Recent Articles by Fred Donovan
Finding ways to turn the flood of data into useful information for business decisions is a growing challenge to the IT profession and C-level executives.
Spear phishers are baiting their hooks for 'big phish' with access to highly valuable corporate information, a strategy known as whaling.
These threats come from attackers with substantial means, backing and motivation to inflict major damage.
Join thousands of others with our weekly newsletter
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.
- Mar29 Health Check: Maintaining Enterprise BI
- Apr11 Discovering Big Data in the Fog: Why Catalogs Matter
- Apr18 A Winning Strategy for the Digital Economy
Being digital should be of more interest than being electronic.- Alan Turing, 1947