IT in the News

Home/IT in the News

Complexity, Cloud, and Campus: Introducing Effortless Networking

Brocade Guest Blog - Complexity, Cloud, and Campus: Introducing Effortless Networking Guest Blogger - Siva Valliappan As users appetite for mobility, video, unified communications and virtual desktop solutions grow, they will increasingly look to IT to fix the weak link in deploying these technologies – the campus network. The campus network is [...]

Halloween Horror: Cisco to Raise Catalyst Switch Pricing by Up to 67% on November 2

Here’s a bit of news that will give you a good scare this Halloween—effective November 2, Cisco will raise the price on older generation Catalyst 3000, 4000, and 6000 switches. We all know that the older equipment gets, the longer it’s been on the market, the more available it becomes. Parts are easier to acquire and more engineers [...]

The Truth About Refurbished Hardware

Purchasing refurbished IT hardware offers many advantages for a business of any size. By purchasing refurbished hardware, a company can save money without sacrificing quality. On average, hardware that is restored is between 6 and 18 months old. That means there are refurbished options available for even the latest technology. Where does it come from? Refurbished hardware comes [...]

Implications of the Dell-Oracle Partnership

On June 4th, Dell and Oracle made an announcement that caused quite a stir in the IT community. At Dell's enterprise forum in San Jose, the President of Enterprise Solutions for Dell, Marius Haas, revealed a new alliance between Dell and Oracle. Dell named Oracle as its preferred enterprise infrastructure partner and Oracle named Dell as its preferred [...]

IT Breach: Startling HIPAA Violation Statistics

The infographic below outlines some of the commonly reported reasons for a HIPAA violation in 2012. An IT breach, especially one regarding HIPAA violations, can have a serious impact on your business, and CentricsIT can help. From disk destruction and data erasure to responsible recycling and disposal, CentricsIT can help you ensure your data is protected even after [...]

GoDaddy Hacking and DDOS Attack: Are You Vulnerable

GoDaddy Hacking and DDoS Attack: Are You Vulnerable? How F5 Application Security Manager Stops DDoS Attacks. was attacked on Monday over the course of several hours by a malicious Distributed Denial-of-Service or DDoS attack that temporarily took down all websites hosted by and interrupted e-mail communication from anyone using its e-mail services. The hackers bragged about [...]

Gold Medal Tech: The IT Behind the Olympics

This August, the world’s attention will focus on London, where the most incredible athletes alive will compete in the Games of the XXX Olympiad. But the Olympics aren't just about the athletes—they are about the spectacle. They are about putting on the world’s biggest event and broadcasting it live around the world every two years. Footage of the [...]

Go to Top