IT Today: Disaster Recovering and the Cloud, Cartoon: Government Cybersecurity Jobs, Tilera’s New72-Core 64-bit SoCs,

By - Source: Toms IT Pro
Tags :

Tom's IT ProTom's IT ProToday On TIP: 2013's Top Paying IT Certifications, RSA SecurID for Two-Factor Security, VCE Expands Vblock Cloud Infrastructure Systems, onverged Storage Reins in Big Data, What's a Virtual Phone?, Application Optimization Who's Watching Your Network?, and more.

A Guide to Disaster Recovery in the Cloud

Cloud-based disaster recovery services are not taking the world by storm. Why is that?

Cartoon: King on IT – Cybersecurity Job Anyone?

Federal government, including the Pentagon, announce plans to expand its cybersecurity force.

Veeam Offers Extended Support for vCloud Director

To allow administrators to backup and restore vCD databases, vApps, VMs and other components directly to vCD.

Tilera Debuts 72-Core 64-bit SoC

Doubles the computing power of Tilera's most recent 36-core Tile-Gx36 chip.

Top Paying IT Certifications of 2013

Training and certification guru Ed Tittel comments on a recent list of the top 15 paying IT credentials for this year.

Moore’s Law In Pictures: An Illustrated History of the Microprocessor

Consider the orders of magnitude (and sheer manufacturing prowess) required to morph the very first 4-Bit microprocessors into the multicore powerhouses we use today.

Sponsored: Converged Storage Reins in Big Data

Converged storage controls explosive data growth while maintaining operational efficiency and simplicity.

VIDEO: What's a Virtual Phone?

Mobile Virtualization Platform on near horizon!

VIDEO: Application Optimization Tune Ups Network Performance

Before dismissing network performance problems as something you can live with, consider the adverse impact slow application response times can have on your business.

VIDEO: Who's Watching Your Network?

By monitoring the network, you’re really monitoring connectivity between devices and their performance.

Slideshow: Ten of the Worst Security Breaches of All Time

Enormous data breaches were much harder to accomplish in the days before networked electronic databases.

Is the Public Cloud Safe?

This article is the first of a series that examines public cloud security—its concerns, current status and questions potential adopters should ask.

Recent Articles

Swimming with Sharks in the IT Fish Tank

Fish tanks one of the better analogies for corporate IT management.

Getting Started with the Cloud: Rackspace Open Cloud

Hosting company turned cloud computing champion competes intelligently by focusing on customer service and offering core cloud computing services.

Adult Education for IT Advancement: You Get Back What You Put In

Simply taking a class isn’t necessarily going to boost your IT career all by itself.

Cartoon: King on IT – The Dell Buyout

Michael Dell romances investor Silver Lake to buyout the struggling company he founded.

Sponsored: Scaling Out with Converged Networks

Networks need to be simpler, flatter and more capable of meeting the high-scale demands of dynamic workloads

Slideshow: The History of the Desktop Operating System

Join us for a journey back in time and meet those operating systems that laid the foundation for the computer as we know it today.

Cartoon: King on IT – Cybersecurity Drones

The government gets serious about cybersecurity.

Slideshow: Buyer's Guide - Application Optimization Appliances

As businesses struggle to meet the needs of remote, mobile and branch office users, IT pros are striving to find ways to improve the performance of line of business applications.

Public Clouds: Matters Of The External Connection

It's a mistake for enterprises to assume that after making the move to a public cloud service that all “infrastructure has gone out the door” and bandwidth worries are no more.

Internal Cloud Bandwidth Concerns: The Buyer’s Perspective

IT departments generally overbuy or underbuy bandwidth because they lack a firm grasp on what applications require and what end-users expect and demand.

Implement QoS for Better Network Performance and Reliability

IT pros now looking to Quality of Service as way to alleviate the thorny network problems they wrestle with every day.

Avoid Network Performance Problems with Automated Monitoring

IT pros now looking to Quality of Service as way to alleviate the thorny network problems they wrestle with every day.

VIDEO: Why Virtualize?

There are several reasons why you should try virtualization.

When Application Tuning Becomes Network Optimization

When application components have been tuned but performance problems remain, the network becomes a prime suspect.

More Recent IT Features & Blogs

Application Control: How to Detect Performance Bottlenecks

VLANs, Subnets and Confusion – How to Monitor Complex Networks

Slideshow: Buyer’s Guide - WAN Optimization Appliances

A Crash Course in Network Performance Monitoring: A Manager’s Guide

Making It In IT: Advice for an IT Contractor from India Working in U.S.

VIDEO: Ed's Story - From Mainframe to Virtualization

Sponsored: Converged Infrastructure Transforms IT

The Big Tent of Identity and Access Management: Bringing IT and Business Together

VIDEO: Quick Look - Intel S2600CP Motherboard

Video: M2M Communication - The Rise of the Machines

Sponsored: Converged Clouds Empower IT

VIDEO: How Secure Are Your Mobile Devices?

Determine Right Mobile Automation Testing Matrix and Improve End-User Experience

Building Business Skills for IT Entrepreneurship

Getting Started with the Cloud: Amazon EC2 Cloud

Control Costs When Pursuing IT Training at a University

Sponsored: Blade Servers Cut IT Costs

Encryption Doesn’t Always Mean More Secure

Take the Multi-Pronged Approach to IT Learning

VIDEO: Cloud Services: No Buzz, No Bull

New Year, New Plans: Make an IT Career Self-Assessment

Enterprises to Blackberry 10: Should We Stay Or Should We Go?

An IaaS Buyer's Guide: Getting Started

Slideshow: The Evolution of the Desktop Computer

Recent IT Slide Shows

Slideshow: Hottest IT Certifications for 2013

Slideshow: Glad to Know You! Soon to Become Irrelevant Technologies

Slideshow: Intel Processors Over the Years

Slideshow: Rugged Tech for the Enterprise

Slideshow: The Ten Most Influential People in IT

Slideshow: Essential Open Source Tools for the System Administrator

Slideshow: Top Ten Major Security Breaches of 2012

An Illustrated Guide to Making the Move to 10 Gigabit Ethernet

Slideshow: Essential Proprietary Network Admin Tools

Slideshow: Top Paying Technology Jobs by Position

An Illustrated History of Hacking Through The Years

Slideshow: Gadgets for the System Administrator's Toolbox

Slideshow: A Guide to Trading Your Laptop for a Tablet

Cloud Acronyms Illustrated: SaaS, PaaS, IaaS, and More

An Illustrated History of Hacking Through The Years

Slideshow: Horrifying Data Center Disasters

Slideshow: Top 10 Cities for IT Jobs

Slideshow: Intel Processors Over the Years

More Recent IT News

James Alan MillerJames Alan MillerJames Alan Miller is Managing Editor of Tom's IT Pro. He is a veteran technology journalist with over seventeen years of experience creating and developing magazine and online content. Founding editor of numerous business and enterprise computing sites at the network, James headed up the After Hours section at PC Magazine, as well as hardware and software sections of various Windows publications.

See here for all Tom's IT Pro articles written by James.