Fujitsu
Not logged in » Login
X

Please login

Please log in with your Fujitsu Partner Account.

Login


» Forgot password

Register now

If you do not have a Fujitsu Partner Account, please register for a new account.

» Register now

Recent Discussion:

JuergenL | 10.06.2018, 10:58
Hi Johannes,Download DeskView Client (to be installed on all the clients) or DeskView Instant BIOS M...
tbckr | 08.06.2018, 10:28
Hi Josip,I've received more details on how to proceed. Please check your messages when you sign back...
tbckr | 06.06.2018, 15:51
Hi Josip,Fujitsu Support now recommends you contact Fujitsu Software Product Management for help. Me...

News

July 12, 2018
Halfway through the week, Fujitsu started looking for participants in this year's SELECT Innovation Awards, a contest that is open to all SELECT Partner Program members and will reward the winner with US-$10,000 as a first prize.
 
0 comments | 25 views
July 09, 2018
Whenever you hear about HPC, supercomputing, exascale etc. these days, most reports seem to focus on advancements made in the U.S., China, or occasionally Japan. Europe is hardly ever mentioned, even though 15 of the world's 50 fastest supercomputers (30%) reside somewhere between Devonshire and Rome. Even more important is the fact that the European Union has initiated and supported the funding of several ambitious research projects that are expected to jointly work towards creating a common platform for exascale high performance computing.
 
0 comments | 30 views
June 29, 2018
Wireless networks have long been a popular target for criminal hackers of all skill and sophistication levels, especially if they still use the outdated WEP and WPA security protocols. Last fall, researchers found that even the more mature WPA2 was susceptible to offline key reinstallation (KRACK) attacks. Consequently, the Wi-Fi Alliance – the industry association that defines and maintains standards for wireless networking – is now pushing for the implementation of new protective features for enterprise and personal installations.
 
0 comments | 45 views
June 28, 2018
Mozilla has updated the stable version of its browser and added a number of goodies that speed up page rendering, simplify tab management and enhance security.
 
0 comments | 35 views
June 26, 2018
The Internet Engineering Task Force (IETF) has announced plans to retire old editions of the Transport Layer Security Protocol (TLS) as soon as possible.
 
0 comments | 30 views
June 25, 2018
After five years of Chinese dominance, U.S. institutions and supercomputer makers managed to dethrone the seemingly invincible duet of Sunway TaihuLight and Tianhe-2A and replace them with their exorbitantly powerful Summit and Sierra systems. Fujitsu, whose Oakforest-PACS and K computer systems dropped to position nos. 12 and 16 respectively, turned in a good performance nonetheless with its AI Bridging Cloud Infrastructure (ABCI), which debuted at #5.
 
0 comments | 44 views
June 23, 2018
Fujitsu has developed and produced the prototype of an ARM processor that is supposed to power the so-called Post-K System, the direct successor to the company's famous K computer.
 
0 comments | 49 views
June 22, 2018
Helsinki-based software and service company Basemark has introduced a new graphics performance evaluation suite that's useful for both consumers and IT departments.
 
0 comments | 25 views
June 19, 2018
Cisco's security division Talos has published additional information regarding the modular router malware VPNFilter that first made headlines at the end of May.
 
0 comments | 46 views
June 14, 2018
Four students from the Chalmers University of Technology in Gothenburg, Sweden, won the 2018 Fujitsu Innovation Award for their conception of a "smart intersection" that would help to increase the efficiency of traffic control systems and enhance traffic security.
 
0 comments | 84 views
June 07, 2018
The easiest-to-use-and-manage backup appliance has just got better, as it now integrates Veeam backup software and Dynamic Application Environment features. This was one of the key messages in our latest Storage Web Talk on Tuesday this week. For those of you who couldn't attend, an audio recording of the session and the presentation files are now available for download or streaming.
 
0 comments | 59 views
June 01, 2018
130 channel partners from all across Europe, 30 Speakers, 86 workshops, and three keynotes on important topics such as the EU's just-implemented GDPR (General Data Protection Regulation), Artificial Intelligence, Quantum Computing and IoT – this pretty much sums up what happened at this year's TechCommunity Workshop at Lisbon in mid-May.
 
0 comments | 373 views
May 30, 2018
The Korean electronics and memory technology giant announced it has taken up mass production of a new line of small outline dual in-line memory modules (SoDIMMs) aimed at boosting the gaming capabilities of laptop computers.
 
0 comments | 93 views
May 30, 2018
From healthcare through manufacturing to the distribution of welfare, modern societies are increasingly grappling with previously unknown challenges that will shape our lives in the near and not-so-near future. Examples include demographic ageing, the disintegration of family ties and a resulting increase in single-parent/single-person households, growing workforce mobility and migration, or the near-permanent reorganization of manufacturing processes and industrial infrastructures. In all of these areas, modern ICT technologies can contribute a great deal to much-needed solutions.
 
0 comments | 102 views
May 29, 2018
Google's browser developers have kicked off the rollout of the latest version of the world's most popular web viewer. The new edition adds various security fixes, drops a less successful protective technology and supports the Web Authentication (WebAuthn) standard that allows for logins without passwords.
 
0 comments | 69 views
May 25, 2018
The networking hardware giant's security division has identified a particularly nasty bit of modular malware that infiltrates routers and NAS systems, especially those deployed in SOHO environments.
 
0 comments | 83 views
May 18, 2018
Enterprises are increasingly under cyberattack, which can lead to data loss or corruption. The latest threat is ransomware, which became one of – if not the – most popular cyber-attack schemes in recent years, with adversaries invading infrastructures, encrypting critical data and not 'releasing' them unless and until users pay the equivalent of thousands of dollars in crypto-coins for the unlock keys. As attacks of this nature become more sophisticated each day, organizations that are locked out of their data face a trail of damage that can take weeks or months to repair.
 
0 comments | 107 views
May 16, 2018
Every spring, organizers and event planners from Berlin, Cologne and Hanover start running ads and sending out invitations for the annual Internet Security Days – by its own description the leading conference on cybersecurity and related topics in Germany. Since its inception in 2003, the event – which is hosted by Germany's eco Association of the Internet Industry and the publishing house Heinz Heise, which is renowned for its roster of IT publications and news services – has served as some sort of one-stop shop for C-level executives from all industries who wish to learn about the latest trends, cast a glance at protective software and service offerings, or discuss practical implications of legal frameworks for privacy protection.
 
0 comments | 61 views
May 09, 2018
It's no secret that, historically speaking, the 'war' between proprietary and open source software has not only cost both factions are fortune, but was also instrumental in creating a whole mountain range of missed opportunities. Against this backdrop, it's always heartening to see the two camps come to terms and cooperate, as in this latest project, which was announced yesterday at the Red Hat Summit 2018 in San Francisco.
 
0 comments | 120 views
April 30, 2018
It's been said many times that few things help to draw attention to a scheduled product update as much as a little ritardando. Anyone who's ever waited for a refresh of a favorite console game knows exactly what we're talking about. Perhaps this explains why Microsoft's PR team didn't seem too concerned about the bug that held up the release of the original Redstone 4 build and obviously necessitated a major rewrite.
 
1 comments | 260 views
 
Page 1/20    1   2   3   4   5   6   7   8   9   10