Amid the massive work-from-home surge, Tom Fenton says organizations planning for long-term remote work may be better off with VDI, while those who will see workers returning to their offices may like an HDI scheme.
Paul Schnackenburg looks at the current capabilities of the public preview of Azure Arc -- extending Azure Resource Manager capabilities to Linux and Windows servers, as well as Kubernetes clusters on any infrastructure across on-premises, multicloud, and edge -- and why you should care.
- By Paul Schnackenburg
- 08/31/2020
Tom Fenton concludes his three-part series on SD-WAN by outlining some different deployment modes.
Verizon this week claimed a technology milestone: the first fully virtualized 5G data session in a live network in the U.S.
After explaining why organizations are choosing SD-WAN over MPLS in part one of this series, Tom Fenton now takes a look at the components underlying the technology approach and how they work.
Another cloud crypto-mining exploit has been publicized, this one with the added ability to steal credentials stored on the Amazon Web Services cloud computing platform.
Virtualization kingpin VMware was quick to tout its wares for the remote work explosion caused by the COVID-19 pandemic, but its recent messaging has shifted to a "return-to-office" theme in a sign that the company may be looking forward to a recovery period soon.
New research indicates software-defined wide-area networking (SD-WAN) is a key component of enterprise digital transformation initiatives accelerated by the COVID-19 pandemic that have resulted in a "new normal" of remote work.
This release of VMware's virtual desktop infrastructure software is huge, says our local VMware expert Tom Fenton, who details the new offering here and explains how VMware is going all in with their HTML5-based Horizon Console and is giving a definitive deadline for the retirement of their Flash-based Horizon.
The project "is focused on advancing virtualization in a number of different commercial and open source applications, including server virtualization, Infrastructure-as-a-Services (IaaS), desktop virtualization, security applications, embedded and hardware appliances, and automotive/aviation."
Cisco Systems believes the IT industry is on the threshold of a new era of networking that will see modern technologies powering new ways of building and operating networks and solving associated business challenges.
Tackling large-scale hyperconverged infrastructure (HCI) deployments, Pivot3 is using artificial intelligence (AI) and automation techniques to ensure data protection.
Brien Posey shows how to host copies of an EC2 instance in multiple regions, which can help organizations ensure that an application performs well for users who reside in a different part of the world, or which can be used as a way of ensuring business continuity in the event that there is a disruption in the organization's primary instance.
If you create a lot of EC2 virtual machines, then it is likely going to be worth your time to create custom operating system deployment images. These images allow you to deploy EC2 instances that are already configured with the software and configuration settings that you use in your own organization.
Cato Networks, an enterprise networking and security specialist, has combined security and software-defined wide-area networking technology in its new Cato Instant*Insight offering.
Cockroach Labs has duplicated its benchmark testing of the top cloud computing platforms, finding that Amazon Web Services (AWS) no longer enjoys such a big price/performance edge over Google Cloud Platform (GCP).
The Google Cloud Platform announced new cost-optimized, general-purpose virtual machines to run on the Google Compute Engine.
Silver Peak, a leader in the software-defined wide-area networking (SD-WAN) space, announced updates to its Unity EdgeConnect SD-WAN edge platform that allow for massive scaling.
If you create a lot of EC2 virtual machines, then it is likely going to be worth your time to create custom operating system deployment images. These images allow you to deploy EC2 instances that are already configured with the software and configuration settings that you use in your own organization.
Trend Micro, McAfee and Bitdefender are among the "leaders" in a new report from Forrester Research on cloud workload security.