Oak Hill Capital Partners to acquire Pulsant

Oak Hill Capital Partners (“Oak Hill”) has entered into a definitive agreement to acquire Pulsant from Bridgepoint Development Capital (“BDC”). Terms of the transaction were not disclosed. The transaction is unconditional and is expected to complete in the coming weeks.

Read More

Customers globally select Dell Cloud solutions and services

Dell Cloud solutions and services enable businesses to boost profits by attracting new customers and better serving existing customers.

Read More


“Clouding the issue” – what’s driving cloud adoption in UK business?

In an age where businesses need to be more productive with smaller budgets it seems that across the country they’ve started to recognise that cloud solutions can enable them to do exactly this. In fact analysts IDC predict that demand for cloud services will grow by 25% worldwide in 2014 and over $100 billion will be spent before year end.

Read More

Presence at AMS-IX New York brings Akamai first connection to an Open-IX certified Internet Exchange

AMS-IX has announced that Akamai, the leading provider of cloud services, has become a member of AMS-IX New York. This peering platform is the only Open-IX certified Internet Exchange in the New York/New Jersey metropolitan area. Akamai has been a member of AMS-IX in Amsterdam for years and is also connected to AMS-IX’ exchanges in Hong Kong and Curacao.

Read More


The cloud server provider has also announced global availability for its new auto-scaling,...
CipherCloud has released its Q2 2015 Global Cloud Data Security Report. This quarter's report...
NEC and Node4 add flexible pricing to popular UC and collaboration solution.
Exponential-e cloud project ensures business advisory and accountancy firm’s network is ready...
Claranet, ein Carrier-neutraler Hosting-Partner für große Unternehmen mit deutschem...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more