Top 5 Trends in 2015 for Unifying PC and Mobile Management


Have you ever tried to create a major slide presentation on a tablet? Or edit a large spreadsheet? Or write a long document? Probably not. While it’s certainly possible to perform more substantial business tasks on a tablet, the small screen real estate and limited system resources (e.g., processing speed, memory, graphic support, etc.) are [...]



By | February 12th, 2015|IT Management, Steve Brasen, Systems Management|0 Comments

Flash or HDD for the Best Price/Performance?


Flash technology has proven to be a disruptive force in the storage marketplace. Server and network performance gains over the last decade have been substantial, but the hard drive performance needle has hardly moved. This situation has resulted in server utilization being reduced while waiting on storage input output (I/O) operations to be completed. Server [...]



By | January 9th, 2015|Jim Miller|0 Comments

Automating Change: The Key to Proactive IT Management


Reflecting on my earlier career in IT management, I have to confess to a level of astonishment at how naïve IT administrative practices were just a decade or two ago. Failure events were common, and most organizations just accepted as immutable fact the reality of systemic firefighting. IT services critical to business operations were all [...]



By | December 30th, 2014|IT Management, Steve Brasen, Systems Management|0 Comments

Service Automation: Key for Maximizing IT and Business Efficiency


The dual revolutions of consumerization and cloud have certainly caused much disruption within and around IT. And universally they have also increased the expectations of IT end users. IT-enabled workers and the lines of business they represent are looking for a fast response to new technology needs combined with high levels of service quality—all at [...]



By | December 10th, 2014|IT Management, Jim Frey, Network Management|0 Comments

Is EMV an Expensive Security Misstep for the Payments Industry?


There is no disagreement that the current mag-stripe technology used in the USA and other countries outside of the EU is antiquated and lends itself to fraud. The data is easily copied using various methods from manual card data copying and shoulder surfing, to database compromise and POS terminal malware.  Cards can be reproduced with [...]



By | December 8th, 2014|David Monahan, IT Management, Scott Crawford, Security|0 Comments

Innovation Explosion Sets the Stage for New Wave of “Hybrid” Applications


In the past, technology evolution was quantified as generational. So the first generation of computing was based on the vacuum tube, followed by the transistor, integrated circuits, and microprocessors. Even today, multi-generational software and hardware systems are very much alive in many modern data centers. The interesting thing about the generational approach is that it [...]



By | December 8th, 2014|IT Management, Julie Craig|0 Comments

Riverbed Tees Up for Hybrid Computing at 2014 FORCE User Conference


During the first week of November, Riverbed held its first combined OPNET and Riverbed user conference at the San Jose Convention Center. Held in tandem with the Riverbed industry analyst event, this conference was an opportunity for Riverbed to share with both customers and industry analysts the company’s vision for becoming the go-to vendor for [...]



By | December 2nd, 2014|IT Management, Network Management, Tracy Corbo|0 Comments
Load More Posts