Syncsort hits the Big Data acquisition trail

Syncsort has completed the acquisition of UK-based Circle Computer Group, kicking off the acquisition-based and organic growth strategy announced earlier this year by its new CEO, Lonne Jaffe. Circle offers a portfolio of software products that allow organisations to make valuable, previously “locked away” mainframe data securely available for new enterprise-wide Big Data initiatives without requiring any changes to existing applications, reducing software costs in the process.

Read More


HP open ecosystem breaks down barriers to Software-defined Networking

SDN Developer Kit and SDN App Store enables organizations to develop, test and deploy applications.

Read More

Mobile security costs UK SMEs over GBP 66 billion per year

SolarWinds has announced the results of a survey- looking into the mobile security challenges faced by UK IT decision makers in Small and Medium Enterprises (SMEs).

Read More

Report outlines distinctive national and regional characteristics of nation-state driven cyber attacks

FireEye, Inc. has announced the release of a report titled, “World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks” that describes the unique international and local characteristics of cyber attack campaigns waged by governments worldwide.

Read More


Global customers gain access to 11:11’s resilient cloud platform with new levels of durability,...
NVIDIA has announced that JUPITER — which launches a new class of supercomputers for AI-driven...
New Versal AI Edge ACAP series delivers AI-enabled intelligence for automotive, robotics,...
Micron Technology's GDDR6 memory, its fastest and most powerful graphics memory, will be the...
Scale storage capacity without having to sacrifice enterprise performance and resiliency.
All managed via a single, central console thanks to 365 Total Protection Enterprise Backup.
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more