You are here


Symantec and VMware unveiled a strategic partnership to unify endpoint management and broader threat security. As part of the announcement at VMware's Connect 2016 conference in Atlanta, Symantec joined the VMware Mobile Security Alliance, a group of digital security companies that work to mitigate mobile threats by providing advanced security solutions that are seamlessly integrated into the VMware AirWatch Enterprise Mobility Management Platform

Read More

Virtualized IT environments — and the tools used to manage them — can provide unmatched flexibility and scalability, but they can also require skills that SMB IT staffs sometimes lack, says Cliff Grossner of IHS Markit.

To help smooth the learning curve, companies should ask these questions:

  • How much automation is built into the platform; that is, how much can the user do by simply dragging and dropping on a user-friendly interface?
  • How much of our work can the user do by setting up simple policies?
  • What capabilities does the tool or platform have without requiring new code or scripts?

Finally, organizations need to devote the time and resources necessary to train their IT staffs for this new environment, Grossner advises. “Building the skill set in the team is critical to managing virtualized resources,” he says. “Humans need to modify their processes and skills to use technology well.”

Read More

Until recently, Trimont Real Estate Advisors operated its own data center onsite. With a new headquarters in the company’s future, Raquel Brown, managing director of IT and security, was on the hunt to find a new infrastructure solution. At the same time, she had to increase redundancy and ensure performance wouldn’t suffer. Ultimately, she decided to work with a colocation provider.

“Trimont is an international company, so the ability to easily expand our data center footprint internationally as needed was important,” Brown explains. “Moving our data center had various benefits, but redundancy, in all aspects — connectivity, power, as well as physical ­security — was at the top of our list.”

The company’s disaster recovery plan evolved at the same time, and the cloud played a big part of it, she says.

Read More

Google says that a recently disclosed vulnerability to Android devices, known as QuadRooter, is not as dangerous as first thought. According to Google, a feature built into the Android operating itself blocks 90 percent of the potentially exposed devices from the vulnerability. 

According to ZDNet, researchers at security firm Check Point disclosed "four previously undisclosed security vulnerabilities found in Android phones and tablets that ship with Qualcomm chips could let a hacker take full control of an affected device." The vulnerability was said to affect more than 900 million devices. 

Read More

Form factor: Enterprises can choose from several types of cellular routers, including an embedded interface that's located inside an enterprise-grade router, an external add-on to an existing router and various types of stand-alone USB routers. Deciding which type to use depends on the application.

Speed: Buying a 4G LTE-compatible cellular router doesn't guarantee high-speed data rates. In many rural areas, users must settle for 3G or even slower service. In many remote locations, such as across vast areas of Southwestern deserts and Northern forests, cellular data service is simply unavailable.

Wi-Fi compatibility: Router models are often designed to work with both cellular and Wi-Fi networks. Besides saving space and reducing network complexity, many of these devices provide automatic failover/failback capabilities to support business continuity in the event of a wired service failure.

Read More

  1. Pinpoint pressing business problems: Retailers must identify specific pain points that can benefit from a predictive analysis, such as sagging sales or soaring shipping costs. Next, they should determine the exact questions that need to be answered, such as, “How will lowering the price of a widget by $5 affect sales in regions A, B and C?” or “How will adding $1 to a widget's shipping price affect sales during the next holiday season?”

  2. Manage the data: As the number of data sources multiplies, so does the challenge of effective data management. Retailers can gain control over data resources by understanding the types of data being acquired, as well as its format, ownership, location, accessibility and value in achieving complete predictive insights.

    Read More

Microsoft is planning to buy professional social networking firm LinkedIn in a deal valued at $26.2 billion.

The transaction, which the companies expect to close in 2016, will give Microsoft access to a trove of professional information, and could help it develop more services for enterprises and small businesses, as TechCrunch notes.

Additionally, the deal will greatly enhance Microsoft’s presence in social media. LinkedIn has 433 million members worldwide, and 105 million unique members visit the site on a monthly basis.

Read More

When a business converges its infrastructure, the power and cooling needs typically change dramatically. With a dense, highly utilized environment, an organization will experience a larger power draw and increased heat output.

To minimize the risk of downtime and protect your systems in the event of a disruption, you need to:

1. Keep Power Stable

Power being drawn by equipment needs to be stable and free from surges. Plus, it must be distributed efficiently so no equipment becomes strained. Unstable and unprotected power distribution can create slowed server response and, worse, irreversible damage.

2. Maintain Proper Cooling

You need to provide enough cooling to your servers to maintain performance levels while trying to keep cooling costs low. Failure to properly cool your servers can cause them to overheat and crash, resulting in devastating downtime.

3. Maximize Visibility

Read More