35% of businesses experienced a DDoS attack in 2012

When DDoS (Distributed Denial of Service) attacks hit, organizations are thrown into crisis mode. From the IT department to call centers, to the boardroom and beyond, it’s all hands on deck until the danger passes. In February 2013, Neustar, a trusted, neutral provider of real-time information and analysis, surveyed 704 IT professionals across North America and Europe to understand how companies are managing the crisis around DDoS attacks and measuring the impact on their businesses.

Read More

CA Technologies addresses critical DevOps challenges

CA Technologies is rapidly expanding its market-leading CA LISA® solutions to address the most critical challenges in operationalizing DevOps methodologies, helping customers improve application development and delivery to accelerate innovation. As part of this initiative, the company announced it acquired Nolio, bringing continuous delivery capabilities to CA Technologies service virtualization business. Terms of the transaction were not disclosed.

Read More

Timico ‘leads’ the data centre revolution with launch of new Virtual Data Centre

London launch event highlighted the need for enterprise-strength UK hosting that is integrated into the network as a key weapon in the business-agility arsenal.

Read More



The Utah Department of Technology Services has deployed Cloudian HyperStore storage appliances,...
Hammerspace has unveiled the high-performance NAS architecture needed to address the requirements...
Manchester City and Intel Sports pen multi-year extension to 2019 partnership.
Alibaba, Argonne, AT&T, Google Cloud, Microsoft, SiPearl and others showcase power of open...
BT has selected the InfiniBox™ enterprise data storage system to provide storage for...
IBM z16 integrates the IBM Telum processor so clients can infuse AI inferencing for real-time...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more