Quantcast
Channel: Sequel Data
Browsing all 182 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How to Get Started with Software-Defined Storage

In the previous post, we explained software-defined storage (SDS) and why the SDS storage model is gaining traction. With SDS, control is separated from hardware, and storage infrastructure is...

View Article



Image may be NSFW.
Clik here to view.

Making VDI on Hyper-V Easier

Microsoft Hyper-V is a growing force in the virtualization market. According to IDC estimates, Hyper-V accounted for one-third of x86 hypervisor deployments in 2014. Microsoft’s solution has become...

View Article

Image may be NSFW.
Clik here to view.

Why Hyper-Converged Infrastructure Is Driving VDI

At VMworld 2014, VMware introduced EVO:RAIL, a hyper-converged infrastructure appliance that enables hardware vendors to build all-in-one, hyper-converged solutions using VMware products. VMware...

View Article

Image may be NSFW.
Clik here to view.

The Pros and Cons of Application Containers

At the recent DockerCon event in San Francisco, competitors Docker and CoreOS joined forces to announce the launch of the Open Container Project (OCP). The goal of this initiative, which is being...

View Article

Image may be NSFW.
Clik here to view.

Is ‘Cloud Native’ the Future of IT?

In our last post we talked about the Open Container Project and the growing effort to develop industry standards for application containers. Application containers take disparate software components...

View Article


Image may be NSFW.
Clik here to view.

What the New E-Rate Rules Mean for K-12 IT

As the new school year opens, many K-12 districts are anticipating funding for technology projects from the federal E-Rate program. Officially known as the Schools and Libraries Program, E-Rate...

View Article

Image may be NSFW.
Clik here to view.

Making Wi-Fi Networks as Fast as Wired LANs

A wireless network was once a “nice-to-have” technology that companies set up in the conference room for executives with laptops. No longer. Organizations of all sizes have come to rely upon their...

View Article

Image may be NSFW.
Clik here to view.

Preparing for Migration to the 802.11ac Wi-Fi Standard

In our last post we discussed the critical importance of Wi-Fi in today’s IT environment. Once considered a convenience, the wireless network now viewed as a strategic business asset that provides...

View Article


Image may be NSFW.
Clik here to view.

Cyber Threat Assessment: A Crucial First Step to Improving Security

The U.S. Security and Exchange Commission (SEC) Office of Compliance Inspections and Examinations issued a risk alert that provides guidance about examining and improving cybersecurity in the financial...

View Article


Image may be NSFW.
Clik here to view.

How Big Data Security Analytics Is Transforming Enterprise Security

In our last post we discussed the importance of cyber threat assessments in developing a security strategy. Sequel performs such assessments using Fortinet’s FortiGate next-gen firewall and...

View Article

Image may be NSFW.
Clik here to view.

Virtualization Security Could Be a Bigger Problem than You Think

Most companies move forward with virtualization initiatives because virtualization can reduce costs, improve efficiency and simplify management. However, the cost of a security breach in a virtualized...

View Article

Image may be NSFW.
Clik here to view.

How Micro-Virtualization Raises the Security Bar

Microsoft recently announced that it is partnering with Bromium, a firm that specializes in data breach prevention through threat isolation, to enhance the security of its new Windows 10 operating...

View Article

Fall 2015 Newsletter

In this issue… Mission-Critical Cloud Better Backup Old Reliable Sounds Phishy Fall 2015 Newsletter

View Article


Image may be NSFW.
Clik here to view.

Why Perimeter-Focused Firewalls Are No Longer Enough

In most cases, today’s hackers aren’t looking to crash hard drives and petrify users with the blue screen of death. The vast majority of cybercriminals have two goals – steal your data and sell your...

View Article

Image may be NSFW.
Clik here to view.

Understanding the Risk of Insider Threats

It’s late on a Friday afternoon, but you’d really like to finish up that important project you’ve been assigned. Being the dutiful, conscientious and hard-working employee you are, you simply email...

View Article


Image may be NSFW.
Clik here to view.

Understanding Storage Requirements for Docker Containers

In a previous post, we discussed how the Docker open-source, container-based cloud platform, despite being introduced less than three years ago, has already become a viable option for many...

View Article

Image may be NSFW.
Clik here to view.

The Growing Role of Big Data in Crime Prevention

Law enforcement agencies are under the same pressure as any other government agency. Improve operational efficiency and deliver better services – and do these things with smaller headcounts. Like a...

View Article


Image may be NSFW.
Clik here to view.

The Business Benefits of Convergence for SMBs

Many small to midsize businesses (SMBs) have enterprise-class technology needs but lack the budget and skill sets to build and maintain such complex IT infrastructure. The 2015 State of SMB IT...

View Article

Image may be NSFW.
Clik here to view.

A Better Way to Manage Service Contracts

There’s no doubt that your organization has multiple servers, storage devices, switches, appliances … and service contracts. Who knew there could be so many contracts, warranty periods and expiration...

View Article

Winter 2013 Newsletter

Taking IT Procurement off the Balance Sheet SMBs are beginning to realize the benefits of document management solutions Mobile VoIP Can Help Organizations Overcome ‘Bill Shock’ Faster, Cooler Storage...

View Article
Browsing all 182 articles
Browse latest View live




Latest Images