Syncsort hits the Big Data acquisition trail

Syncsort has completed the acquisition of UK-based Circle Computer Group, kicking off the acquisition-based and organic growth strategy announced earlier this year by its new CEO, Lonne Jaffe. Circle offers a portfolio of software products that allow organisations to make valuable, previously “locked away” mainframe data securely available for new enterprise-wide Big Data initiatives without requiring any changes to existing applications, reducing software costs in the process.

Read More


HP open ecosystem breaks down barriers to Software-defined Networking

SDN Developer Kit and SDN App Store enables organizations to develop, test and deploy applications.

Read More

Mobile security costs UK SMEs over GBP 66 billion per year

SolarWinds has announced the results of a survey- looking into the mobile security challenges faced by UK IT decision makers in Small and Medium Enterprises (SMEs).

Read More

Report outlines distinctive national and regional characteristics of nation-state driven cyber attacks

FireEye, Inc. has announced the release of a report titled, “World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks” that describes the unique international and local characteristics of cyber attack campaigns waged by governments worldwide.

Read More


Acquiring new customers amidst growing competition and dealing with sophisticated security threats...
Proact revamped the server infrastructure of the diversified group known for its...
Global Partner Program evolves with optimized tiers and benefits, deeper industry relationships and...
Panasas has revealed that a number of leading academic research institutions are using storage...
Atos has launched BullSequana Edge, said to be the highest-performing edge computing server on the...
The Nutanix hyperconverged infrastructure (HCI) platform is integrated with the ServiceNow IT...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more