Splunk adds visibility into virtual environments
IaaS provider CloudShare deployed Splunk to correlate machine-generated data and provide insight into every aspect of its business.
IaaS provider CloudShare deployed Splunk to correlate machine-generated data and provide insight into every aspect of its business.
Friday marks the end of an era, as outgoing VMware CEO Paul Maritz hands the reins to incoming CEO Pat Gelsinger.
VMware CTO Steve Herrod tells VMworld attendees how the virtualization leader is managing the consumerization of IT. The vision hasn't changed a lot since last year, with one exception. The vision is now an integrated one based on the Project Horizon Suite.
To cheers from the audience at VMworld 2012 , VMware's incoming CEO Pat Gelsinger announces that VMware is eliminating the vRAM entitlement that many customers say drove up prices and reduced flexibility.
Picking the right Cloud hosting provider is among the most important decisions you'll make when planning the migration of your tier 1 applications.
Hype continues to surround big data analytics. But hype or not, data-driven decision-making is becoming central to management decisions at most enterprises. They are taking inspiration from Billy Beane, the general manager of the Oakland Athletics baseball team that turned to data analytics (known as Sabermetrics in baseball and made popular in the movie, "Moneyball") to assemble a competitive baseball team despite the organization's limited financial resources.
Your sensitive data is only as secure as the weakest link in your organisation, and in many cases the weak link is your employees. A properly established security awareness and training program can pay huge dividends.
With Office 2013 and SharePoint 2013, Microsoft says it will make it easier than ever to develop, deploy and manage Web-based apps that extend the power of its productivity and collaboration.
Development organisations are increasingly looking for a Mobile Application Development Platform (MADP) that can support their needs for both current and future projects. Here are 10 that have been identified as leaders in the field.
Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data analytics technologies to mine the data in their logs and improve their security footing.
The number of serious vulnerabilities in applications declined in 2011, but they are still common. Improving your application security posture requires determining whether you're a target of opportunity or a target of choice and understanding your development lifecycle.
If you lead an IT shop today, chances are at least some of the employees who report to you are millennials--young adults in their 20s.
IT organisations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to mobile device management (MDM) products and services to address the problem.
A number of high-profile Amazon Web Services (AWS) outages temporarily brought down services by customers like Netflix and Pinterest in June. While Amazon bears the burden of blame for the outages, should customers also take some responsibility for failure to engage a backup host?
The availability of services and applications to employees and customers is more critical than ever before, but many organizations still focus their data protection objectives on data and servers rather than applications.