tech blog header

Intel CPU Hardware Vulnerabilities Can Compromise Your IT Security

Posted on Fri, Aug 3, 2012

The United States Computer Emergency Readiness Team, also known as US-CERT, has identified a huge threat to your company's IT security. Several 64-bit operating systems as well as virtualization applications using Intel processors are at risk of being exploited by a "local privilege escalation attack." The exposed operating system are based on x86-64 architecture, including Windows Server 2003 SP2, Server 2008 R2; Windows 7, NetBSD, FreeBSD, and operating systems utilizing XenServer Hypervisor.

Read More

Tags: Security, Virtualization, Hardware

Understanding Object Based Storage

Posted on Tue, Jul 17, 2012

Object based storage is increasingly being seen as a powerful alternative to the more common suite of IT solutions based around network attached storage. Some of the advantages inherent to an object based approach include a level of scalability that is for all practical purposes unlimited and less need to rely on high-speed infrastructure including ultra-fast processing. In addition, object based storage fits into the new Web 2.0 world because it can easily be accessed using standard internet protocols, which lessens the need to launch traditional commands related to storage inside a web-based world where they may not coordinate well.

Read More

Tags: Data Management, Storage, Hardware

2 Key Considerations for Selecting a Virtualization Platform

Posted on Wed, Jun 27, 2012

Businesses and other organizations thinking of making a move to virtualization must confront the need to make some key decisions that will have cost and efficiency implications for years to come.

Read More

Tags: IT Solutions, Data Management, Hardware

How Virtualization Can Fit Your Business

Posted on Mon, Jun 11, 2012

Virtualization is a computing term that refers to the creation of a virtual solution to a problem rather than a ‘real’ or physical solution. For all intents and purposes, the virtual idea could have the same look, but not feel, of the physical alternative. A touch screen key pad as compared to a physical QWERTY keyboard is a great example of this.

Read More

Tags: Virtualization, Software, Hardware

IT Solutions: Identifying Bad Devices

Posted on Fri, Feb 10, 2012

Not so very long ago, the term ‘bad device’ merely indicated a hardware component or peripheral that had stopped functioning properly.  In today's world of extensive cyber threats, however, the term has taken on an entirely new meaning.  A bad device now is one that functions as a repository for malware or malicious web content.  According to industry estimates, thousands of new bad devices are added to the World Wide Web every day. 

Read More

Tags: IT Solutions, Cyber Security, Malware, Hardware

Understanding Virtualization Costs through Outsourcing Solutions

Posted on Mon, Feb 6, 2012

Moving to a virtualized workspace is one of the most significant trends in today's business world, but companies dipping their toes in these waters need to understand in advance the types of costs that come along with IT solutions that incorporate virtualized servers.  There are three main types of costs associated with virtualization: software, hardware, and labor, which often take the form of a managed services approach to IT services.

Read More

Tags: IT Solutions, Virtualization, Software, Hardware

Dell Releases PowerEdge C6105 Server

Posted on Wed, Dec 21, 2011

Dell, long known for the innovative IT solutions they produce for businesses both large and small, has announced the arrival of the PowerEdge C6105 server.  Unlike many similar computers, the PowerEdge C6105 is specifically optimized for applications that use Web 2.0 functions and supports the use of cloud hosting services.  This is ideal in today’s business world, which is shifting toward managed services more with each passing year.  With the PowerEdge C6105 server, small and medium-sized businesses will be able to adopt solutions such as private clouds. 

Read More

Tags: IT Solutions, Servers, Hardware

iSCSI Storage Basics

Posted on Tue, Oct 18, 2011

iSCSI is a new storage protocol that offers lowered costs along with a simple interface.  This type of storage does not require switches, a hardware technology that is a common feature of storage solutions that use FC (fiber) technology.  Instead, iSCSI storage requires the use of an iSCSI initiator, which is often provided for free.  This initiator serves to connect the server via Ethernet technology to an iSCSI array.  Such connections are inexpensive and easy to both install and maintain.

Read More

Tags: Data Management, Storage, Cost Effectiveness, Hardware

Improving Storage Functioning in a Virtualized Environment

Posted on Fri, Oct 14, 2011

The advantages of working in a virtualized environment are many and varied, but along with this shift in an enterprise's basic approach to data come some challenges.  No matter how well designed a storage solution for a virtualized environment is, it will sometimes still present challenges to be resolved.  One excellent way of administering solutions is to implement a managed programs approach to your IT services structure.  This will ensure that experts are regularly assessing the system and making adjustments to storage systems, which will in turn minimize disruptions to the regular daily work carried out by enterprise employees.

Read More

Tags: Virtualization, Storage, Hardware

The Growing Role of Solid State Storage

Posted on Wed, Oct 12, 2011

Solid-state storage is fast becoming a popular option for small and medium-sized businesses because it offers significant advantages over traditional hard drives.  Traditional drives use electromechanical processes to read and write data and include moving parts such as read/write heads and disks that spin at high speeds.  This makes them more susceptible to breakdown than solid-state disks, which feature no moving parts and use microchips to retain data.

Read More

Tags: IT Consulting, Storage, Hardware

Free Whitepaper

Follow Us