Apr 30

VMware warned customers about multiple security holes in versions 4.0 and 4.1 of its ESX enterprise-level computer virtualization product. According… Read more at VMblog.com.

Full Article

Apr 30

Zenoss, a leading provider of unified IT operations software for physical, virtual, and cloud-based IT infrastructure, today announced that the… Read more at VMblog.com.

Full Article

Apr 30

If you were happily running your IT system but needed some additional performance, chances are you turned to some kind of SSD caching solution to improve performance at a lower cost point than adding more servers or storage. You went on what I am calling a “cache diet” (no, not the “crash diet” you went on last year to lose a few lbs). You may think your cache diet is great. “Dog, we got some performance improvement and the applications guys are not bothering me anymore, at least for now.” And it is true, you did see some performance improvement when you went to an SSD caching solution….but now, things are starting to slow down again and the applications guys are making noise again. You are experiencing IO bottlenecks and higher latency times for data access or you just never really got all the improvements you expected. “So what do I do now, Dr. Dog?” Well, the problem is the SSD cache solution you implemented does not have any RAM in it and the solution from the good doctor is “you need more RAM in your cache diet.”

read more

Full Article

Apr 30

Over the past decade, we’ve become much more robust in our approach to information security. We recognize that our company’s largest vulnerabilities have to do with its computer systems, and that data security is at the core of loss prevention, disaster recovery, and even normal operations.
Virtualization has created a much more efficient environment for our technology, but it’s also raised some new types of security risks. If you’re going to keep business running as usual and keep it secure, you need to know how to mitigate some of these risks.

read more

Full Article

Apr 30

Infinitely Virtual, a leading provider of virtual server cloud computing services for businesses, today announced it has added VMware’s vCloud… Read more at VMblog.com.

Full Article

Apr 30

“Types of Hardware Virtualization Techniques and its Advantages” is a contributed article from Nordisk systems. To put in simple terms,… Read more at VMblog.com.

Full Article

Apr 30

BlueRISC, a leader in hardware security and cyber-security and forensics tools, introduces its latest product in the security space aimed at securing Read more at VMblog.com.

Full Article

Apr 30

Kaspersky Lab , a leading developer of secure content and threat management solutions, has announced findings from a recent study on virtualization… Read more at VMblog.com.

Full Article

Apr 30

The introduction of virtualization and cloud computing to data centers has been heralded as “transformational” and “disruptive” and “game changing.” From an operational IT perspective, that’s absolutely true.
But like transformational innovation in other industries, such disruption is often not in how the core solution is leveraged or used, but how it impacts operations and the broader ecosystem, rather than the individual tasked with using the solution. The transformation of the auto-industry, for example, toward alternative fuel-sourced vehicles is disruptive and changes much about the industry. But it doesn’t change the way you drive a car; it still works on the same principles and the skills you’ve learned driving gas powered cars are still applicable to alternative fuel-source cars.
What changes for the operator – just as within IT - is there may be new concerns with which you must contend.

read more

Full Article

Apr 30

Radware, a leading provider of application delivery and application security solutions for virtual and cloud data centers, today announced it is… Read more at VMblog.com.

Full Article

«     |     ?     |     »