Recent Articles
-
Dell’s Force 10 Acquisition Fits Company’s Integrated Strategy, Server Chief Says
Dell’s acquisition of networking vendor Force 10 Networks will be a boon for all parts of the company s efforts to build out its data center solution offerings, according to Dell’s top server executive. In an interview with eWEEK, Forrest Norrod, vice president and general manager of Dell’s Server Platforms business, said Force 10 will…
-
Your Clients Are Ready for Cloud. Are You?
As hype around cloud computing is starting to settle into reality, now is the time to start putting together your strategy for how your business will sell and implement cloud services for your clients. The following is an excerpt from a Cloud Practice Guide that was commissioned by The ASCII Group and developed by…
-
Mobile Security Threat Rising: Report
Lookout Mobile Security, a provider of mobile security, announced the results of its Mobile Threat Report, based on threat data from its Mobile Threat Network, which includes data collected from more than 700,000 apps and 10 million devices worldwide. The report found that mobile malware has increased significantly, with Android users two-and-a-half times as likely…
-
CompTIA Breakaway: Cloud Vendors on Parade
Managed services and cloud computing took center stage at the CompTIA Breakaway conference in Washington DC this week, as standing-room-only cloud seminars attracted hundreds of IT solution providers and vendors took advantage of the opportunity to talk about their cloud wares. Here’s a look at some of the vendors and products at the event. Intronis.com…
-
The Cost of Cybercrime Is Rising, HP Report Finds
Cyberattacks increasingly plague businesses and government organizations, resulting in significant financial impact, despite widespread awareness, according to a report released by Hewlett-Packard. The study found that recovery and detection are the most costly internal activities, suggesting a significant cost-reduction opportunity for organizations that are able to automate detection and recovery through enabling security technologies. Conducted…