9 Results for:RS/6000
- Sort by:
IBM acquisitions may be best path back to the top
07 Jan 2020With internal AI and cloud projects such as Watson failing to deliver much revenue, analysts think IBM needs to acquire, not build, its way back to sustainable growth. Read More
10 DRaaS vendors to vet before devising a data recovery plan
27 Apr 2020DRaaS enables organizations to leave the management of their DR plan to a third-party provider, saving time, money and resources. Learn what services these 10 DRaaS providers offer. Read More
Preparing for 'little disasters' often neglected
20 Aug 2006Tom Dugan, CTO of Recovery Networks, says it's common for users to prepare to lose an entire building -- but aren't ready for small-scale losses – like losing a server. Read More
NetApp and Synology top NAS storage systems survey
04 Mar 2016A storage pioneer and relative newcomer land top honors in our 10th Quality Awards NAS storage systems survey of midrange and enterprise users. Read More
Wap usage: Planes, phones and automobiles
15 Nov 2000
So your globe-trotting executives want to change their itineraries in mid-journey and need to check that their revised schedules still fit with corporate...
Read More
Servers developments under the spotlight
31 May 2000
IBM claims a 20%-30% efficiency improvement with its latest processor technology compared with existing chips. The silicon-on-insulator technology uses a glass...
Read More
Comparing Unix versions: AIX, HP-UX and Solaris
08 Jul 2009In this comparison of the top Unix versions, learn what distinguishes the file systems, management tools and virtualization products in Sun Solaris, Hewlett-Packard HP-UX and IBM AIX file systems. Read More
IP storage switch and router specifications
24 Apr 2007Key specifications for a cross section of popular IP storage switch and router products. Read More
DNS for a wireless network: Router Expert
21 Jul 2006DNS services are essential for building a secure wireless LAN. Our Router Expert provides complete instructions for setting up a DNS server, including implementing BIND, configuring a non-authoritative server and ... Read More