Pro IBM + Red Hat = open source hybrid cloud IBM's public cloud will run Red Hat's OpenStack and Ceph storage products 21 Mar
Pro Russia will strike US elections again, FBI warns FBI, NSA working with European counterparts to stop suspected Russian hacking 21 Mar
Pro IBM chases Google, Microsoft with Kubernetes in the cloud New hosted Kubernetes as a service offering has direct access to the container orchestration system's APIs 21 Mar
Pro Japan looks beyond Industry 4.0 towards Society 5.0 Cebit hears how Japanese businesses want to go beyond smart factories, deploying industrial technologies to build a smart society 20 Mar
Pro Researchers pull almost 43Gb/s over a ray of light Experimental wireless network uses infrared to boost speeds 20 Mar
Pro AI seen as essential and transformative for business New study finds growing acceptance beyond information security, with strong investment intent 16 Mar
Pro Four charged, including Russian agents, for Yahoo hack Hackers targeted Yahoo accounts of officials for intelligence and financial gain, says US government 16 Mar
Pro SAP adds new features to Vora and readies a cloud version New data engines will run on SAP Cloud Platform Big Data Services and elsewhere 16 Mar
Pro Docker frees container core for Cloud Native Computing Foundation Core container runtime component containerd donated to the CNCF 16 Mar
Pro Schneider Electric’s launches Micro Data Center Xpress range Accommodating the needs of edge computing and regional sites 16 Mar
Pro Schneider Electric cuts data centre cooling costs Ecoflair indirect air economiser reduces costs and CapEx 15 Mar
Pro Microsoft stays security bulletin termination Expected end to decades-old practice delayed at least one more month 15 Mar
Pro MapR unveils platform for IoT analytics at the edge MapR Edge, a new small footprint edition, is geared for capturing, processing and analysing data from edge IoT devices 15 Mar
Pro EcoStruxure Control Advisor brings Big Data to IIoT Schneider Electric enables smart control and analytics for plant performance and control optimisation 15 Mar
Pro Security of confidential documents a significant problem Nearly two thirds of survey respondents say sensitive documents have accidentally been sent to the wrong person. 14 Mar
Pro Mirai is the hydra of IoT security: too many heads to cut off Some botnets have been disbanded, but new uses continue to emerge 14 Mar
Pro Quantum computers have arrived, developers seek uses Don't think of using quantum computers for email or word processing 14 Mar
Pro Drop in tech and engineering applications needs curriculum fix ICS argues for a path into teaching for grads, and IT in the National Curriculum 13 Mar
Pro Google on a mission to excel in cloud security New tools that protect enterprise applications running on Google Cloud Platform to help in the fight against AWS and Azure 13 Mar
Pro Hacker cuts a swathe through the Dark Web A hacker connected with Anonymous attacked Freedom Hosting II, causing thousands of dark web sites to go down - as many as 85%, say... 13 Mar
Pro Google Hangouts overhaul takes aim at Slack Videoconferencing also sees major effort investment 13 Mar
Pro Google announces three new cloud regions, contract discounts Launching data centres in California, Canada and the Netherlands 10 Mar
Pro Post CIA leak, Intel Security releases EFI rootkit detection tool A new module for Intel Security's CHIPSEC framework can find rogue binaries inside the low-level firmware of computers 10 Mar
Pro Cisco and Apache issue Zero-Day flaw warnings Cisco's Talos team says Apache Struts vulnerability is being targeted in the wild 10 Mar
Pro The future of data centres goes to the edge Pushing cloud down to edge DCs will be require new thinking, argues Schneider Electric 9 Mar
Pro Foundations in place for digital adoption in health service HSE CIO talks electronic health records, engaging patients and clinician buy-in 9 Mar
Pro ICS news and events March 2017 A host of new management courses, with an eye to risk and lean 9 Mar
Pro Mining a SIEM can help detect and respond faster to security threats Interpreting security intelligence can be a problem for enterprise 9 Mar
Pro Is legacy equipment holding you back in a customer-centric world? Equipping customer service to meet demand for seamless communications across multiple channelsshould be a priority 9 Mar
Pro Managed print morphs into managed document services Managed print has moved beyond just print, increasing value and efficiency 9 Mar
Pro 7 considerations in choosing a Managed Service Provider There is more than just service capabilities to consider when evaluating MSSPs 9 Mar
Pro CIO Folder: Is IT learning from the Art World A cloud by any other name would be as misty, but does the terminology matter? 9 Mar
Blogs Connected cars and the need to be forgotten IoT, in all its forms, must have security baked-in and by design 9 Mar
Pro Inside Track: The service option Going with a security service provider is about more than cost or cover, finds ALEX MEEHAN, confidence is also a major factor 9 Mar
Pro Disappearing data centres While predictions are that data centres as we know them are likely to disappear as early as 2020, opinions vary as to what a data centre is, and how... 9 Mar
Pro Application security risk PATRICK CAREY advocates a three-pronged approach to managing application security risk 9 Mar
Pro NSA and CIA may be behind Equation cyber group CIA documents leaked by WikiLeaks suggests tools attributed to the Equation group originated from both the NSA and CIA 9 Mar
Pro Google Container Builder is more than a Docker factory Container Builder is a step toward building not only containers but also other pluggable components in a pipeline 9 Mar
Subscribers 0
Fans 0
Followers 0
Followers