Thursday, December 08, 2016 - Posts
-
Dell EMC today announced that ScaleIO—the company’s hyper-converged software-defined storage offering—has been awarded StorageReview’s first-ever Editor’s Choice award. Intended for the most leading-edge products, the Editor’s Choice award is a rare honor, and one that ScaleIO earned over several mo... Read More...
|
-
Microsoft is offering a new free ebook titled, Containerized Docker Applications Lifecycle with Microsoft Tools and Platform, by Cesar de la Torre. It was published by the Microsoft DevDiv team.... Read More...
|
-
Thales announced the release of new capabilities for its leading Vormetric Data Security Platform. These advances extend data-at-rest security capabilities with deeply integrated Docker encryption and access controls, the ability to encrypt and re-key data without having to take applications offline... Read More...
|
-
5nine Software, a Microsoft Gold Partner and the leading provider of Hyper-V security and management solutions, today released 5nine Manager v9.3.... Read More...
|
-
2016 was the year of the container. With new open source projects launched by major players across the board (including VMware, which launched vSphere Integrated Containers as an open source project), the momentum behind containerized, cloud-native infrastructure is undeniable. What does 2017 have i... Read More...
|
-
SIOS Technology Corp., the industry's leading provider of software products that help IT ensure the performance, efficiency, and high availability protection of business-critical applications, today announced SOIS iQ has been named a silver winner in Most Innovative Product, Enterprise Category -- i... Read More...
|
-
Ixia announced that the company has extended the capabilities of CloudLens, Ixia’s recently announced integrated cloud visibility platform, with CloudLens Virtual Packet Broker (vPB). CloudLens vPB is a software solution that delivers visibility into virtual data center traffic for enterprises lever... Read More...
|
-
Red Hat announced the general availability of OpenShift Dedicated on Google Cloud Platform. The new offering brings Red Hat’s award-winning container platform as a managed service offering to enterprise customers who want to build, launch, and manage applications on OpenShift Dedicated with Google C... Read More...
|
-
In 2017 you will see reorganization in 35 percent of the global 2000, simply due to a lack of commitment from CIOs to become more modern and compete more fiercely with competitors.... Read More...
|
-
In recent Spiceworks surveys, IT pros around the world shared their IT budget and tech plans in 2017, including planned adoption of operating systems, emerging technologies, and more. Based on what they told us, we come up with six IT predictions backed up by data.... Read More...
|
-
Graphical Processing Units (GPUs) are capable of delivering up to 100-times better performance than even the most advanced in-memory databases that use CPUs alone. This article makes four predictions for how GPUs can be expected to impact real-time intelligence in 2017.... Read More...
|
-
DreamHost, a global leader in web hosting and cloud services for entrepreneurs and developers, today announced key improvements to DreamObjects, the company's secure open source cloud storage hosting service powered by Ceph. Like a file system with infinite capacity, customers use DreamObjects to bu... Read More...
|
-
Analytics tools are being adopted at record speeds even as the underlying technologies continue to evolve, causing different impacts for different organizations. While some companies are embracing the digital revolution and treating data as a valuable currency, others have been slow to adapt to chan... Read More...
|
-
As 2016 takes its final bow, let's look at some predictions for what's in store for 2017 and beyond. The forecast is blue-sky opportunities for enterprises that are equipped to take advantage of them.... Read More...
|
-
IoT security has needs that go far beyond the current scope of cloud and mobile challenges: use cases where dynamically introducing devices to each other is the highest goal, others where strong chip-backed security is essential, and still others that unavoidably mix the two.... Read More...
|
|
|