At the expense of legacy data centers focused on applications, many IT organizations are joining the recent bandwagon headed for virtualization and enticing cloud offerings like ITaaS (IT as a service) that have taken center stage in current technology...
If your business success relies much on networked IT resources, it’s good to consider virtualization. With virtualization you can abstract applications and as well as their related components away from the supporting hardware, and you can get a virtual (logical)...
These days there’s much talk in IT circles about big data. No, it’s not a new phenomenon taking the world by storm. Neither is it about data having morphed into something so huge that the earth may no longer be enough to contain it. Rather, it’s more of super...
Yes, you read it right. Whaling. And it’s different from whale fishing, the controversial business of catching whales for profit taking place in certain parts of the world. And speaking of fishing, this brings to mind the homophonic term phishing that has become...
Distributed denial of service (DDoS) is a type security threat wherein one individual or group — the attacker — intentionally and maliciously lets loose extremely high volumes of Internet traffic into the computer network resources of another — the victim — in order...
Cisco Systems, a frontrunner in routing and other network technologies, recently set its sights on a big move: to invest about one billion US dollars over a two-year period for a cloud computing network with a global reach. The anticipated result of this move is to...