Inspur adopts UNIX® 03 standard in China

Cloud computing platform provider turns to UNIX for assuring customers server stability and application availability.

Read More

Novell advances mobility portfolio with two additions to Novell ZENworks product suite

Additions provide IT access control and security while enhancing efficiency for the mobile workforce.

Read More

Dot Hill AssuredSAN™ 4000 Series certified 'DataCore Ready' for SANsymphony-V

Dot Hill Systems Corp. has announced that its AssuredSAN™ 4000 series storage arrays are 'DataCore Ready' and provide full interoperability with the SANsymphony-V storage hypervisor from DataCore Software.

Read More

Veeam announces Veeam Explorer for Microsoft SharePoint

Veeam Software has announced Veeam Explorer for Microsoft SharePoint, a new capability that anyone may try out in an upcoming free public beta. Registration to participate in the public beta is now open.

Read More

Halo shines bright

Nimbus Data Systems, Inc. has launched powerful new software targeting the unique needs of public and private cloud architects looking to build all-flash memory infrastructures.

Read More

Oracle buys Tekelec

Oracle has entered into an agreement to acquire Tekelec, a leading provider of network signaling, policy control, and subscriber data management solutions for communications networks.

Read More

Zerto to provide disaster recovery, continuous data protection, and mobility in a single, simple,...
Hitachi Vantara has introduced new enhancements and capabilities to its hyperconverged...
Cyber-resilient storage software, ARTESCA set to unlock substantial revenue growth for Cloud...
‘IT Trends Report 2015: Business at the Speed of IT’ explores the current state of...
DataStax is working with NetApp to deliver full lifecycle management for cloud native data in its...
asks John Zeppos FBCI, Managing Partner in Resilience Guard GmbH, a Swiss consultancy on Business...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more