Dropbox recently announced a new chapter for the company that includes nurturing a family of apps. Loom and Hackpad are its newest members.
NEWS ANALYSIS: Red Hat says virtual containers will be an efficient way to distribute applications across the hybrid cloud infrastructures that are favored by enterprises.
The software giant teams up with the University of Texas at San Antonio to explore environmentally friendly ways of powering data centers.
Software-defined storage enables automated control of data flows and allows most legacy hardware to be kept online, with only software needing an update.
Database-as-a-service technology, live upgrades, storage improvements and federated identity are part of the new open-source cloud platform release.
With growing business opportunities in the Asia Pacific region, Google has expanded the availability of the Google Cloud Platform to encourage developers there to use it for new apps and innovations.
A new, deeply integrated backup offering and an object storage solution expand Oracle's reach into the enterprise cloud market.
Insight 5.0 is designed to give enterprises the ability to rapidly assemble, analyze and visualize large amounts of complex data.
The company spills details on a compressed, bootable version of Windows for devices with limited storage.
The words "innovation" and "stack" are now starting to be used together to form a new IT industry term. This IT stack—not particularly new for more progressive IT shops but certainly new for many midrange and smaller enterprises—is defined as such: a heterogeneous infrastructure that combines IT from best-of-breed vendors and/or open-source communities at each layer to deliver a sophisticated architectural model that addresses the full needs of the data center. Parts of this have been called "converged infrastructure." As virtualized/distributed computing becomes more common, this virtualized stack is making new and existing IT hardware much more efficient and cloud-ready. At the same time, new business requirements, operational challenges and data complexities are rising to new levels, forcing new thought about refreshing older data centers. As users look to revisit their IT infrastructure to utilize all these cloud-ready benefits, this may be the year that the innovation stack redefines IT entirely. This slide show, using industry perspective from eWEEK reporting and network storage provider NetApp, offers 10 key data points for IT managers to consider as they investigate the deployment of this new model.
"We are building a home for people on the Internet," CEO Drew Houston tells a news conference.
Huawei and Intel will staff a new technical team to conduct development in IT architecture, R&D road map sharing and optimization of products.
Smart Data provides hosted and on-site legal discovery services using specialized Viewpoint software.
Companies are finding new ways to combine physical, virtual and cloud environments to control costs in new-generation data centers. Traditional clusters based on shared storage (namely, storage area networks) are no longer the de facto choice for protecting business-critical applications in these new environments. SAN-less cluster packages, which are able to pool a large amount of unstructured data across a variety of storage configurations, have attributes that work well for both new-gen and older IT systems. These features enable data center managers to utilize the flexibility and cost savings of cloud, virtual and high-performance storage, and mixed infrastructures without sacrificing availability or disaster protection for business-critical applications. This eWEEK slide show, using industry insight from Jerry Melnick, chief operating officer of San Mateo, Calif.-based SIOS, presents 10 questions to ask that will help determine if a SAN-less cluster solution is right for your enterprise. SIOS makes both SAN and SAN-less software that protects data and applications from downtime.
The CryptoDefense data-napping malware follows the playbook of CryptoLocker but leaves behind the decryption key on the infected computer, security researchers find.