ISACA helps enterprises manage vendors using the COBIT 5 Framework

As enterprises increasingly rely on cloud service providers and other vendors to provide fundamental services, the related risk becomes more significant. Global IT association ISACA has released a new guide applying the internationally accepted COBIT 5 governance framework to help enterprises effectively manage vendors.

Read More

Integrated protection and recovery for Caché® databases

Extends BridgeHead Software’s rapid and reliable management of hospital data to the many healthcare applications built on InterSystems Caché® databases.

Read More

Risk of unsupported systems

CIOs need to have well-developed OS migration plans.

Read More

Ovum warns telcos to make critical assessments of their assets and operations to determine future growth

A review of the full-year KPIs of 23 of the world’s largest telcos makes for sombre reading as revenues continue to decline, finds Ovum. Telcos will have to make a critical assessment of their assets and operations if they are to remain profitable, warns the global independent analyst firm.

Read More

Acer announces VDI Thin Client solutions

Acer Veriton N Thin Client series designed to provide reliable business productivity, out of box manageability and simplified security in a space-saving form factor.

Read More


SNIA and the SCSI Trade Association (STA) have announced the formation of a new SNIA SCSI Trade...
NVIDIA says that the first GPU based on the NVIDIA® Ampere architecture, the NVIDIA A100, is in...
The IBM facility in Ehningen, Germany, is expected to open in 2024.
Exxact Corporation and Panasas have formed a partnership, with Exxact joining the Panasas...
Spectra Logic has introduced several new tape enhancements to its family of tape libraries that...
Meets and exceeds bandwidth needed to support multiple streams of 8K, 4K and HDR video.
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more