Shadow IT lurks uncomfortably, for IT departments

The growth in ‘Shadow IT’ is leaving IT departments caught between a rock and a hard place, according to Simon Bain, CTO of search specialists, Simplexo, who suggests that the concerns existing around managing unsupported devices are equally matched by the need to bring IT expenditure in on budget.

Read More



ExaGrid and ATScloud partner

New hybrid cloud offering, Secure BDRcloud, enables customers to replicate backup data for DR to an offsite cloud, reducing or eliminating use of tape.

Read More

New survey highlights worrying lack of guidance from employers on use of personal devices

A survey commissioned by the Information Commissioner’s Office (ICO) has shown many employers appear to have a ‘laissez faire’ attitude to allowing staff to use their personal laptop, tablet computer or smartphone for work business, which may be placing people’s personal information at risk.

Read More

Fusion launches BMC Remedy ITSM 8.0

Service management provider, Fusion Business Solutions, collaborates with BMC to deploy upgraded IT service management (ITSM) package. IT operations specialist, Fusion Business Solutions, announces the availability of BMC Remedy’s upgraded ITSM 8.0 solution, as an extension of its existing offering. The new solution is simpler to use, improves IT collaboration and integrates with social media tools.

Read More

SSD usage up, but recovery incidents are also on the rise.
Super Micro Computer has introduced open private cloud solutions on Red Hat Enterprise Linux 8, the...
Together, Portworx by Pure Storage and Red Hat OpenShift unify VMs and containers to meet...
Flexible and modular services speed cyber attack detection, response and recovery.
New BASF high-performance computer is the world’s largest supercomputer for industrial chemical...
Hewlett Packard Enterprise (HPE) has been named as the supplier to deliver next-generation...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more