience, the wireless network now viewed as a strategic business asset that provides...
View ArticleCyber Threat Assessment: A Crucial First Step to Improving Security
The U.S. Security and Exchange Commission (SEC) Office of Compliance Inspections and Examinations issued a risk alert that provides guidance about examining and improving cybersecurity in the financial...
View ArticleHow Big Data Security Analytics Is Transforming Enterprise Security
In our last post we discussed the importance of cyber threat assessments in developing a security strategy. Sequel performs such assessments using Fortinet’s FortiGate next-gen firewall and...
View ArticleVirtualization Security Could Be a Bigger Problem than You Think
Most companies move forward with virtualization initiatives because virtualization can reduce costs, improve efficiency and simplify management. However, the cost of a security breach in a virtualized...
View ArticleHow Micro-Virtualization Raises the Security Bar
Microsoft recently announced that it is partnering with Bromium, a firm that specializes in data breach prevention through threat isolation, to enhance the security of its new Windows 10 operating...
View ArticleFall 2015 Newsletter
In this issue… Mission-Critical Cloud Better Backup Old Reliable Sounds Phishy Fall 2015 Newsletter
View ArticleWhy Perimeter-Focused Firewalls Are No Longer Enough
In most cases, today’s hackers aren’t looking to crash hard drives and petrify users with the blue screen of death. The vast majority of cybercriminals have two goals – steal your data and sell your...
View ArticleUnderstanding the Risk of Insider Threats
It’s late on a Friday afternoon, but you’d really like to finish up that important project you’ve been assigned. Being the dutiful, conscientious and hard-working employee you are, you simply email...
View ArticleUnderstanding Storage Requirements for Docker Containers
In a previous post, we discussed how the Docker open-source, container-based cloud platform, despite being introduced less than three years ago, has already become a viable option for many...
View ArticleThe Growing Role of Big Data in Crime Prevention
Law enforcement agencies are under the same pressure as any other government agency. Improve operational efficiency and deliver better services – and do these things with smaller headcounts. Like a...
View ArticleThe Business Benefits of Convergence for SMBs
Many small to midsize businesses (SMBs) have enterprise-class technology needs but lack the budget and skill sets to build and maintain such complex IT infrastructure. The 2015 State of SMB IT...
View ArticleA Better Way to Manage Service Contracts
There’s no doubt that your organization has multiple servers, storage devices, switches, appliances … and service contracts. Who knew there could be so many contracts, warranty periods and expiration...
View ArticleWinter 2013 Newsletter
Taking IT Procurement off the Balance Sheet SMBs are beginning to realize the benefits of document management solutions Mobile VoIP Can Help Organizations Overcome ‘Bill Shock’ Faster, Cooler Storage...
View Article
More Pages to Explore .....