1. Articles in category: Virtual Machine

    1-24 of 153 1 2 3 4 5 6 7 »
    1. Three things hoteliers need to know about machine learning

      Three things hoteliers need to know about machine learning

      When it comes to hospitality analytics, it’s hard to ignore the recent airtime devoted to and levels of interest in the topic of machine learning. The industry has been humming with how machine learning, specifically, helps hoteliers streamline much of their current time-constrained, manual processes – freeing up valuable time to focus on their revenue strategy in the process.

      Read Full Article
      Mentions: Education Amazon
    2. Software-defined networking (SDN): What businesses need to know

      Software-defined networking (SDN): What businesses need to know

      The ever-increasing reach of cloud computing is resulting in more and more businesses adopting as-a-service models. Shares As more and more systems move to the cloud, so we’re becoming increasingly used to accessing all systems on an as-a-service model. Networking is no exception to this and by using software-defined networking businesses can break away from the restrictions imposed by old, inflexible static network architecture.

      Read Full Article
      Mentions: BYOD Services SDN
    3. Which is cheaper: Containers or virtual machines?

      Which is cheaper: Containers or virtual machines?

      The emergence of application containers has come with questions about where this technology fits in the enterprise technology landscape, and more specifically how it compares to virtual machines.

      A new report from 451 Research has some provocative findings on just how advantageous containers could be, not just for developers and operators, but for the finance team too.

      Read Full Article
      Mentions: Network World
    4. Why Cisco, VMware SDN products don't always play nice together

      Why Cisco, VMware SDN products don't always play nice together

      Cisco's software-defined networking approach is capable of administering policies across switching hardware and data center applications that run on VMware's virtualization platform. But toss VMware's SDN security option into the mix, and Cisco's technology becomes less useful.

      Read Full Article
      Mentions: VMware Cisco
    5. Disaster recovery in a DevOps world

      Disaster recovery in a DevOps world

      According to a 2015 survey by IT Revolution Press in conjunction with Puppet Labs, organizations using DevOps deploy code 30 times faster than others, doing deployments multiple times per day. Moreover, change failure gets cut in half with DevOps and services are restored up to 168 times faster than they are at non-DevOps organizations.

      Read Full Article
    6. Is the hybrid cloud's biggest challenge a lack of expertise?

      Is the hybrid cloud's biggest challenge a lack of expertise?

      Making the business case for embracing cloud services isn’t the challenge it once was. What is proving to be more of a hurdle to wider-scale cloud adoption is the lack of expertise, experience and resources to take advantage of what’s now possible.

      It is telling that the cloud has become so complex and evolved so quickly that even professional IT workers and CIOs cannot always get their heads around what is possible.

      What are some factors that go into this phenomenon? Three come to mind immediately.

      Read Full Article
    7. For Germany's cloud providers, it's location, location, location

      For Germany's cloud providers, it's location, location, location

      German telecos are rolling out new cloud services this week to compete with those from the big U.S. providers. Their selling point is location -- though their “home grown” infrastructure is still dependent on technology from U.S. and Chinese suppliers.

      Read Full Article
      Mentions: Services Amazon
    8. Healthcare.gov: Hard-Earned Lessons For CIOs

      Healthcare.gov: Hard-Earned Lessons For CIOs

      It's been just over two years since the controversial and troubled launch of Healthcare.gov, a marquee project for a new age of digital government, implementing a politically controversial policy of affordable healthcare insurance for everyone. As of today more than 6 million people have been enrolled through this system. InformationWeek caught up with Healthcare.gov's technology lead to talk about lessons learned.

      Read Full Article
      Mentions: InformationWeek
    9. Putting the cloud on a diet, for security's sake

      Putting the cloud on a diet, for security's sake

      The basic denominator of a systems workload instance, the VM, is shrinking, and quickly. In some ways, this bodes well for security, but may ultimately fork how we think about operating systems.

      An old metric, used since the beginning of modern computing, has been the operating system instance, and it grew to use Moore’s law of the shrinking CPU and drop in cost. It was not so long ago that another huge barrier in technology was lifted by the address space of the 64-bit microprocessor.

      Read Full Article
      Mentions: Security
    10. A millennial’s experience in interoffice communications

      A millennial’s experience in interoffice communications

      I’m a millennial. So as many others, I’m really in for apps that make my life easier and help me keep in touch with my community. I expect the same at work. This is why I really need my favorite enterprise apps on my smartphone and on my corporate laptop: Instant messaging, document sharing, along with voice, all really help things get done in a few seconds. Especially when working in a marketing community of mostly mobile and creative colleagues.

      Getting things done on another scale

      Read Full Article
    11. Meet the man-in-the-middle of your next security crisis

      Meet the man-in-the-middle of your next security crisis

      Man-in-the-middle attacks are pesky and stealthy maneuvers that show up everywhere from the cloud to SSL. They appear as attackers find ways to secretly insert themselves between any two points of communication in any new or existing technologies.

      “Any communications path can have its own form and methods to exploit MITM attacks,” says Michael H. Davis, CISO, American Bureau of Shipping.

      Read Full Article
    12. VMware touts new technologies for managing containers and live migration of virtual machines

      VMware touts new technologies for managing containers and live migration of virtual machines

      VMware executives demonstrated new virtualization technologies designed to run in the data centers of the future at the company's annual VMworld conference.

      VMware showed off a new capability of moving a live, running virtual machine (VM) from one data center in California to another in Virginia. Executives also demonstrated how the company is working with containers, a rapidly emerging virtualization technology popularized by Docker.

      Read Full Article
      Mentions: Data Center VMware
    13. Mother Nature teaches Google a lesson

      Mother Nature teaches Google a lesson

      Four successive lightning strikes on a local utility grid in Europe caused a data loss at Google's Belgium data center. For Google, a company with a self-described "appetite for accuracy" in its data center operations, admitting an unrecoverable data loss as small as 0.000001% -- as it did -- likely came with a little bit of pain.

      Read Full Article
      Mentions: Amazon
    14. Are comatose servers your next big IT headache?

      Are comatose servers your next big IT headache?

      Picture this. An executive at your organization gets an idea for a big project, one that adds a new product line to your company and could result in millions of additional dollars in revenue per year. The whole company is gung ho about this. The new mantra each workday is “what are we doing to advance Project X?” Cheers are sung each morning.

      Read Full Article
    1-24 of 153 1 2 3 4 5 6 7 »
  1. Unified Access from Alcatel-Lucent Enterprise = seamless user experience
  2. Categories

    1. Industries:

      Education, Government, Healthcare, Hospitality, Manufacturing, Small Business, Transportation
    2. Technology Trends:

      Agile IT, Automation, Big Data, Business Intelligence & Analytics, Business Transformation, BYOD, Consumerization of IT, Digital Business, Digital Collaboration, Digital Transformation, Everything as a Service, Industry Reports, Internet of Things, IP Video, IT & Technology as a Service, IT Simplification, Mobility, Personal Cloud, Shift to Consumption Models, Tech Terms & Acronyms, Technology Evolution, The role of SIP, User Experience, WebRTC
    3. Business Strategies:

      Business Process, Business Strategy, Customer Service, Financial Models, IT as a Service, IT Management, IT Service & Support, Knowledge Management, Marketing & Sales
    4. ALE Technology Strategies:

      Application Fluent Network, Cloud, Convergence, Networking as a service, SDN, Security, Unified Access, Virtualization
    5. Technologies:

      DECT, Ethernet, Intelligent Fabric, IPv6, Link Aggregation, Network Access Control, Power over Ethernet, Smart Analytics, SPB, uNP, Virtual Chassis, Virtual Machine, Virtual Network Profiles, Voice over IP, Wireless LAN
    6. Solutions:

      Business Telephony, Cloud Communication, Customer Service, Data Center, Hardened Ethernet, Mobile Campus, Mobility, Network on Demand, Small & Medium Business, Unified Communications
  3. Popular Articles