ISACA helps enterprises manage vendors using the COBIT 5 Framework

As enterprises increasingly rely on cloud service providers and other vendors to provide fundamental services, the related risk becomes more significant. Global IT association ISACA has released a new guide applying the internationally accepted COBIT 5 governance framework to help enterprises effectively manage vendors.

Read More

Integrated protection and recovery for Caché® databases

Extends BridgeHead Software’s rapid and reliable management of hospital data to the many healthcare applications built on InterSystems Caché® databases.

Read More

Risk of unsupported systems

CIOs need to have well-developed OS migration plans.

Read More

Ovum warns telcos to make critical assessments of their assets and operations to determine future growth

A review of the full-year KPIs of 23 of the world’s largest telcos makes for sombre reading as revenues continue to decline, finds Ovum. Telcos will have to make a critical assessment of their assets and operations if they are to remain profitable, warns the global independent analyst firm.

Read More

Acer announces VDI Thin Client solutions

Acer Veriton N Thin Client series designed to provide reliable business productivity, out of box manageability and simplified security in a space-saving form factor.

Read More


New all-flash ActiveScale object storage lowers costs and accelerates time-to-value in AI and...
Infinidat has introduced the new InfiniBox SSA™, a groundbreaking solid-state array said to...
New capabilities will increase hybrid cloud connectivity and automation to improve costs and...
The University of Wolverhampton has awarded a ?1.3m contract to Logicalis UK, the...
iXsystems has announced the general release of TrueNAS SCALE 22.02.0, extending the portfolio of...
Third generation accelerated protocol converter features, performance and low-latency considered...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more