Syncsort’s data protection business acquired by executive management, Bedford Venture Partners, and Windcrest Partners

Transaction completes business separation, creating two well-funded companies with sharp focus and aggressive growth plans.

Read More
Dell Software extends mobile workspace security and IT agility

Dell Software has introduced new mobility solutions designed to help customers better support increasingly mobile workers while minimising security risks and IT complexity. Faced with a deluge of mobile devices, companies today are struggling to transform physical workplaces into “digital...

Read More
Codestone takes Virgin Management on journey to the cloud

Virgin Management Ltd. migrates to cloud IaaS platform, increasing flexibility, reducing costs and providing 200 users with remote access via any device.

Read More
European Hosting market transitioning to new service models

According to a recently published report from 451 Research on the state of the European hosting market, many providers have been moving away from their traditional focus on dedicated hosting, network services and colocation – instead moving further up the stack toward sets of service...

Read More
Ad hoc-Lösung für Big Data

Performanceverlust, Komplexität, hohe Kosten – traditionelle Speichersysteme sind bei...

Read More
Herausforderungen des Effizienten Rechenzentrums - Wenn Datenkopien Überhand nehmen

Wir befinden uns in der Mitte eines neuen Zyklus in der IT. Der Bedarf nach Outsourcing erscheint...

Read More
Wege in die Cloud mit dem Datacenter „Out of the Box“

Das exponentielle Datenwachstum stellt Unternehmen und Behörden vor Herausforderungen...

Read More
Brücken in der Technologie bauen

Jeder kann eine Brücke bauen: Aber ein Ingenieur ist per Definition dazu fähig, eine...

Read More
Traffic-Monitoring der nächsten Generation für moderne Rechenzentren

Über das letzte Jahrzehnt haben technische Verbesserungen und Optimierungen bei...

Read More
10 Gigabit Ethernet: Rückblick zweite Jahreshälfte 2012 und Ausblick auf 2014

Von Seamus Crehan, President, Crehan Research Inc.,  Deutsche Fassung: Christine Schmidt

Read More
Ist die Zeit für Solid State Disks im Rechenzentrum gekommen?

HDD ist tot, es lebe die SSD-Technologie! Das stimmt so natürlich nicht. Viele...

Read More
Wirksame Methoden gegen Spear Phishing

Spear Phishing ist eine besonders perfide und sehr erfolgreiche neue Phishing-Methode. Mit den...

Read More

Videos

Aleksandar Grbić, Global Data Center Solutions Manager, Hitachi Energy, discusses how the electricity grid must evolve to handle soaring demand from AI data centres. Grid integration and grid resilience have...
Pete Hughes, Founder and Managing Director of Zalara Tech, shares how building a business in the age of AI shapes growth and delivery, and why success depends on understanding that AI is never a...
Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...
Matthew Martin, Managing Director of Quantum Design Oxford, discusses the critical role that quantum data centres will play in advancing the deployment of quantum technologies. He explains how quantum data...

Expert Opinions

By Sujatha S Iyer, Head of AI Security at Zoho Corp.
By Arun Manoharan, Global Head of Strategy Enablement, UBDS Digital.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Robert Hannigan, Chairman of International Business at BlueVoyant.