Buying storage used to be a case of simply deciding how much space you needed, but these days it's much more complicated.
Making the wrong storage choices can impact on the performance of your entire IT infrastructure. To help with the problem American Megatrends (AMI) is launching a new tool, StorTrends iDATA, to provide admins with an accurate assessment of performance, capacity and throughput requirements.
If you use Microsoft System Center Configuration Manager (SCCM) you're probably aware that support for the 2007 version ends in July.
In response to this, systems management specialist Adaptiva is launching a Content Push Policy to its OneSite product, aimed at simplifying and cutting the costs of migration to SCCM 2012. It will also allow newcomers to SCCM to deploy the package more quickly.
As computers become essential tools for more and more jobs they often need to work in harsh environments that would damage a conventional machine.
Dell is launching two new Latitude Rugged Extreme systems that are purpose-built to withstand hazards such as dust, moisture, drops, vibration, extreme temperatures and other punishing conditions faced by users in fields such as military service, public safety, manufacturing and first response.
Use of the cloud is close to becoming universal as enterprises increase their adoption of both private and public services.
This is one of the main findings of the 2014 State of the Cloud report released today by RightScale. It also finds that as cloud use matures security concerns lessen and attention increasingly shifts to managing the ongoing challenges of compliance, cost management, and performance.
DNS software specialist Nominum has revealed that DNS-based DDoS amplification attacks have significantly increased in the recent months, targeting vulnerable home routers worldwide.
The research reveals that more than 24 million home routers have open DNS proxies which potentially expose ISPs to DNS-based DDoS attacks.
Locking up a user's PC and demanding a payment to release it has proved very profitable for the cyber crime community.
So much so that malware authors have been turning their hand to new variants. Security software specialist Symantec has been taking a closer look at one such, the CryptoDefense trojan that it first detected in February.
Deceiving the user into downloading and installing malicious software is one of the most common ways of attacking endpoint systems.
A good web browser can be an effective aid in blocking these social engineering attempts and the latest research from NSS Labs looks at the leading contenders plus three browsers from China to see how good they are at keeping you safe.
It's sometimes said that big data is like teenage sex, everyone talks about it but few are actually doing it. To which you could add that those who are doing it aren't really sure if they’re getting it right.
In an effort to find out how big data is being used in the real world, we spoke to the heads of three startup companies which are employing it in unique ways to pursue specific business opportunities.
A new global poll carried out by GlobeScan on behalf of the BBC World Service reveals just how widespread these feelings are. Having polled over 17,000 people across 17 countries it finds that 52 percent believe the internet is an unsafe place to express opinions.
Moving data to the cloud and running software as a service can make businesses complacent about backup as they feel their data is already safe with their provider.
However, a recent report by Forrester warns that organizations relying on cloud services may be at risk, "SaaS is an increasingly popular method of deploying new services, but many organizations don't realize that they could be at risk of losing critical data. Many SaaS providers will not restore lost data for users or will only do so for an exorbitant fee".
Although you weren't ever likely to be the subject of a dawn raid from the Sweeney for doing it, until now it has been illegal under UK copyright law to make copies of digital media.
From this summer though the government is changing the current legislation so that you'll be able to transfer music to your MP3 player or make backup copies of your movies without any risk of getting your collar felt.
Keeping systems secure is more difficult than it was a year ago and this is partly down to human error. So says a new study by security awareness company KnowBe4.
The rise of ransomware, the adoption of BYOD, and rapid changes in technology all make it harder for enterprises to guard against threats both inside and outside the organization.
New research by website security specialist Incapsula looks at the impact of DDoS traffic on the internet with data collected over a five month period looking at over 154 million DDoS bot sessions.
It reveals some startling statistics, the main one being that at the application level DDoS bot traffic is up by 240 percent. More than 25 percent of all botnets are located in India, China and Iran, whilst the US ranks fifth in the top ten attacking countries.
The internet and social media mean that there is more information available to consumers than ever before. But which opinions do we actually trust?