Dell doesn't wants to be just your data center server provider. In partnership with Cumulus Networks, they want to be your open-source network services provider as well.
Showing results 1 to 20 of 478
Server, storage, network, desktop and application virtualization allows the creation of flexible, scalable, manageable and secure IT infrastructure that utilises the underlying hardware to maximum efficiency. Some of these technologies are in the early stages of development while others are mature and widely deployed.
The new enterprise IT landscape of cloud services, mobility and BYOD, social media usage and big data analytics creates very different types of network traffic to the traditional mix of in-house client-server enterprise workloads. How will networks evolve to keep pace?
After discovering and blocking an attack on one of its customers' accounts, Linode has issued a password reset to all of its customers.
The amount of time it takes to recover a datacentre has increased and CIOs are concerned that their backup and recovery tools won't be able to cope with increasing volumes of data.
HP's new hardware additions land as the company's global partner conference kicks off.
A hacker associated with the Anonymous collective and the 'AntiSec' movement has released VMware's ESX Server kernel source code online, available through torrent networks.
In preparation for taking on Intel in servers and storage ARM has developed a new networking technology for its chips that lets them reach higher core counts than before while being able to effectively pass information across the chip.
Social networking meets social security, as the Cabinet Office reveals it is considering Facebook as one of the firms whose login process can be used to get access to government services such as applying for a driver's licence.
A look behind the scenes of Facebook's hardware lab, the spiritual home of the Open Compute datacentre hardware movement, which may radically change the type of IT enterprises use, and who they buy it from.
The answers to questions meant to verify one's identity can now be found online using search engines or social networks, which means this measure should be augmented with other authentication tools.
Hacktivist group thriving under collective resources and leadership, which security watchers say will prolong their threat and caution organizations to factor it in their risk assessments.
Networking giant partners Singapore's Institute of Technical Education to set up unified communications training center for students, and will support teachers with advanced certifications.
Technology remains nascent and will need to "prove itself" to financial institutions its effectiveness as an authentication tool over more mature methods such as biometrics, say observers.
Rental server provider Firstserver unable to rebuild system and retrieve businesses' information after system failure last week, and plans to compensate affected customers instead.
update New breed of sophisticated financial fraud campaign targets high balance accounts from financial institutions to siphon money from there to automated mule accounts, research finds. One McAfee exec says Asia was not spared either.
Organizations tend to trust manufacturers to ensure hardware in one's IT infrastructure stay safe, but more impetus needed to develop tools to safeguard device integrity, watchers urge.
Ever-increasing amounts of big data have many tech insiders wondering how the data will affect network demands, datacentres and computer infrastructures, going forward.
Complexity arises as merchants with little knowledge of security enter market and vendors not focus on safeguarding technology, thus making standards for mobile payments a necessity, PCI exec notes.
Country's upcoming cybersecurity policy will designate agencies to gather intelligence abroad and carry out offensive cyber-operations if necessary, to prepare for possibility of cyberattacks targeting critical infrastructure.