Latest Articles

As Cyber Attacks Proliferate, Don’t Be a Sitting Duck – Treat Security as a Process
By: Post Moderator - 31 July 2015 - 0 Comments

http://www.infinitelyvirtual.com/ – Adam Stern, founder and CEO of Infinitely Virtual, says: Hacking doesn’t happen only to other people. While last spring’s notorious Sony hack may have implied that the biggest targets are the most vulnerable, [...]

Data Center Services for Worldwide Operations
By: Post Moderator - 29 July 2015 - 0 Comments

– Joanna Styczen, Technical Writing Director, iMiller Public Relations, says: Interxion, a leading European provider of carrier and cloud-neutral colocation data center services, today announces that it has been selected by Idiro Analytics, the analytics [...]

Innovative Workplace IoT Software for the Data Center
By: Post Moderator - 28 July 2015 - 0 Comments

  – Provided by Marco Fiori: RF Code has launched CenterScape, a flexible framework of data center management software tools built on the company’s powerful Workplace IoT Software. CenterScape brings together years of collected best practices and streamlined [...]

Open Source Collaboration is Changing the World and Resurrecting Privacy
By: Post Moderator - 27 July 2015 - 0 Comments

–  Rafael Laguna, CEO, Open-Xchange, says: The Patriot Act expired at the stroke of midnight on May 31, marking a turning point in the battle for data privacy. What began when Edward Snowden shined [...]

Brighton Digital Exchange Data Centre Opens
By: Post Moderator - 24 July 2015 - 0 Comments

– provided by Christian Wray of Sudlows: Sudlows, are pleased to announce that Brighton Digital Exchange was officially launched recently. Councilor Warren Morgan, leader of Brighton & Hove City Council, formally opened the Brighton Digital [...]

Keeping Up with High-Speed Data: New Best Practices in PCAP
By: Post Moderator - 23 July 2015 - 0 Comments

 – Dan Joe Barry, VP Positioning and Chief Evangelist, Napatech, says: Network professionals today are operating in a far different atmosphere than when they first entered the field. The network is experiencing a constant [...]

Six Steps to Creating a Highly Effective Data Governance Strategy
By: Post Moderator - 22 July 2015 - 0 Comments

– Christophe Marcant, VP Product Strategy at Stibo Systems, says: Master data is a key enabler of business optimization, and refers to organizational data such as product, asset, location, supplier and customer information. Solutions such [...]

Enterprise Security Management: Threat Sources
By: Post Moderator - 21 July 2015 - 0 Comments

– Tom Olzak, Security Researcher @ InfoSec Institute, says: Understanding the probable threats facing your organization’s network requires an understanding of where threat agents originate. Not all threat sources apply to your business. For [...]

Supporting Customer Migration and Accelerate Time-to-Market
By: Post Moderator - 20 July 2015 - 1 Comment

– Caroline Haley, Manager of Client Relations, Milldam Public Relations, says: Few enterprise data centers have the internal resources to achieve a seamless migration without major disruptions to their business operations. To help alleviate the [...]

Using the Network to Secure the Network: An IoE Strategy
By: Post Moderator - 17 July 2015 - Comments Off on Using the Network to Secure the Network: An IoE Strategy

– Steve Martino, Vice President, Chief Information Security Officer at Cisco, says: The Internet has already changed the world, but it is the Web’s next phase that will bring the biggest opportunities – and [...]

SPEC-CLEAN

specclean