NovaStor's backup products protect Windows Server 2012 and Exchange 2013

While many data-protection products support technologies over time, NovaStor supports the latest technologies almost immediately.

Read More

Silver Peak sets WAN performance record

Silver Peak Systems has raised the bar for Wide Area Network (WAN) performance with the release of two new data centre class software products, and the introduction of the world’s fastest WAN optimisation hardware appliance capable of delivering 20 gigabits-per-second (Gbps) of data throughput.

Read More

Scottish government appoints Amor Group

The Scottish Government has appointed leading business technology solutions company Amor Group as its technical supplier to work with its Information Services and Information Systems (ISIS) division for the next three years, with two optional 12-month extensions.

Read More

CA Technologies addresses critical DevOps challenges

CA Technologies is rapidly expanding its market-leading CA LISA® solutions to address the most critical challenges in operationalizing DevOps methodologies, helping customers improve application development and delivery to accelerate innovation. As part of this initiative, the company announced it acquired Nolio, bringing continuous delivery capabilities to CA Technologies service virtualization business. Terms of the transaction were not disclosed.

Read More

35% of businesses experienced a DDoS attack in 2012

When DDoS (Distributed Denial of Service) attacks hit, organizations are thrown into crisis mode. From the IT department to call centers, to the boardroom and beyond, it’s all hands on deck until the danger passes. In February 2013, Neustar, a trusted, neutral provider of real-time information and analysis, surveyed 704 IT professionals across North America and Europe to understand how companies are managing the crisis around DDoS attacks and measuring the impact on their businesses.

Read More

Cyber attacks on trust expose UK organizations to £247 million in losses reveals Ponemon and Venafi research

Mismanagement of millions of cryptographic keys and digital certificates threatens security and operations of UK businesses.

Read More

Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more
Tradition-ICAP, the world's leading voice broker and electronic platform for interdealer...
At the 2016 Supercomputing Conference in Salt Lake City, Utah, global supercomputer leader Cray...
PayGo is using SIOS DataKeeper on Amazon Web Services (AWS) utilizing Elastic Compute Cloud (EC2)...
“Gefion” AI supercomputer, built by Eviden, inaugurated as one of the world’s most powerful...
Cohesity has formed an expanded partnership with Google Cloud to help organisations unlock the...
Super Micro Computer has introduced an enhanced partner enabling program at the Company’s annual...