Western Digital acquires sTEC

Western Digital® Corporation and sTec, Inc. have entered into a definitive merger agreement under which sTec, Inc., an early innovator in enterprise solid-state drives (SSDs), will be acquired by HGST, a wholly-owned subsidiary of Western Digital. sTec will be acquired for approximately $340...

Read More
Kingston University adopts robust portable data security standard

iStorage’s USB flash drive datAshur with hardware encryption and PIN code access used to address staff requirement for a secure mobile data storage solution.

Read More
NorCom selects MapR as underlying technology for Big Data ready enterprise collaboration platform

NorCom, an innovative and highly respected German system developer, has selected the MapR Big Data platform as the core data and storage technology for its new Eagle document-based collaboration system.

Read More
KEMP announces first load balancer and ADC to run natively within Cisco UCS

Cisco IVT Certified LoadMaster operating system for Unified Computing System (UCS) enhances enterprise application performance and availability.

Read More
LSI expands its Nytro™ Product Portfolio

New capacity and connectivity options and innovative software extend industry’s broadest...

Read More
A10 Networks continues growth in EMEA

Experienced experts join team to support growth across Europe, Middle East and Africa.

Read More
Logicalis wins Cisco UK&I Solution Innovation Partner of the Year Award

Logicalis has been named Cisco UK&I Solution Innovation Partner of the Year, for its ImmersiV...

Read More
MapR Technologies and VMware team up

MapR Technologies, Inc. and VMware have announced that MapR’s Distribution for Apache Hadoop...

Read More
New CFO strengthens Intrinsic board

Managed services and cloud computing specialist, Intrinsic Technology, has strengthened its senior...

Read More
Quantum expands Lattus Object Storage

Quantum Corp. has announced expansion of its Lattus™ product line to include a...

Read More
Which data deduplication approach is built to survive the ‘data explosion’?

The unstoppable trend towards vast enterprise-size databases demands enterprise-class approaches to...

Read More
The 4G opportunity and how businesses can make the most of it

By Olivier Beaujard, Vice President of Market Development at Sierra Wireles.

Read More
Cisco integrates Citrix NetScaler into cloud network services portfolio

Cisco and Citrix extend strategic alliance with network services innovations.

Read More
Small to mid-sized businesses continue migration to Cloud-based business applications

Spiceworks has announced the results of a new survey highlighting how cloud-based applications are...

Read More
MapR announces OCTO as first Advantage partner in France

Strategic partnership to meet growing demand for enterprise-class Apache Hadoop across the region.

Read More

Videos

Cullen discusses the findings of the company’s recent 2026 SolarWinds State of Monitoring & Observability Report, examining how IT teams are navigating increasingly fragmented hybrid environments, and in...
Oliver Simonnet, Lead Cybersecurity Researcher at CultureAI, discusses the findings of the company’s The State of Enterprise AI Usage: The Illusion of Control report, which reveals a growing gap between how...
Greg Gyves, Director of Global MSP & GSI at TeamViewer, explores the real operational pressures MSPs are dealing with. He highlights expanding service boundaries, rising complexity, and the constant push to do...
Pete Hughes, Founder and Managing Director of Zalara Tech, shares how building a business in the age of AI shapes growth and delivery, and why success depends on understanding that AI is never a...

Expert Opinions

By Robert Hannigan, Chairman of International Business at BlueVoyant.
By Roy Azoulay, Co-founder, Chief Information & AI Officer at Cynomi.
By Graham Jarvis, Freelance Business and Technology Journalist
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...