IPsoft: Automatisierung des IT-Betriebs erfordert klar strukturierte Service-Transition-Prozesse

Ein detaillierter Projektplan und eine stringente Methodologie sind bei Service-Transition-Prozessen extrem kritische Erfolgsfaktoren, meint Managed Services Provider IPsoft. Nur so bleiben Projekte bei der Automatisierung des IT-Betriebs im Zeit- und Kostenrahmen.

Read More

Arbor Networks veröffentlicht „Peakflow Mobile Network Analysis“ – für Visibilität und Erkennung von Bedrohungen in mobilen HSPA- und LTE-Netzen

Deutscher Launch von „Peakflow Mobile Network Analysis“ / Erweiterung der Peakflow Sicherheitslösung speziell für Mobilfunkbetreiber / mehr Transparenz und Sicherheit in Mobilfunknetzen /  für mobile HSPA, HSPA+ und LTE Netzwerke

Read More



Storage Networking without the SAN - really?

A curious retro movement may have caught your eye. The “no-SAN” crusade has started to infiltrate many a data centre conversation. The raging debate hinges on where you should place your data storage: inside the server or out on the storage area network (SAN). The rift between the opposing views appears to be growing wider. By Augie Gonzalez, DataCore.

Read More

Updates guard against cyber threats to all data, on any workload, both on-premises and in the...
Atos and the European Center for Medium-Range Weather Forecasts (ECMWF), have announced a new...
CTERA has unveiled CTERA Ransom Protect, a new homegrown AI-power cyber protection engine natively...
The pace, scope, and accessibility of innovation today provides organisations an ever-expanding...
N-able has revealed the results of a survey of IT services providers conducted ahead of World...
Hitachi Vantara’s software technology processes Sphere’s original content with speed and...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more