Expert IT Blog
Featured Article

BLOG: Unveiling the Future: Highlights from the IBM Power Systems Modernization Summit
Rocket Software Rocket Software recently joined up with our esteemed partner, Mainline Information Systems, to co-host the “IBM Power Systems Modernization Summit”. The one-hour virtual summit was a resounding success, and we are thrilled to share key takeaways. As...
Recent Articles
BLOG: Benefits of VMware Software Subscription Enterprise License Agreement
Bryan Samson Strategic Alliances Manager “But it’s only $5.99 per month,” my daughter says regarding a new streaming service. In contrast, basic cable monthly contracts cost about $50-$100 per month, so it sounds like a good deal. But let’s add up the...
BLOG: IBM FlashSystem 5200 Entry-Level Storage Unveiling
Keith Thuerk Storage Engineer On February 9, 2021, IBM announced a new, rejuvenated FlashSystem array, the FlashSystem 5200, boasting superior application performance and an increase in ROI. The new FlashSystem 5200 (FS5200), intended to replace the IBM...
BLOG: Unstructured Data Solutions (UDS) – Dell Technologies
Bryan Samson Strategic Alliances Manager Unstructured data or non-database data like loose files, PDFs, photos, and video clips represent nearly 90% of annual data production with a growth rate of 55-65% each year, according to Forbes. That is an explosive...
BLOG: Dell EMC PowerScale Review: Enterprise Storage Solution for Object, Block, and File
Keith Thuerk Storage Engineer Modern data centers are built around several innovative IT building blocks, such as flexibility, agility, automation, and security. What does that really involve from a technology standpoint? Examples include an updated network...
VLOG: Cisco Security
4:54 Cisco’s rebranding of their security portfolio has been a game changer. Unified with the Cisco SecureX dashboard, the Cisco cybersecurity portfolio provides an efficient, solid security platform for IT professionals. Video Highlights Secure Firewall...
BLOG: Dell EMC PowerStore Metro Node Automates Business Continuity
Bryan Samson Strategic Alliances Manager Dell’s Midrange Storage flagship with industry-leading sync technology. This is a game changer for IT departments, since making data consistently available to your constituents is a constant struggle. As business needs evolve...
VLOG: Riverbed Solutions for the Cloud Era
4:20 Riverbed Solutions for the Cloud Era Video Highlights Overcome Cloud Traffic Latency Issues Improve Performance for Remote Workers Optimize Cloud Traffic with Riverbed Cloud Accelerator Increase Performance and Agility for SaaS Apps with Riverbed SaaS...
BLOG: Cisco Email Security Solutions
Marie Ashway Director of Marketing Email security breaches continue to be the number one threat vector both at work and in our personal email activities. Email also just happens to be one of the most important tools individuals and companies use to...
BLOG: Dell EMC PowerProtect DD: A Cloud-Enabled Solution
Keith Thuerk Storage Engineer Dell EMC PowerProtect DD is now setting the bar for data management from edge to core to cloud, giving you everything you need to protect a modern data center. PowerProtect DD is labeled as cloud-enabled, but what exactly does that...
BLOG: Advantages of Dell EMC PowerProtect DD
Keith Thuerk Storage Engineer Are you using the post-lockdown world to move out of the status quo within your data center? How are you addressing complexity in the backup realm? Could you benefit from an appliance that handles all workloads, including container...
BLOG: IBM DS8000 – The Market Leader for Mainframe Storage
Bob Elliott VP Storage Solutions In today’s storage system environment, most savvy storage people are familiar with the market leaders. Dell/EMC has the overall lead in external storage (27% share1 ). NetApp leads in file-based products. HPE, who leads in...
BLOG: Using IBM Cloud Pak for Security to Help Your Security Teams Address Risk
Dave Santeramo Security Architect Managing and maintaining a secure enterprise environment is becoming more and more challenging. The sheer number of security events that organizations must contend with are becoming increasingly complex. Threats such as...