Technology companies that expect to beneift from cloud computing must creatively adapt licensing, pricing and revenue models.
Capacity planning is a vital component data center managers need to implement in order to achieve power savings and other benefits from virtualization technology, according to IT managers representing two federal organizations.
Security issues, data privacy, the acquisition process, standards and service level agreements were among the chief issues that feds grapple with.
Cloud computing will fundamentally change the shared services model, National Business Center director predicts.
The 2,048-core system, nicknamed Longhorn, will be capable of 20.7 trillion floating-point operations per second, will help researchers keep pace with the explosive rate of data production, TACC officials said.
Agencies running stand-alone Fibre Channel-based Storage Area Networks may be able to reduce the amount of cabling snaking through their data centers, thanks to an emerging converged network protocol named Fibre Channel over Ethernet.
The fusion center approach used in antiterrorism operations could also be applied to other civilian uses, such as bridge and road monitoring and electronic business reporting.
If the latest semiannual round of security advisories from Cisco are any indication, DOS attacks continue to be a serious — and largely unsolvable — problem for networks.
The Defense Information Systems Agency plans to bolster security features embedded in its far-flung networks and data centers via several acquisition projects planned for the twilight of fiscal 2009.
A storefront for the federal government will let agencies acquire cloud computing technology as easily as consumers can sign up for Gmail accounts.
Defense Department officials want to know whether virtualization technology can make DOD’s networks more secure and easier to manage.
Microsoft's Ron Markezich talks about what federal CIOs should keep in mind as they weigh the merits of a future in the cloud, including which applications are suitable for the cloud and the importance of identity management.