Enterprise IT Sales: Rules of Acquisition

Being successful in IT Infrastructure Sales is tough. It helps to have a few simple rules to follow to make sure to keep your manufacturers happy and sales flowing.   #1: The right solution is always the latest and greatest Continue reading Enterprise IT Sales: Rules of Acquisition

What is fog computing? Connecting the cloud to things

Fog computing is the concept of a network fabric that stretches from the outer edges of where data is created to where it will eventually be stored, whether that’s in the cloud or in a customer’s data center. Fog is Continue reading What is fog computing? Connecting the cloud to things

Testing RFID IoT devices for enterprise deployment

Legacy manual and barcode systems are still in widespread use, but many organizations are turning to the internet of things, specifically RFID tags, to streamline asset tracking in the data center. It’s important to test these devices before deploying, and Continue reading Testing RFID IoT devices for enterprise deployment

Veeam spends $43m to boost AWS backup & data recovery software

Add to favorites Veeam will utilise N2WS’ integrate data protection knowledge on AWS workloads for its Availability Platform. Veeam has struck a takeover deal to boost its cloud-centred enterprise availability for AWS workloads. Veeam shook hands on a $42.5m all-cash Continue reading Veeam spends $43m to boost AWS backup & data recovery software

Response: The Five Stages of Cloud Grief

Michelle Chubrika talks about the experiences/perils of enterprise cloud migration based on her experiences: One of the main obstacles to migration is emotional and can derail a cloud strategy faster than any technical roadblock. This is because our organizations are Continue reading Response: The Five Stages of Cloud Grief

What is Zero Trust? A model for more effective security

The Zero Trust Network, or Zero Trust Architecture, model was created in 2010 by John Kindervag, who at the time was a principal analyst at Forrester Research Inc. Now, seven years later, CIOs, CISOs and other corporate executives are increasingly Continue reading What is Zero Trust? A model for more effective security

Wi-Fi Alliance announces WPA3 to secure modern networks

The Consumer Electronics Show (CES) is an odd place to announce an enterprise product, but the Wi-Fi Alliance used the massive trade show — which has more or less taken over where Comdex left off — to announce a major Continue reading Wi-Fi Alliance announces WPA3 to secure modern networks

Endace Releases New Packet Capture Appliance For Branch Offices

Endace, which makes packet capture appliances for network forensics, troubleshooting, security, and performance monitoring, has released a new box for branch offices. The EP-124 Network Analytics Platform is a 1RU appliance with four 1/10GbE links or one 40GbE link. It Continue reading Endace Releases New Packet Capture Appliance For Branch Offices