Notorious nine threats to Cloud Computing

Cloud computing has revolutionised the way many businesses manage their day to day IT activities, from reducing the management of server infrastructure, allowing for more flexible access to company data and in some cases lowering IT expense. However, a recent report from the Cloud Security Alliance is questioning whether Cloud is all it lives up to be. The Notorious Nine: Cloud Computing Threats of 2013 explains the top security risks Cloud is facing and aims to make sure companies have the...

Read More

Veeam supports both vSphere 5.5 and Windows Server 2012 R2 Hyper-V

Proves reputation for innovation and consistently being the first to support new hypervisor releases.

Read More



Vision Solutions extends database replication capabilities

Data sharing solution delivers full support for the latest Microsoft Windows and SQL Server technologies (including Windows Azure), along with increased replication performance across all platforms.

Read More

Red Hat and Avaloq collaborate

Avaloq Banking Suite to support Red Hat Enterprise Linux, Avaloq tabbed as Red Hat Advanced ISV Partner.

Read More

Splunk has published the results of new research in a report titled “Damage Control—The...
DataCore Software has acquired Caringo, Inc. -the combined entity will enable DataCore to offer...
Paris-based Dailymotion has expanded the Scality RING object storage back-end to its massive...
NetApp announces new innovations for a simple, secure, and flexible hybrid multi-cloud experience.
Leading technology and workforce development companies release comprehensive report, analyzing...
ActiveScale object storage software combined with Supermicro high-capacity servers addresses...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more