Solving customers’ business problems with technology solutions

Prolifics Technology Journal

Subscribe to Prolifics Technology Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Prolifics Technology Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Articles from Prolifics Technology Journal
From Application Virtualization to Xen, a round-up of the virtualization themes & topics being discussed in NYC June 23-24, 2008 by the world-class speaker faculty at the 3rd International Virtualization Conference & Expo being held by SYS-CON Events in The Roosevelt Hotel, in midtown ...
Yesterday we read the news of B-hive's acquisition by VMware. Also this week Microsoft closed the Kidaro acquisition, which had been announced earlier in the year. Both of these companies participated in SYS-CON's second international Virtualization Conference & Expo last November in S...
Just as people begin to understand the difference between web ops and IT, we are entering a period where clouds promise 'Ops-Free' computing. Because it's easy, scalable, available and disposable, the cloud is well on its way to becoming 'technology's next big thing.' However, with rec...
Cloud Computing offers significant benefits over traditional solutions for deploying production systems as well as for conducting development and testing activities. This session will distill the unique characteristics of clouds and describe how to best think about deployments in the c...
With the adoption of virtualization, virtual machines are replacing physical servers in the data center and introducing a unique set of management requirements. Policy-based management in the virtualized infrastructure is an approach that is used to simplify and automate management by ...
As server virtualization gains mainstream adoption, it is increasingly being deployed to support a broad range of data center initiatives that extend beyond simple server consolidation and development and test. Today, enterprises of all sizes are realizing the true potential of server ...
Join MokaFive co-founder and CTO, John Whaley, as he discusses desktop virtualization as a potential dream-come-true for IT administrators faced with demanding users and impending disasters. Whaley will cover how desktop virtualization provides solutions to accommodate a mobile workfor...
Virtualization comes in many forms, and by combining multiple technologies, enterprises can transform the way they deploy and manage their software. This session will examine how an enterprise can combine the use of layer-2 'desktop' hypervisor technology, layer-1 dedicated server virt...
Today, offerings such as Amazon Web Services' Elastic Compute Cloud (EC2) are providing a new model for on demand compute resources based on virtual machines. Virtual appliances are a natural deployment vehicle for this type of infrastructure, allowing a clean separation between the me...
Cloud Computing, in its current incarnation, falls short on its promise to make computing as a whole as simple as plugging an application into a utility service. The 'cloud' model initially has focused on making the hardware layer consumable as on-demand compute and storage capacity. T...
The demand for storage has increased exponentially, placing significant stress on current 'in house' storage architectures and costly overcapacity build-outs. Factoring in pressures of power, space, large capital expenditures, global performance, and availability issues, companies are ...
As more enterprises embrace virtual infrastructure for part or all of their compute infrastructure, tools are needed to effectively control both physical and virtual. Few large organizations seek to virtualize all of their servers due to the performance hit of virtualization layers. Dy...
Currently most desktop productivity software including browsers, mail clients, Office suites, IM, and media players make direct connections to the Internet and/or run untrusted content. As a result, these applications, which are core to office productivity, are also the primary vector ...
This session describes how the wave of virtualization technology in the data center can be extended beyond hypervisors to embrace complete IT infrastructure management resulting in significant business value. It will commence by summarizing the fundamental problems that are holding bac...
Cloud technologies offer many benefits over traditional IT systems, especially when managing the size and vastness of unstructured data and unpredictable growth in IT environments. But when does it make sense to adopt cloud technologies and migrate a set of your IT services to the clou...
Virtualization enables strategic benefits, but significantly impacts infrastructure, operations and configuration management. Virtualization's additional complexity and new management challenges can adversely affect TCO, reduce service levels, threaten security and pose compliance issu...
Virtualization carries the promises of flexibility, lower costs, ease of deployment and simplified server management. However, when condensing the physical resources of your enterprise, are you considering how to make applications easily accessible to the growing number of remote users...
Currently, an overwhelming majority of organizations are migrating and consolidating servers from physical to virtual environments. While the savings of the virtualized data center are extremely compelling, there is a new set of challenges that IT staffs didn't have to deal with in the...
Analysts estimate 80 percent of today's virtualized environments run on VMware technology. However, that landscape will shift over the next 12 to 18 months as more powerful processors, competing hypervisors, virtual desktop infrastructure (VDI) and cloud computing take hold. Virtualiza...
While organizations and IT staff continue to see the many benefits of implementing virtualization, the challenge of controlling virtual infrastructures is quickly arising as a top management priority. Virtualization benefits are offset by issues such as security, administration, increa...
Vyatta delivers complete, ready-to-deploy, open-source networking solutions that make it possible for anyone to own an enterprise-class router/firewall/VPN for a fraction of the cost of traditional closed-source, proprietary products. By combining the features, performance and reliabil...
The eG Monitor for VMware Infrastructures (the eG VM Monitor), part of the eG Enterprise Suite, is a comprehensive solution for monitoring and managing all aspects of virtual hosts and guests, whether the infrastructure is used to support server or desktop applications. In May 2008, eG...
Third Brigade Deep Security host IDS/IPS protects critical data and applications on virtual machines and physical servers. With a high performance deep packet inspection engine, Third Brigade Deep Security detects and prevents known and zero-day attacks that bypass or penetrate network...
Specifically created for Citrix XenDesktop and with knowledge workers in mind, the all-new Wyse Viance high performance desktop appliances are designed to both maximize the user experience and minimize administration across a virtualized infrastructure. Wyse Viance desktop appliances i...
As network switch latencies fall and the architecture for processor coherency migrates from a frontside bus to a coherent network, technology is driving towards the next generation of distributed processing, which extends a microprocessor's coherent interconnect onto a standard network...
Virtual Foresight is a policy-based virtualization management product that delivers out-of-the box best practices for enforcing IT Operations and Security policies. Acting as a critical control point, Virtual Foresight ensures policy enforcement throughout the lifecycle of a virtual ma...
The Ingres Icebreaker BI Appliance is a self contained software stack of o/s, database, and business intelligence tools. The solution is provided in a single stream install enabling a rapid and easy deployment of a complete BI environment within a VM. The software appliance comes with ...
Kidaro delivers an end-to-end desktop computing solution for enterprise desktops and laptops. The Kidaro platform leverages innovative virtualization technology to enable enhanced security, manageability, and mobility without disrupting existing desktop capabilities and infrastructure.
DataSynapse's GridServer is a service execution platform that dynamically scales enterprise application services based on performance and business requirements. GridServer provides a simplified approach to enabling business critical application components to execute across the entire a...
VIRTERA is an independent Information Technology (IT) professional services and consulting firm delivering virtualization technology solutions and services to companies nationwide. VIRTERA's proven Virtual Operations Framework (VOF) methodology ensures successful and rapid adoption of ...
SemanticSpace announced its acquisition of 100 percent of Prolifics, a distinguished systems integrator specializing in IBM technologies. Prolifics complements SemanticSpace's offering with its high-value services focused around the IBM brand - making the combined entity a truly Global...
Continuity Software is a provider of Disaster Recovery Management (DRM) solutions. Its RecoverGuard software mitigates disaster recovery (DR) risks by detecting data protection gaps and vulnerabilities between customers' primary production and disaster recovery sites and/or localized D...
Catbird is a pioneer in security and compliance for virtual environments. Via Catbird V-Security and the Catbird V-Agent virtual appliance, Catbird has full visibility and enforcement of the virtual network. Catbird compliance functionality includes enforcement of separation of duties;...
VLX for Network Infrastructure 3.0 is VirtualLogix's Real-Time Virtualization software, designed to address the demanding environments of communications equipment. With VLX for Network Infrastructure, VirtualLogix is meeting the needs of embedded network infrastructure equipment makers...
Shavlik Technologies provides automated, continuous patch assessment and remediation of the total virtual world, including Offline Virtual Images. Continuous assessment and remediation results in a network that is more secure and that reduces operational costs related to managing patch...
VKernel's Capacity Bottleneck Analyzer continuously monitors CPU, memory, and storage utilization trends in VMware ESX environments across hosts, clusters, and resource pools. By utilizing VKernel's quick-to-install virtual appliance model, users can eliminate current capacity bottlene...
The Infrastructure Center for VMware, briefly IC, offers essential add-on functionalities for virtual environments based on VMware ESX. mySoftIT's IC is acknowledged as innovation product 2008 and is honored with the IBM Beacon Award 2008 for its worldwide communication with TSM. IC in...
The Teneros Velocity series is a complete family of Application Continuity Appliances for high availability and disaster recovery of the primary, business-critical application - Microsoft Exchange. Teneros plug-&-go appliances protect essential communications by assuring 24X7, ongoing...
TRANGO's inherently secure Hypervisor runs rich operating systems such as Windows CE, Linux, and Symbian, or RTOS' such as eCOS or uITRON in simultaneous and separate environments on single and multi-core platforms based on a wide variety of ARM and MIPS architectures.
TBDVirtualFirewall for VMware ESX is designed for virtualized DMZ environments. It allows you to deploy virtualization technology in the DMZ while complying with established security and audit requirements. Virtual Network Policies support the separation of duty needs of security and v...