We love our toys, but mixing business with pleasure presents Excedrin-sized headaches for data center managers responsible for keeping company data secure and knowing who has what apps, why and where, writes Tom Roberts of AFCOM. So what's the...
Increased adoption of virtualization in today’s data centers is uncovering the significant mismatch between the capabilities of traditional storage platforms and the specialized demands of virtualization, writes Sachin Chheda. This column...
With 88 percent of unsecured data being shared electronically according to IT News Online, responsible server disposal has proven to be a key component to IT security, environmental responsibility and corporate compliance, writes Steve Skurnac of...
The reality is mere connectivity is not cutting it anymore. The rise of "Shadow IT" is not in response to the lack of available applications. Rather, it is an organic movement in reaction to something bigger: overall experience, writes Michael...
In a recent study conducted by Gartner, IT process automation tools are poised to make a significant impact for businesses across the globe over the next several years, writes Gabby Nizri of Ayehu Software Technologies. Different organizations...
If you are a colo and looking to partner with a modular data center construction company, there are a few simple steps to consider, writes Stephen Madaffari of Data Centers Delivered. The process includes determine your needs and vetting your...
To capitalize on the boom of data centers, select states are introducing tax breaks as additional benefits for potential expansion. Several states now offer data center-specific tax breaks, and some offer more appealing benefits than others...
More than ever, robust data protection is imperative to recovery in the event of data loss. In fact, failure to safeguard company data can result in business disruption, devastating losses, and in some cases, catastrophic consequences to the...
Server management requires a broader view that places the server being managed in the context of the applications and business services that are being provided, writes Vic Nyman of BlueStripe Software.