Spikes' approach to security: Isolate the browser by placing it outside of the corporate firewall.
Virtualization reaches from hand-held devices to the data center to the clouds. Virtually Speaking examines the forces behind this expansion, the suppliers of the technology and the organizations using the technology.
Daniel Kusnetzky, a reformed software engineer and product manager, founded Kusnetzky Group LLC in 2006. He's literally written the book on virtualization and often comments on cloud computing, mobility and systems software. In his spare time, he's also the managing partner of Lux Sonus LLC, an investment firm.
Kenneth 'Ken' Hess is a full-time Windows and Linux system administrator with 20 years of experience with Mac, Linux, UNIX, and Windows systems in large multi-data center environments.
IBM gives recommendations that were designed to help mid-market decision makers think about and implement processes that would help make their uses of cloud computing services safer.
Recently Symantec and VMware announced a partnership to help Symantec implement a software defined data center using VMware's vCloud Suite. Why now and why VMware?
Today's complex workloads require the support of many elements -- including systems, networking, storage, and software elements. Zenoss believes that it's the time to start monitoring and managing complete services.
Sure there's a lot to crow about when you consider IBM's new X6 Server lineup. But hardly anyone's talking about my favorite part of this hardware: ease of maintenance. Here's what you'll want to know about the X6 systems.
Red Hat's Radhesh Balakrishnan talks about Red Hat Enterprise Virtualization 3.0 and its impact on creating OpenStack-based clouds. In the end, he points out that Red Hat's business model and its key success factor is the ecosystem.
The key question is whether customers will stay with System x systems or make future purchases from others.
CiRBA's Andrew Hillier discusses how its better to think about cloud computing as a hotel rather than an apartment: Cloud applications move in, stay a while and then leave.
IT administrators have many challenges simply monitoring and managing today's complex web of workloads, servers and clients. What happens when vehicles, copiers, security devices, smartphones, tablets and who knows what else appear on the network?
Different workloads exercise different system components in different ways. The wrong mix of capabilities might make a specific system configuration perform badly even though it might have very powerful processors or extremely large memory capacity.