Here, there and -- yes -- everywhere, <a href="http://www.computerworld.com/s/topic/210/Virtualization">virtualization</a> is headed toward ubiquity.
Stories by Beth Schultz
When you think about IT disciplines, bringing together infrastructure monitoring and service management makes good sense.
Year-old start-up company AppFirst is trying to shake up the way IT administrators think not only about application performance management but also server monitoring in general.
The drive to reduce costs, improve service delivery and enhance business competitiveness has become ingrained in the IT psyche. And this, in turn, means change within enterprise IT infrastructure and operations environments.
Not quite a year ago, Cisco, EMC and VMware joined together in a venture that integrated the respective vendor's Unified Computing System, storage and hypervisor into modular units called Vblock Infrastructure Packages. The goal, the trio said, was to accelerate deployment of virtualization and enable private cloud infrastructure.
With the license on his CA Spectrum eHealth performance management software reaching end of life at year-end 2010, Austin Radiological Association CIO Todd Thomas saw the perfect opportunity to shake things up a bit at this specialty healthcare provider serving central Texas.
Like a growing number of enterprise IT executives, Craig Baughn, vice president of hosting operations at Concur Technologies, a corporate travel and expense management company in Redmond, Wash., is carefully studying how to transition from a virtual environment to a private cloud.
Malicious hypervisors. Subversive virtual machines. Live migration impersonators. Welcome to the world of server virtualisation, where the threats are new and the traditional security tools like firewalls and intrusion-prevention systems don't cut it anymore.
Thanks to virtualization and a host of other technologies, storage has left its silo. Its performance affects the whole computing shebang. Fortunately, new technologies that cross the boundaries of storage, management and compliance are smoothing over performance issues and easing the pain (and expense).
Who needs steel when you’ve got storage? Not Pittsburgh resident Greg Ganger.
FRAMINGHAM (11/05/2003) - Industry statistics show that 80 percent of malicious attacks target Port 80, the Web traffic pass-through. Why, then, does the onus for Web application protection still fall largely on network-layer devices? Web applications clearly need special security.
FRAMINGHAM (09/24/2003) - 40G Ethernet, or beyond
Bob Knowling, CEO of upstart competitive local exchange carrier Covad Communications Co., likes to envision his phone company competitors as ugly old giants sleeping lazily on their front porches. And he's running like mad to give Covad some distance in the broadband Internet access race before those slumbering foes awake.
- Free Whitepaper! The 5 criteria to help you select the right analytics platform for your organization.
- Free Whitepaper! Learn how to create an analytics environment that is governed, scalable and self-serve.
- Free Whitepaper! Learn how IT is evolving from producer to enabler, and fostering collaboration around analytics.