Each month our team of expert editors addresses the changing role of IT by helping savvy technology professionals navigate both the technical and cultural challenges wrought by vendor-hype, user-demands, and technology requirements.DOWNLOAD THIS MONTH’S E-ZINE ISSUE NOW!
Cloud computing on Linux, Linux high-performance computing and supercomputing, Linux server hardware, Linux virtualization, Linux backup and storage, Linux network administration, Open source projects in the cloud
Enterprise IT shops have new choices: Converged systems simplify management and scaling, while commercial off-the-shelf servers tailor resources without vendor lock-in.
A survey reveals businesses are jumping off the fence and into big data's yard. But while more are investing, some remain skeptical of the benefits.
There are a bunch of IBM 3592 'J' tape designations. How do you order the right capacity for your tape drives? Do you take compression into account?
The Virtual Machine Connection tool lets users copy files and redirect local resources to a VM without a network connection.
Proper VM cost assessment is a critical element of meaningful showback and chargeback practices in a virtual data center.
Attaching real costs to computing may reduce VM sprawl and yield cost savings for businesses, but can be unpopular among business units.
Google Autoscaling gives IaaS customers better control and more use cases as the public cloud vendor inches toward product parity with the competition.
Microsoft’s slow response to the recent Azure outage left some users wondering if they should entrust critical business data to the cloud environment.
In this Q&A, Docker CEO Ben Golub discusses integration with AWS and future development of the hugely popular container technology.
Microsoft's Surface Pro 3 is good for mobile users and runs enterprise-grade apps, but its light weight and processor capacity pose some limits.
Tools such as Synaptic Package Manager provide a GUI for installing and maintaining the many Linux programs suitable for enterprise use.
Tools are now available to IT for a remote wipe of user-owned laptops. But set clear BYOD security policies and inform users.