Stories by John Brandon

In pictures: Mondo datacentres

Think you have to manage a lot of IT gear? These massive facilities - each at least 100,000 square feet and most much larger than that -- house thousands of servers and process millions of documents, images and videos every day.

Written by John Brandon13 June 12 08:55

Hollywood's Elite Data Centers Must Deliver Star IT Performances

Hollywood movies inspire us with wondrous sights and well-crafted dialogue. The jokes in The Avengers blend seamlessly into the bright blue skies and intense battle scenes, while the fantasy realm in Snow White and the Huntsman feels like something from a twisted dream.

Written by John Brandon12 June 12 15:48

Google Drive begs the question: Who owns your data in the Cloud?

Like any new technology, data storage in the cloud has gone through a maturation period. Employees started out, way back in 2007, moving a few files over to Dropbox.com. Then, IT started experimenting with cloud storage through more robust services like Rackspace Cloud Files. Now, executives are starting to wonder if all enterprise storage can be hosted in the cloud, and not in an on-premise data center.

Written by John Brandon03 May 12 04:47

Help for the Help Desk

A help desk can be a real lifesaver for employees, not to mention a productivity boost. If a keyboard stops working or Outlook keeps crashing, a technician is just a phone call away. Even complex problems can usually be resolved internally, and relatively quickly, without the need for an outside vendor.

Written by John Brandon24 April 12 00:24

Is mobile virtualization ready for your business?

New ideas in IT go through a long distillation process. Someone invents the idea, vendors talk about new product concepts, analysts weigh in on the value. Eventually, a new category of hardware or software materializes, but rarely in a fully formed state. With mobile virtualization, the pedigree is sound: Most organizations use some form of server virtualization in their data centers.

Written by John Brandon17 March 12 00:50

Standardizing the Desktop

The IT department is often at the forefront of an organization's technology innovation -- but not always. When it comes to the concept of a standard desktop -- every employee's core install consisting of an operating system, applications, hardware drivers and a security suite -- IT has moved at a snail's pace.

Written by John Brandon12 March 12 21:07

In depth: The new help desk - agile, educational, efficient

A help desk can be a real lifesaver for employees, not to mention a productivity boost. A keyboard stops working, or Outlook crashes repeatedly, and a technician is just a phone call away. Even complex issues can usually be resolved internally, and relatively quickly, without needing an outside vendor.

Written by John Brandon02 Feb. 12 03:41

How to prevent thumb drive security disasters

For such a small device, the plastic, handheld USB flash drive can cause big security headaches. Even if you have robust end-point security and establish rigid policies about employee use of these drives, employees still find a way to copy financial reports and business plans for use at home.

Written by John Brandon28 Jan. 12 02:56

Grow your data center with colocation

Brian Burch knew the moment had arrived. Two of his data center's key services -- availability and business continuity -- needed fast and dramatic improvement. Design and location limitations meant that his company's existing data center couldn't be upgraded to the levels necessary to provide the improvements in functionality and performance that he required.

Written by John Brandon10 Jan. 12 03:27

Five IT security breakthroughs promise to thwart threats

For the past 25 years, a war has waged between malicious programmers and the researchers trying to make computing safe for the enterprise. The battle has shown no signs of subsiding — once a new countermeasure is deployed, the hackers find new ways to make IT worried.

Written by John Brandon13 Dec. 11 03:50

Four rising threats from cybercriminals

Criminal hackers never sleep, it seems. Just when you think you've battened down the hatches and fully safeguarded yourself or your business from electronic security risks, along comes a new exploit to keep you up at night. It might be an SMS text message with a malevolent payload or an errant signal designed to jam GPS receivers.

Written by John Brandon22 Nov. 11 03:12

Legacy application fixer-uppers

Legacy applications are one of the most difficult issues to face within IT. A rip-and-replace approach is expensive and thus difficult to justify; plus, it tends to interrupt operations. Meanwhile, the aging software lingers in accounting's ledgers, overstays its welcome in sales and causes poor network performance throughout the organization.

Written by John Brandon08 Nov. 11 03:47

Standardizing the desktop: Strategies for success

IT is often at the forefront of technology innovation -- but not always. When it comes to the concept of a standard desktop -- every employee's core install that consists of an operating system, applications, hardware drivers and a security suite -- IT has moved at a snail's pace.

Written by John Brandon02 Nov. 11 02:09

Storage tips from heavy-duty users

If you think the storage systems in your data center are out of control, imagine having 450 billion objects in your database or having to add 40 terabytes of data each week.

Written by John Brandon12 Oct. 11 03:36

Replacing legacy applications: Four problems solved

Legacy applications are one of the most difficult issues to face within IT. A rip-and-replace approach is expensive, difficult to cost-justify and tends to interrupt business. Meanwhile, the legacy software lingers in accounting's ledgers, outlives its welcome in sales and causes poor network performance throughout the organization.

Written by John Brandon29 July 11 07:19
[]