Fujitsu
Not logged in » Login
X

Please login

Please log in with your Fujitsu Partner Account.

Login


» Forgot password

Register now

If you do not have a Fujitsu Partner Account, please register for a new account.

» Register now

Recent Discussion:

NickBown | 22.12.2018, 14:18
We have come across this issue as well, and don't seem to have found a way around it (the server is ...
NickBown | 20.12.2018, 18:40
Hi everyoneWe've got an RX2540 M1 which won't boot past the Fujitsu splash screen (which shows the i...
MarkM | 15.10.2018, 11:33
Hi there.I do not believe the Fujitsu policy on this subject has changed.So NO you can not order dri...

News

April 29, 2016
Since the days of Heartbleed, developers working for the OpenSSL project and their customers have become pretty sensitive to any security issue that may pop up along the way. Meanwhile, security patches are handed out on a more regular basis (roughly every three months or faster if necessary) – and the next one is due next week.
 
0 comments | 1377 views
April 28, 2016
Delaware-based software company CloudBees, specialist in creating tools for continuous integration, has introduced a new version of its continuous delivery platform.
 
0 comments | 1408 views
April 25, 2016
As media services like Netflix continue to boom and more and more companies rely on 'the cloud' to deliver presentations or AV material, so-called content delivery networks (CDNs) turn into cornerstones of the digital business. So it doesn't come as too much of a surprise that Google wants a piece of the pie that was previously allotted to providers like Akamai, CloudFlare or Level 3.
 
0 comments | 749 views
April 19, 2016
Often mocked for its focus on sleek design, French hardware specialist LaCie (now a Seagate company) has a reputation for building storage devices whose performance matches their looks. The latest addition to the roster comes off promising as well.
 
0 comments | 1584 views
April 16, 2016
In recent months, so-called ransomware – Trojans that encrypt critical computer files and only decrypt them again after a considerable amount is payed to the criminals who spread the malicious program – has turned into a major threat for home users as well as company networks. Meanwhile, several security experts started to build free tools that help victims recover their data without losing money. The problem is that these tools can be hard to find – at least for the vast majority of users whose knowledge of IT security is limited. But now a new website is supposed to cure that ill.
 
0 comments | 866 views
April 12, 2016
Just one week and a half ago, the launch of Intel's fourth-generation Xeon® E5-2600 processor line and the accompanying refresh of our PRIMERGY dual-socket servers dominated the blogs on this page. Today, we can add relevant details that let product upgrades appear even more worthwhile: the new models have set a total of seven world records in important benchmarks like SPECint, SPECpower, TPC-E and VMmark 2.5.2 for virtualization performance, database processing and energy efficiency.
 
0 comments | 4330 views
March 31, 2016
For several years in a row, Adobe's Flash Player software has been a source of serious concerns for corporate and homes users alike. As a result, some software vendors even went so far as to block or blacklist the browser plug-in altogether. The latest "Threat Report" from Finnish security outfit F-Secure now provides new ammo for the anti-Flash coalition.
 
0 comments | 818 views
March 30, 2016
For the first time in nearly a decade, the U.S. National Institute of Standards and Technology (NIST) has addressed the issue of email security: on Tuesday this week, it issued the second draft of Special Publication (SP) 800-177, which is supposed to propagate "recommendations and guidelines for enhancing trust in email." Stakeholders like mail server and network administrators are invited to turn in comments.
 
0 comments | 709 views
March 15, 2016
Market researchers at the International Data Corporation (IDC) have finished their analysis of worldwide storage sales for the period from October to December as well as the entire year. The results reveal a shift away from standard technologies towards server-based, software-defined and cloud solutions. Also among the rising stars were original design manufacturers (ODMs) – companies that build systems for the growing group of hyperscale data centers and deliver directly to their customers.
 
0 comments | 1602 views
March 14, 2016
As popular as they were (and in some areas still are), optical media always had a couple of issues in the storage context. One was capacity: CDs, DVDs and even Blu-rays can only hold limited amounts of data, which makes them awkward to use. The other is durability: all three disc types are susceptible to scratches and other types of damage, and they deteriorate over time, which makes them unfit for long-term data retention and archiving, e.g. of medical data or high school/university diplomas. Because of these problems, optical discs went through a long period of decline starting in the early noughties.
 
0 comments | 2037 views
March 05, 2016
Anyone who thought SSDs might still take several years to catch up with HDD capacities stands corrected: on Thursday this week, Samsung began shipping its latest flagship SSD, dubbed PM1633a, a real 'monster' with 15.36 TB storage capacity.
 
0 comments | 1027 views
February 27, 2016
Computer clusters have been around for nearly five decades, but so far only very few vendors have applied the underlying concept to graphics processing and built so-called render farms. This week, market leader NVIDIA made things a little easier for anyone who uses their GPUs with the introduction of Iray® Server.
 
0 comments | 1420 views
February 24, 2016
As open source software continues to gain popularity, the operating systems, applications and tools published under that licensing scheme turn into valuable targets for miscreants trying to obtain confidential information or wreak havoc on IT infrastructures. Over the past weekend, some of these folks hacked their way into the official Linux Mint site in order to upload fake ISOs and compromise the user forum's database.
 
0 comments | 802 views
February 18, 2016
One of the smart things to do to push your career in IT is to obtain a Microsoft certificate. You should however keep in mind that these 'report cards' aren't made for eternity – and that Redmond's training team may regroup, revise or retire courses and exams any moment, in line with company policies. This time around, the bell tolls for a number of Lync and Windows 8/8.1 certificates.
 
0 comments | 655 views
February 18, 2016
Security researchers have identified a vulnerability in the GNU C Library (glibc) that could enable adversaries to hijack routers, servers and other hardware with the help of specially crafted DNS packages. The flaw, which has been submitted to the Common Vulnerabilities list under the moniker CVE-2015-7547, affects several major core functions present in standard Linux distributions, such as SSH, sudo, and curl.
 
0 comments | 1436 views
February 16, 2016
Cloud, web and app developers who rely on smaller-scale MS SQL databases to test and run their products have long waited for this moment: images of the server software's cost-free edition are now available from the Azure Gallery, along with tools for the 2014, 2012 and 2008 R2 releases.
 
0 comments | 1354 views
February 08, 2016
Customers and CSPs looking to build new or expand old virtual environments often wonder what these assets will look like, which dependencies may occur, etc. With InfraSIM™, a tool developed by storage market leader EMC, they can now get a preview.
 
0 comments | 3218 views
February 04, 2016
Every administrator who's ever had to deal with performance issues on a VMware stack knows how tough it can be to determine where the root of the problem lies: is it in the VM itself or in the network layer? Or maybe something is wrong with the storage or the hypervisor? The possibilities often seem endless.
 
0 comments | 697 views
February 04, 2016
Following the EU Court of Justice's decision to scrap the so-called Safe Harbor Agreement, both parties had to set up a new arrangement. Today (February 2) the EU Commission's Vice President Andrus Ansip (Estonia) and Věra Jourová, Commissioner for Justice, Consumers and Gender Equality (Czech Republic), announced they had settled on a "new framework for transatlantic data flows," the so-called EU-US Privacy Shield.
 
0 comments | 753 views
January 26, 2016
Roughly two years after Heartbleed caused a major commotion in the IT industry, people at the OpenSSL Project stick with the security-aware release policy that was established after the bug.
 
0 comments | 1252 views
 
Page 12/24    8   9   10   11   12   13   14   15   16   17