Frontpage Slideshow | Copyright © 2006-2011 JoomlaWorks Ltd.
  • Threat-centric approach that begins from the network layer
    Posted Date Thursday, 23 October 2014 00:00
    Cisco Application Centric Infrastructure (ACI) is an innovative architecture that claims to radically simplify, optimise and accelerate the entire application deployment lifecycle.
  • Scale your cloud: A reality in enterprises Pt.2
    Posted Date Wednesday, 22 October 2014 00:00
    By Cat Yong The benefits of applications that are able to scale out beyond the confines of just one physical server are compelling. Having all the resources that applications need – CPU, memory, storage and more – spread out across multiple standard hardware, spells something that traditional apps have never had before – scalability.
  • Network programmability: Two use cases with Brocade’s Vyatta controller
    Posted Date Tuesday, 21 October 2014 00:00
    By Cat Yong A strategy that Brocade executed upon nearly 3 years ago, sees them ready to enter what they are calling the New IP era, where increasing adoption of cloud, mobile, social and more, is bring user-centricism up to the front and centre of the industry landscape.
  • Unleashing storage from the confines of hardware
    Posted Date Monday, 20 October 2014 00:00
    By Cat Yong Dell views that unstructured data does not grow in the same controlled, regular intervals that structured data for traditional IT systems does. This is necessitating an evolutionary type of storage architecture.
  • Powering Clouds With An Open Approach
    Posted Date Thursday, 16 October 2014 00:00
    Today, the combination of trends, such as Bring Your Own Device (BYOD), Bring Your Own Apps (BYOA) and consumerization of IT, has been driving an increasingly mobile workforce.

Channels & Partnerships

ItBB-Logo-clean

exabytes 

tech-in-practice

aims 2