LANDesk Service Desk 7.5 streamlines service desk operations for over 2,000 users

University of Cambridge chooses LANDesk to automate service desk support and deliver better customer service.

Read More
IT managers increasingly concerned about DDoS attacks

New independent research commissioned by Corero Network Security shows that businesses are more stressed than ever about being the target of a Distributed Denial of Service (DDoS) attack.

Read More
By 2015, 10 percent of overall IT security will be delivered in the Cloud

By 2015, 10 per cent of overall IT security enterprise product capabilities will be delivered in the cloud, according to Gartner, Inc. The services are also driving changes in the market landscape, particularly around a number of key security technology areas, such as secure email and secure Web...

Read More
Scality joins the Active Archive Alliance

Scality RING’s flexible solution is perfectly suited to long-term preservation needs.

Read More
IBM makes $1 billion investment in Flash

IBM has unveiled a strategic initiative to drive Flash technology further into the enterprise to...

Read More
Dot Hill AssuredSAN Storage-Systeme ergänzen Acer Business-Produktportfolio

Dot Hill Speichersysteme wurden ins Portfolio von Acer Europe SA aufgenommen....

Read More
TWM Solicitors LLP transforms IT infrastructure

TWM Solicitors LLP, a mid-sized law firm based in the UK, has chosen EMC® technologies to...

Read More
First dedicated online Lloyd George patient records service in primary care

Grove House Practice, the first GP surgery in the UK to computerise its entire Lloyd George patient...

Read More
New Red Hat Storage Server capabilities deliver the foundation for Enterprise Open Hybrid Clouds

Red Hat is pleased to announce the availability of new Red Hat Storage Server 2.0 features and...

Read More
Big Data Hoarding – the elephant in the room

Hoarding every bit of data is a serious affliction for 75% of organisations and a predicted 4,300%...

Read More
Hybrid Cloud

By Nick Davis, IBM Cloud Business Development Manager.

Read More
What companies must know about Bring Your Own Device to work

By Don Jackson, CISSP, a Senior Security Researcher with the Counter Threat Unit (CTUTM) Research...

Read More
Cloud in 2013: From Hype to Hyper Growth

By Steve Caniano, VP, Hosting, Managed Applications and Cloud Solutions, AT&T Business...

Read More
6 common pitfalls to avoid when adopting virtualisation or Cloud

By Michael Thompson, Product Marketing Manager, SolarWinds.

Read More

Videos

Dr. J Metz, SNIA Chair, explains how AI workloads are extraordinarily complex and constrained by issues related to latency, space, power and cooling, memory, and cost and how addressing these problems through...
Mike Arrowsmith, CTO at NinjaOne, shares valuable insights into a number of cybersecurity issues, explaining how AI adoption itself isn’t problematic when done thoughtfully – but lack of cyber awareness in...
Rob Finn, VP International Sales at Chainguard, discusses the company’s new Global Partner Program, offering flexible incentives, technical enablement, and go-to-market support to empower channel resellers...
Mike DePalma, VP, SMB Business Development, OpenText Cybersecurity, discusses the continuing evolution of cybersecurity alongside rapidly emerging AI solutions - with agentic AI gaining significant momentum -...

Expert Opinions

By Joel Carusone, SVP Data and AI at NinjaOne.
By Manuel Sanchez, Information Security and Compliance Specialist, iManage.
By Pascal Lemasson, AVP Business Development and Sales - Europe at MediaTek.