The security game - is your business fit enough?

  • Published in

Asks Tim Keanini, chief research officer, Tripwire.

Read More

Professionals turn to Cloud-based IT applications

Cloud-based web hosting, backup and security applications see strong adoption levels as IT professionals streamline operations.

Read More

SUSE Cloud 2.0 now available to deploy and manage private clouds

  • Published in

SUSE enhances enterprise readiness of OpenStack-powered private clouds.

Read More

ICO carries resolution encouraging greater co-ordination of global data protection enforcement

  • Published in

The Information Commissioner’s Office (ICO) has won a resolution in Warsaw which is set to see improved co-ordination between global data protection and privacy authorities.

Read More

Ovum predicts telco IT spending to reach US$60bn in 2017

  • Published in

The global telecoms industry’s revenues will remain roughly flat over the next few years, with a decline in spending on voice services counterbalanced by growth in spending on mobile and fixed (broadband) data services, according to global analyst firm Ovum.

Read More

Fugaku is Japan's supercomputer that has been developed as a core system for the innovative...
In another innovative UK first for virtualDCS, the cloud computing and disaster recovery specialist...
Cloudian has introduced a consumption model financing program that provides customers with a public...
Samsung Electronics Co., Ltd. and Western Digital have signed a memorandum of understanding (MOU)...
Datto has published findings from its fourth annual Global State of the Channel Ransomware Report....
CEA (The French Alternative Energies and Atomic Energy Commission) and Eviden have delivered the...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more