IBM has extended partnerships with providers of data center infrastructure technology to expand the deployment of the company's Portable Modular Data Center worldwide.
With the advent of cloud computing, rich Internet applications, service-oriented architectures and virtualization, data center operations are becoming more dynamic with fluid boundaries. The shifting form of computing adds layers of complexity that have broad implications for how IT managers secure the components that make up a data center.
Cloud computing still has a lot of uncertainties -- among them a lack of maturity among many of its potential services -- but the path toward this nest era of enterprise computing is beginning to take shape.
Technology companies that expect to beneift from cloud computing must creatively adapt licensing, pricing and revenue models.
Capacity planning is a vital component data center managers need to implement in order to achieve power savings and other benefits from virtualization technology, according to IT managers representing two federal organizations.
Cloud computing will fundamentally change the shared services model, National Business Center director predicts.
Security issues, data privacy, the acquisition process, standards and service level agreements were among the chief issues that feds grapple with.
The 2,048-core system, nicknamed Longhorn, will be capable of 20.7 trillion floating-point operations per second, will help researchers keep pace with the explosive rate of data production, TACC officials said.
Agencies running stand-alone Fibre Channel-based Storage Area Networks may be able to reduce the amount of cabling snaking through their data centers, thanks to an emerging converged network protocol named Fibre Channel over Ethernet.
The fusion center approach used in antiterrorism operations could also be applied to other civilian uses, such as bridge and road monitoring and electronic business reporting.
If the latest semiannual round of security advisories from Cisco are any indication, DOS attacks continue to be a serious — and largely unsolvable — problem for networks.
The Defense Information Systems Agency plans to bolster security features embedded in its far-flung networks and data centers via several acquisition projects planned for the twilight of fiscal 2009.
A storefront for the federal government will let agencies acquire cloud computing technology as easily as consumers can sign up for Gmail accounts.
Defense Department officials want to know whether virtualization technology can make DOD’s networks more secure and easier to manage.