Five out of six organizations use or plan to use Cloud Storage

Annual cloud adoption survey examines adoption rates, benefits and barriers.

Read More

SureCloud adds ISO 27001 process automation to Cloud-based GRC platform

Built-in expertise breaks down the barriers to ISO 27001 adoption.

Read More

TalkTalk Business chooses KEMP for Microsoft Lync load balancing

Microsoft approved KEMP LoadMasters deliver high performance and availability for unified communications.

Read More

IT-Weiterbildung ist ein Erfolgsfaktor von Kurt-Jürgen Jacobs, Geschäftsführer bei qSkills GmbH & Co. KG

„Fehler, die bei uns in den Schulungen gemacht werden, bleiben ohne Folgen. Anders wäre das im realen IT-Betrieb. Und daraus lernen die Teilnehmer.“

Read More

Citrix advances enterprise mobility with XenClient 5

Unifies mobile experience across hosted and local virtual desktops.

Read More

Ciena teams with R&E networking leaders

Fully operational research network gives Ciena R&D teams, research partners and customers a real-world environment to experience SDN and other advanced technologies.

Read More

Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more
Sustainability-focused digital solution designed to reduce food waste by at least 25% and improve...
Despite sensitive data being increasingly moved to the cloud, research carried out by business...
Report highlights the company’s position as market leader in digital infrastructure...
Manchester City and Intel Sports pen multi-year extension to 2019 partnership.
Fujitsu Limited has begun shipping the supercomputer Fugaku, which is jointly developed with RIKEN...
More organisations should consider “true” immutability as part of their cybersecurity strategy.