This Week In IT: 12/28/12

By - Source: Toms IT Pro

Tom's IT ProTom's IT Pro

This Week On Tom's IT Pro: How to Use File History on Windows 8, How to Use File History on Windows 8, Less and More: A Buyer’s Guide to 4U Servers, Illustrated Guide to Making the Move to 10 Gigabit Ethernet, The Microserver: Three Key Players, Three Different Views, and more.

New program for communication service providers enables enterprises to pursue cloud, mobility and BYOD initiatives without capital investment. 

Energy management company introduces new power analysis module for that enables IT.

Internal Cloud Bandwidth Concerns: The Buyer’s Perspective

IT departments generally overbuy or underbuy bandwidth because they lack a firm grasp on what applications require and what end-users expect and demand.

Emerson Network Power recently introduced a new large-scale cooling system for data centers.

There are several reasons why you should try virtualization. 

Enterrprise mobile devices are proliferating like rabbits in the spring. Rachel Rosmarin tells you how to keep them under control. 

Internal Cloud Bandwidth Issues: A Vendor’s Perspective

Enterprises can benefit from viewing matters surrounding from all perspectives, including that of network equipment vendors. 

Asetek CPU and GPU cooling devices gaining traction in the data center market. 

Webair now offering a geo-redundant email hosting solution. 

Begins offering its X3-2 big data appliance with Intel's Xeon E5-2660 Sandy Bridge 8-core processors.

Slideshow: Essential Open Source Tools for the System Administrator

We have selected some tools you should always have available and some that can make your job a lot easier.

Now enables developers and administrators manage their AWS services from the Windows PowerShell scripting environment with more than 550 cmdlets.

Recent advances in computing horsepower have given new meaning to brute-force attacks on passwords.

Announces a 28 percent reduction in prices for Windows Azure Storage. 

Slideshow: Top Ten Major Security Breaches of 2012

Take heed from these cautionary tales: Here are ten terrible security breaches that occurred in 2012.

James Alan MillerJames Alan MillerJames Alan Miller is Managing Editor of Tom's IT Pro. He is a veteran technology journalist with over seventeen years of experience creating and developing magazine and online content. Founding editor of numerous business and enterprise computing sites at the internet.com network, James headed up the After Hours section at PC Magazine, as well as hardware and software sections of various Windows publications.

See here for all Tom's IT Pro articles written by James.

Recent IT Videos

VIDEO: Big Data, Big Hardware, Big Software

As data grows so must the hardware, software and access tools to give it meaning.

VIDEO: Quick Look - Intel S2600CP Motherboard

A 3D fly-through of Intel's S2600CP 

VIDEO: Quick Look - Intel S2600IP Motherboard

A 3D fly-through of Intel's S2600IP motherboard.

VIDEO: Data Center Convergence

Everything you need to know about the new data center.


Discuss
Comments
stable