Entrepreneurs must strike a balance between innovation and cyber risk management. Why Entrepreneurs Should Take Cyber Risk Seriously
By implementing virtual desktop infrastructure (VDI) solutions, IT can simplify deployment, reduce the strain in client support and provide access to analytics and intelligence about usage. Migrating to Windows 10: Just Drag and Drop with Virtual Desktop Infrastructure
More than 50 percent of companies are now incorporating nonvolatile memory, which is one of the reasons data storage is fast becoming the new IT celebrity. Data Storage – Five Reasons Why It’s the New Celebrity
We need to stop prolonging the inevitable and take steps toward migrating towards Windows 10. Don’t Prolong the Inevitable: Considerations for Migrating to Windows 10
What the world needs to improve in network security is to reverse the natural sequence of TCP/IP. Software Defined Perimeter: The Secret Service of TCP/IP Networks
If you’re keen on strengthening your Microsoft partnership and learning more about growing your business, then WPC is an event you’ll need to attend. Five Things Partners Can Expect to Learn at Microsoft WPC 2016
SAS has become the robust choice for dual-port and multipath solutions, satisfying user need for storage continuity options in the data center. Robust Dual-Port and Multipath for High Availability and Efficient Sharing


I am pleased to have an opportunity to share my thoughts on the importance of securing the digital identification and data of individuals, the enterpise, medical servivces, and finicial transactions in our rapidly growing mobile world....

Read More
IT Security

Unisys adds LogRhythm security intelligence technology to its managed security services offering

Unisys Corp. expanded on Monday its suite of managed security service offerings to include technology from security analytics vendor LogRhythm. Unisys integrated LogRhythm’s next generation security intelligence services into the core of its global network of security operations centers to increase protections and efficiencies for clients from growing risks associated with cyber threats. Unisys also will integrate LogRhythm technology with Unisys Stealth, a suite of software-defined security products that lower […]


Seagate launches Nytro XM1440 M.2 NVMe SSD to meet enterprise data center performance needs

Seagate Technology launched Tuesday its high-capacity drive that can help data centers accommodate exponential data growth, while still maintaining high levels of computing power and performance. The two terabyte (TB) version of its Nytro XM1440 M.2 non-volatile memory express (NVMe) Solid State Drive (SSD) is the highest-capacity, enterprise-class M.2 NVMe SSD available, making it ideal for demanding enterprise applications that require fast data access, capacity and processing. Optimized for read-intensive […]

Hot Companies

Cool Products


Virtuozzo debuts hyper-converged offering based on open source technology and optimized KVM

Virtuozzo announced on Monday general availability of Virtuozzo 7. With this new version, the platform ushers in a new level of portability, reliability, and performance, especially for customers in large data center environments where vendor flexibility, as well as low latency, is critical. Virtuozzo 7 includes optimized KVM with rebuilt hypervisor core on top of open-source KVM resulting in better density, performance and security; rebootless kernel updates with ReadyKernel with […]

Data Backup

AWS adds support for SQL Server native backup/restore to Amazon Relational Database Service

Amazon Web Services (AWS) announced Wednesday that it has added support for SQL Server native backup/restore to Amazon Relational Database Service (RDS). SQL Server native backups include all database objects: tables, indexes, stored procedures and triggers. These backups are commonly used to migrate databases between different SQL Server instances running on-premises or in the cloud, which can be used for various capabilities including data ingestion and disaster recovery. The native […]

Data Storage

HP Enterprise offers privileged account management service with CyberArk to derail cyber attacks

Hewlett Packard Enterprise (HPE) announced Monday the HPE Privileged Account Management (PAM) Service offering, an extension to its HPE Managed Security Services (MSS) portfolio. In partnership with privileged account security software vendor CyberArk, this offering is designed to help customers more effectively mitigate the heightened risk associated with privileged accounts, enforce more consistent application of security policies, and reduce manual efforts and administrative costs. HPE PAM Service leverages the ten […]

Data Protection

Toshiba begins shipping samples of its 64-layer 3D flash memory

Toshiba Corp. released latest generation of its BiCS FLASH three-dimensional (3D) flash memory with a stacked cell structure, a 64-layer device that will be begin sample shipments Tuesday. The device incorporates 3-bit-per-cell (triple-level cell, TLC) technology and achieves a 256-gigabit (32-gigabytes) capacity, an advance that underscores the potential of Toshiba’s proprietary architecture. Toshiba continues to refine BiCS FLASH, and the next milestone on the development roadmap is a 512-gigabit (64-gigabytes) […]

WWPI – Covering the best in IT since 1980