Recent Articles
-
WeRecoverData.com Does Heavy Lifting for e-Discovery
Recovering crashed hard drives, discovering lost passwords, performing e-discovery chores and other data retrieval tasks have required tools and specialist not often available to the typical solution provider. Customers calling for those services were usually shuffled off to an organization specializing in those tasks, leaving the solution provider out of the loop. WeRecoverData.com is looking…
-
IBM, Voltaire Seek Faster Data Centers
Voltaire has announced it will design a custom, high-performance 40GB per second InfiniBand switch module for IBM to accelerate performance of applications running on BladeCenter. The integrated product, expected to be released within the next six months, will help solution providers deliver faster, more efficient data center solutions. “Customers’ data centers are only as fast…
-
Juniper Channel Program Changes Reflect Industry Growth Areas
Juniper Networks is following the money. After three-plus years of good marks with its pure-vanilla J-Partner program, Juniper is adding areas of specialization that reflect where its channel partners are migrating. The networking vendor this week added partner specialization programs aimed at the managed services, consulting and service provider sectors, in response to partners who…
-
EDS, Services Stabilize HP’s Q1
Hewlett-Packard has shown its resilience during the ongoing recession—until now. The bad news is that demand for PCs is down and is expected to stay down in 2009. The good news is that services appear to be remaining resilient for computing and IT services giant HP, making HP’s EDS acquisition in 2008 seem like an…
-
Overland Introduces Next-Gen Tape Libraries to Hungry Midmarket
Despite predictions to the contrary, tape-based storage, backup and archiving technology is far from dead. In fact, Overland Storage has introduced next-generation models of its NEO series automated tape libraries to capitalize on the still-growing need for scalable, affordable and reliable data protection and archiving solutions. According to Robert Amatruda, research director at IDC for…
-
Check Point Cuts Conventional Security with Software Blades
Check Point Software Technologies unveiled a new “software blade” architecture that it says will make it easier for its partners and end-user customers to design and implement security solutions tailored for their specific needs. Similar to storage and server blades, Check Point’s software blades divide the different network and perimeter security functions into logical, interoperable…