Recent Articles
-
F5 Networks Debuts ARX File Virtualization Appliances
Application delivery networking specialist F5 Networks announced the release of a hardware platforms for F5 ARX file virtualization solutions. With the introduction of the ARX1500 and ARX2500 appliances, the ARX product line expands to provide small to medium-size businesses with data management capabilities. For medium-sized storage environments, the ARX2500 platform includes support for 10 Gigabit…
-
Oracle Releases Virtual Desktop Infrastructure 3.3
Continuing to enhance its desktop virtualization portfolio, Oracle announced Virtual Desktop Infrastructure 3.3, which features an enhanced administration portal with role-based access control, introduces Oracle Linux as a supported host platform and delivers increased performance. Virtual Desktop Infrastructure is designed for managing and accessing virtualized desktops hosted in the data center. Through centralizing the hosting…
-
Cloud Computing: An Impending RMM Challenge for MSPs
Everything in IT continues to get more complicated, and with the proliferation of public and private cloud environments and services, the complexity is only increasing. These complications are even finding their way into the basics of managed services provided by MSPs. Remote monitoring and management (RMM) is increasing in complexity for MSPs because of the…
-
MySQL VMs Get a New Template from Oracle
Preconfiguration, prepackaging and automation of many IT functions are key attributes of the new unified computing systems, and this is a trend that is gaining serious traction on a global scale. Spending hours configuring a server or storage array for a virtualized system is fast becoming drudgery of the past. Oracle made a major contribution…
-
Security Holes Abound in VMs Deployed by Amazon Web Services Customers
German researchers uncovered multiple security problems within Amazon’s cloud-computing services caused by customers ignoring or forgetting security tips. Researchers looked at some 1,100 Amazon Machine Images and found a majority of them contained security keys used to authenticate with other services and servers, Thomas Schneider, a post-doctoral researcher in the System Security Lab of Technische…