By Mark Fontecchio, News Writer 16 Dec 2009 | SearchDataCenter.com IT pros using Opalis Software have strong opinions on the pending Microsoft acquisition of Opalis, depending on how much they use the data center automation software. The deeper they are into Opalis' run book automation and job scheduling features, and the more they lean on support, the more concerned they are. James Hankey, vice president of IT and director of operations at financial investment firm John G. Ullman & Associates (JGUA) in New York, professed shock at the…
By Alexander B. Howard, Associate Editor, SearchCompliance.com 14 Dec 2009 | SearchDataCenter.com Skyrocketing energy costs in the data center aren't just a corporate issue. Server consolidation, utilization efficiency and virtual machine sprawl also challenge the biggest enterprise in the United States: the federal government. Greening the Capitol Two years ago, House Speaker Nancy Pelosi launched an initiative designed to reduce the carbon footprint of the United States Capitol. The implementation of a green data center by House Informat…
Janji datangnya sang prospek klien pada jam 11 terlewatkan sampai jam 14, tapi saya senang menerima kehadiran mereka di kantor kecil kami. Dalam diskusi singkat mengenai perusahaan, kami mengakui bahwa kami memang memiliki fokus untuk mengembangkan Digital Signage di Indonesia. Yang menarik bagi saya, Digital Signage ini bukan barang baru, tapi teknologinya terus berkembang. Secara umum terbagi menjadi 2, yaitu hardware Digital Signage dan software Digital Signage. Kami terus terang, lebih berfokus kepada Digital Signage berbasis software kare…
Kepada seluruh rekan-rekan, Bapak dan Ibu, anda semua diundang untuk dapat menghadiri acara ICT EXPO yang di selenggarakan di JCC dari tanggal 14 - 16 Desember 2009 (09:30 - 17:00), dengan cara melakukan pendaftaran secara online GRATIS di: http://www.ictindon esia.com/ reg/ yang mana selain anda akan mendapat kesempatan memenangkan undian berhadiah, Bapak dan Ibu juga akan memperoleh sebuah buku catalog pameran senilai Rp. 50.000,- Untuk mengikuti ICT FORUM 2009 silahkan klik di: http://www.ictindon esia.com/ 2009/forumreg. htm
Caroline Cooper • 10 Dec 2009 NCR Corp. has announced its acquisition of Campbell, Calif.-based DVDPlay, which operates approximately 1,300 DVD-rental kiosks in the United States and Canada. In a news release, NCR says it will convert the DVDPlay kiosks to add to its Blockbuster Express-branded line of kiosks and is revising its installation forecasts from 2,500 to 3,800 by the end of 2009. Terms of the agreement were not disclosed. Alex Camara, vice president and general manager of NCR Entertainment, says DVDPlay's presence in California,…
IT Management | Guest Opinion | Kelly Lipp , Wednesday, December 2, 2009 Tags: backup , business continuity , Data Center , disaster recovery Within our IT-centric world, we tend to forget that disaster recovery is more – much more – than getting mission-critical data restored. In fact, getting the data back might be the easiest part of the process. Tougher is knowing what is going to happen w…
IT Management | Guest Opinion | Kelly Lipp , Wednesday, December 2, 2009 Tags: backup , business continuity , Data Center , disaster recovery Within our IT-centric world, we tend to forget that disaster recovery is more – much more – than getting mission-critical data restored. In fact, getting the data back might be the easiest part of the process. Tougher is knowing what is going to happe…
* Date: August 3rd, 2009 * Author: Brien Posey * Category: 10 things Windows 7 features a new twist: XP Mode, which lets you run your Windows XP apps without compatibility issues. Brien Posey explains why XP Mode is significant and outlines its benefits. One of the most exciting Windows 7 features is Windows XP Mode. It uses a brand new version of Virtual PC to provide seamless access to Windows XP applications, either through a virtual Windows XP desktop or directly through the Windows 7 desktop. Here's a look at some of the benef…
I received this email below: To all 3Com Partners, As a valued member of our 3Com Focus Partner Program, I wanted to share with you some exciting news that I believe will help generate even more momentum for our joint efforts in selling to enterprise accounts. Together, we've set our sights on disrupting the networking market with our "China Out" strategy by leveraging our market leadership in China to offer customers a best-in-class price/performance advantage with a lower TCO, a broad, modern product portfolio and a new level o…
By Mark Fontecchio, News Writer 12 Nov 2009 | SearchDataCenter.com IT infrastructure news Digg This! StumbleUpon Toolbar StumbleUpon Bookmark with Delicious Del.icio.us Add to Google IT pros say Hewlett-Packard Co.'s surprise decision to buy networking company 3Com continues vendor consolidation in the IT industry, which may be a good--and a bad--thing. It could provide economies of scale and greater integration of IT gear but also consolidates more IT firepower in fewer vendor hands and that may not be advantageous for IT cust…
XenServer Highlights Transform your datacenter into a more dynamic server workload delivery center – free – with Citrix XenServer. • XenServer is based on Xen® – the open source hypervisor that’s supported by Intel, AMD, HP and more than forty other organizations. • XenServer is easy to deploy, and its wizard-based controls and advanced capabilities mean more servers per administrator and zero-downtime for upgrades. • XenMot…
Defining an Enterprise Security Strategy Security | How-To | Shaun Hummel, Saturday, October 17, 2009 Tags: anti-virus solutions, Authentication Systems, Cisco Systems, Cybercrime, IBM, Intrusion-Prevention Systems, network security, security policy, usage management and monitoring, VPN, Vulnerability Assessment There are five primary security groups that should be considered with any enterprise security model. These include security policy, perimeter, network, transaction and monitoring security. These are all part of any effective company se…
Defining an Enterprise Security Strategy Security | How-To | Shaun Hummel , Saturday, October 17, 2009 Tags: anti-virus solutions , Authentication Systems , Cisco Systems , Cybercrime , IBM , Intrusion-Prevention Systems , network security , security policy , usage management and monitoring , VPN , Vulnerability Assessment There are five primary security groups that should be considered with any enterprise security model. These include security policy, perimeter, network, transaction and monitoring security. These are all part of any …
Social Plugin