Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share It With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

ADVERTISEMENT

Links 1 through 10 of 19 by Cory Edwards tagged virtualizationandcloud

Organizations need to think about virtualization-specific security technology when upgrading their data centers instead of relying on existing measures, such as the trust firewall.

Share It With Others!

The Defense Intelligence Agency and Air Force are working on a secure, mobile end user client, and they believe virtualization is the key to achieving it.

Share It With Others!

IT engineers understand that storage is a valuable asset in any environment. One of the biggest problems facing virtual deployments is storage space. The issue is not the lack of storage, but data storage management. For example, an IT manager may purchase several terabytes of disk space on a NetApp FAS3200 series appliance. The problem is allocating and managing that storage in the most effective manner possible. Many times, needed storage space is allocated without much planning or initiative. This results in wasted time, wasted space and wasted capital.

Share It With Others!

In these times of economic turmoil, IT pros are being asked to make more efficient use of networking resources. One of the ways in which an organization might maximize return on its investment in IT hardware is through the use of network virtualization. The term usually applies to the practice of creating multiple logical networks on top of a physical network. If this concept sounds familiar, it’s because even though virtualization is currently popular, various forms of network virtualization have been in use for well over a decade. A couple of early forms of network virtualization include virtual private networks (VPNs) and virtual LANs (VLANs).

Share It With Others!

Despite lingering concerns about issues like security, there's now consensus that cloud computing will become the main model for delivering tech services.

Share It With Others!

These incidents—the partial outage of Amazon’s EC2 cloud service and the security breach of Sony’s PlayStation Network and Qriocity music service—underscore a key issue of the cloud computing model: customers’ lack of control over their data.

Share It With Others!

To hear the experts tell it, cloud computing may be the most innovative technology development in decades—and the greatest thing since sliced bread—or should be dismissed as a marketing tool for existing know how that's as old as computers themselves and no more revolutionary than pre-packaged bagels.

Share It With Others!

The cloud craze is charging fast into government agencies. Federal CIO Vivek Kundra's office, in fact, has already identified 100 data centers it believes can be replaced by private clouds in the short-term and near 800 by 2015.

Share It With Others!

The Department of Labor (DOL) is the latest government office to explore the use of cloud computing to consolidate in-house email systems.

Share It With Others!

When it comes to cloud computing, storage is usually the first thing that most IT organizations think about. While the idea that an external service provider could be used to store massive amounts of data can be appealing, the management of that process across hybrid cloud computing scenarios can be more complex than most IT organizations tend to realize.

Share It With Others!

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT