Risk of unsupported systems

  • Published in

CIOs need to have well-developed OS migration plans.

Read More

Integrated protection and recovery for Caché® databases

  • Published in

Extends BridgeHead Software’s rapid and reliable management of hospital data to the many healthcare applications built on InterSystems Caché® databases.

Read More

ISACA helps enterprises manage vendors using the COBIT 5 Framework

  • Published in

As enterprises increasingly rely on cloud service providers and other vendors to provide fundamental services, the related risk becomes more significant. Global IT association ISACA has released a new guide applying the internationally accepted COBIT 5 governance framework to help enterprises effectively manage vendors.

Read More

Cordys delivers improved business agility to FNV Bondgenoten

  • Published in

Largest Dutch trade union harmonizes scattered IT landscape with Cordys.

Read More

Flexiant Cloud Orchestrator V3.1.3 released

Latest version extends storage capabilities and enhanced dynamic workload placement to support a variety of cloud service providers’ different business requirements.

Read More

Caringo launches CloudScaler 2.0

  • Published in

Delivers robust features that make it the best choice for enterprises and service providers.

Read More

Companies sign agreement to work together, develop new platform for cloud mobility in the digital...
Commvault has launched NetApp Scale-out Data Protection (SDP), to offer expanded rapid recovery...
ATTO Technology has introduced ATTO xCORE hardware accelerated iSCSI, a low latency implementation...
Supermicro adds new maximum performance GPU, multi-node, and rackmount systems to the X14...
Presidio has formed an extensive partnership with Nasuni - Nasuni is optimising AWS Cloud use and...
Gcore, a leading European AI cloud provider, has launched its Generative AI Cluster powered by...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more