Welcome!


Vol: 2 Iss: 4

Read Back Issues

Virtualization is arguably one of the most prominent 'buzz' technologies in the computing industry today - with more than $4.2 billion in reported deal values for M&A activity since December 2000. It's a key component in just about any next-generation architecture due to its ability to...
When my company was designing its data center, we had to make a choice: What kind of database storage system was going to be the backbone of our operations? As in most things IT, the options were seemingly endless, and there are many criteria to consider before investing time or money ...
The recent startling announcement that the SHA-1 hash function wasn't as secure as believed raised interesting questions in the world of one-time password technology, since the newly proposed HOTP algorithm is based on SHA-1: Should the industry standardize around a single one-time pas...
Much is being made about network attached storage (NAS) and storage area networks (SANs) as options for the high-volume data storage needs of modern enterprises. Yet when you look closely, these are not competing solutions, but rather complementary technologies that are best suited to ...
Managing the surge of file-based data has become increasingly difficult and complex. Virtualizing NAS through Network File Virtualization (NFV) simplifies storage management and enables administrators to easily address management and utilization challenges without affecting data access...
The financial and healthcare industries continue to face increasingly more stringent compliance requirements. Small and medium-sized enterprises (SMEs) are turning to business intelligence (BI) tools to help make sense of the mountains of data and to meet the stiff compliance regulatio...
Version upgrades from software, infrastructure, and security vendors give businesses the impression that their enterprises are protected from new threats ? but is it a false sense of security? The answer is yes if your security deployment doesn?t address the elements that comprise toda...
The operational impact of deployment is a primary inhibitor to the adoption of new technology in many companies.
With heightened security requirements since 9/11, airports have a major responsibility to distinguish and identify law-abiding travelers from wanted criminals and legitimate security threats. As millions of commuters, tourists, businessmen and women, and students fly across the globe e...
While e-mail may be a killer app, poorly archived e-mail can kill a business. During a recent prescription drug antitrust case, the plaintiff demanded a discovery search of 30 million pages of e-mail stored on the defendant?s backup tapes for names of particular individuals. The defend...
Adware and spyware - they may be as hard to define as they are to eradicate. But there's one thing just about everyone can agree on: what started as a minor annoyance has ballooned into a full-blown corporate headache.
Last month we skipped the introduction to summarize some of the things we hope to bring to you in the coming year. This month we are circling back to our backgrounds in the hopes that this will help explain why we might be suited to fulfill the agenda hinted at last month.