Vom virtualisierten Server zum dynamischen Rechenzentrum - Alles virtuell

Virtualisierung umfasst unterschiedliche technische Konzepte und ermöglicht es, unterschiedliche Zielsetzungen zu verfolgen: Vom virtualisierten Mail-Server über das dynamische Rechenzentrum bis zum Cloud Computing. Von Jochen Puls, Consultant bei der adesso AG in Dortmund.

Read More

Gigamon: Neugestaltete Management-Oberfläche ermöglicht ‚Visibility as a Service‘

Virtualisierung der Visibility Fabric: Multimandantenfähiger Überblick über alle Netzwerkdatenströme für verschiedene IT-Abteilungen

Read More

VMware delivers vCloud® Hybrid Service™

VMware, Inc. has announced the general availability of the new VMware vCloud® Hybrid Service™, new data center locations, and new capabilities to make it simple to bring existing and new cloud-native applications to the public cloud.

Read More

Savvis and VMware to expand VMware vCloud® Hybrid Service™ locations

CenturyLink to launch low-latency network services to connect VMware vCloud Hybrid Service.

Read More


Red Hat continues Cloud Infrastructure momentum

New offerings and leading benchmark result highlight Red Hat as a top alternative for organizations seeking to reduce cost and avoid lock-in on journey to cloud.

Read More

ThousandEyes, the Internet and Cloud Intelligence company, has published the findings of its second...
The third annual Managed Services and Hosting summit, held recently in Amsterdam, revealed a sector...
New Q4 data from Synergy Research Group shows that spend on cloud infrastructure services jumped...
New Q1 data from Synergy Research Group shows that worldwide spend on data center hardware and...
Small business adoption of Cloud is growing but more needs to be done to improve confidence and...
Two Unisys-led consortiums win contracts to support applications, architecture, information...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more