corsa-sdn

Hardware still plays an innovative role in software-defined networking

A emerging Ottawa-based networking company is looking to simplify software-defined networking (SDN) by providing easy programming capabilities and leveraging open standards....

May 13th, 2016 Gary Hilson

Considerations for the next phase of hyperconverged infrastructure

Considerations for the next phase of hyperconverged infrastructure

Hyperconvergence has been receiving a tremendous amount of attention because it represents the next step in the evolution of IT...

April 2nd, 2016 IT World Canada Team

dell-emc

Dell Services to be sold in wake of EMC acquisition

Since Dell Inc. announced its acquisition of EMC Corp. last fall, the company has begun the expected reorganization in preparation...

March 30th, 2016 Gary Hilson

© IT World Canada

Here’s why LTE networks are about to become much more useful

There’s more to LTE than just speeding up communications between mobile devices, and its increasingly faster speeds – now at...

December 4th, 2015 Gary Hilson

dell-emc

Dell sees open, ‘new IT’ as critical to Canada’s competitive advantage

Tom Petty once crooned that the future was wide open. For Dell Inc., the future is about being more open...

November 24th, 2015 Gary Hilson

Cyber security

George Neville-Neil, engineer and author talks coding, trends, and tips

There are tremendous benefits to enterprises in following the work of coding industry leaders to understand the best resources, lessons, tips, developments...

August 10th, 2015 Stephen Ibaraki

6168483285_001238bd1c_b

How mobile device use is pushing wireless bandwidth expectations ever further

Enterprises are hungry for wireless bandwidth, and upgrading access points to 802.11ac is not enough. According to a forecast recently...

August 6th, 2015 Gary Hilson

sharpening IT skills

Sharpening the CIO saw

You are a smart person. You wouldn't have gotten to where you are without being smart. But I have news...

July 19th, 2015 Kevin Pashuk

Slide 1 security Shutterstock

Addressing the Full Attack Continuum: Before, During, and After an Attack

A security model that addresses the full attack continuum - before, during and after an attack - is required to...

January 12th, 2015 IT World Canada Team