Contact Us

|

Careers

|

Change Locale
close

Posts by Emily A. Davidson

Featured Article
Microsoft’s Azure Stack extends public cloud capabilities to on-premises data centers with first-to-market Dell EMC Cloud Appliance.
Featured Article
SAP has told its customers they have until 2025 to prepare their infrastructure for SAP HANA — the in-memory database and platform, promising to replace traditional environments with 10-1000x faster performance, real-time insight and overall IT simplicity.
Featured Article
Client Computing | December 7, 2017 by Emily A. Davidson
Replacing hardware every three years is an expensive solution. Here are 3 reasons NOT to replace laptops or workstations that are out of warranty.
Featured Article
Enterprise Software | November 13, 2017 by Emily A. Davidson
We just launched The Amplify Vendor Flipbook to help curate, highlight and share technology news and advice that might not be on your radar…yet. Amplify is an inclusive, vendor flipbook. It offers a way to review information about new vendors and their technology.
Featured Article
SAP HANA is on the cutting edge of in-memory database technology. If you’re an existing SAP HANA user, you are undoubtedly looking for ways to improve the speed and availability of your in-memory databases.
Featured Article
Collapsing the infrastructure stack into a single consumable hyper-converged IT system will streamline operations, resolve interoperability issues and bring cloud-like efficiency to your on-premise environment. If you want to take a deeper dive, into how hyper-convergence will transform your business, download this free eBook: Hyperconverged Infrastructure for Dummies – SimpliVity Edition.
Featured Article
In this article, we cover the key benefits of subscription licensing and why now is the perfect time to make the move from maintenance to subscription.
Featured Article
Our Hybrid IT Director, Matt Sirbu, gives words of wisdom in this EMC Unity Q & A on what IT leaders need to know before spending a dollar on new storage.
Featured Article
Security | July 29, 2016 by Emily A. Davidson
Think your endpoint security is enough to guard against today’s advanced targeted attacks? You may need to think again.
Featured Article
  As clients work with Softchoice to evaluate whether Smart Net Total Care will provide what they need, the inevitable question arises: how secure is my sensitive network data? Read on and get a quick reference guide for Smart Net Total Care security, including collection, transmission, processing storage and viewing.
Featured Article
From the experts | September 22, 2014 by Emily A. Davidson
There was a time, back in the horse and buggy days or even the early days of automobiles, where dirt roads were just fine. They could be a little dusty or muddy at times but they fit the technology requirements well enough. They did the job. But once technology improved, once heavier cars and particularly […]
Featured Article
From the experts | August 17, 2012 by Emily A. Davidson
Of virtual domains and load balancing: some benefits of network virtualization.  It’s a common problem: by underutilizing their resources, most data centers end up deploying more servers than they need to. Those additional servers increase costs, of course, but they also create more disparate environments that are tough to manage. But now IT has the […]
Featured Article
From the experts | July 24, 2012 by Emily A. Davidson
While BYOD (bring-your-own-device) seems to be a major concern of IT administrators today, BYOA – or bring-your-own-application – is becoming increasingly as significant. Using third-party applications and cloud services in the workplace brings about a host of control, security and productivity considerations. And just like BYOD, BYOA is real. According to a recent Fortinet study […]
Featured Article
From the experts | July 16, 2012 by Emily A. Davidson
Depending on your organization, BYOD means a lot of different things. BYOD can be a welcome change (employee retention, talent acquisition, employee satisfaction, productivity enhancement, lower IT costs, and potentially customer satisfaction) or a challenge (security, access/restriction of data, lost devices, etc). Regardless, the first step is knowing the who’s, what’s and where’s of your […]
Featured Article
From the experts | July 16, 2012 by Emily A. Davidson
  Spring may mean warmer weather, but for most of us it also means getting in touch with our inner hoarder: seriously digging into our closets, cupboards and drawers and parting with stuff we don’t use anymore. The alternative, of course, is watching helplessly as our dens, basements, hallways and garages simply become makeshift storage […]
Featured Article
From the experts | March 16, 2012 by Emily A. Davidson
WAN optimization: the same network experience for all.  As virtualization and cloud computing drive more and more traffic over wide area networks (WANs), end users are expecting and demanding connectivity to access their applications from anywhere and any device, any time. This in spite of the fact that poor application response times at remote sites […]
Featured Article
From the experts | February 10, 2012 by Emily A. Davidson
This article originally appeared on Stephen’s personal blog. You can visit it here.  Most people feel naked without their smart phones and tablets. The adoption rates of these devices over the last five years have been explosive with an expected 10 billion by 2020, according to Morgan Stanley  (to give you an idea of the magnitude […]
Featured Article
From the experts | January 10, 2012 by Emily A. Davidson
 Important considerations with BYOC strategy  Employees who are given laptops by their company might use their hardware eight hours a day. The remaining eight hours of awake time, in the evening or on in transit, they might connect to the office to check email or catch up on work they didn’t get a chance to […]

Categories