Not logged in » Login

Recent Discussion:

NunoCosta | 03.06.2020, 13:24
Quote from mlegrafleitas:Hi everyone,Need your help to compare this 2 Storage from FUJITSU and ...
NunoCosta | 02.06.2020, 17:25
Hi mlegrafleitas.Thank you for your question.We are working on providing you the best answer, I'll g...
mlegrafleitas | 01.06.2020, 17:28
Hi everyone,Need your help to compare this 2 Storage from FUJITSU and DELL because I have a customer...

News

May 28, 2016
Following on the heels of last week's reports about LinkedIn passwords weak enough to make you blush, security staff at Redmond have moved quickly to protect their own services – including OneDrive, Azure AD and of course Xbox Live – against a similarly catastrophic failure.
 
0 comments | 2826 views
May 21, 2016
Back in June 2012, passwords for 6.5 million LinkedIn user accounts were compromised as the result of an attack by self-identified Russian cyber-crooks. Four years later, it turns out that the security breach was in fact much more severe than everybody thought or was prepared to admit.
 
0 comments | 1737 views
May 12, 2016
Boston-based security researchers Onapsis and the US-CERT are urging leading SAP users to finally fix the invoker servlet vulnerability, a flaw that was first detected and patched more than half a decade ago.
 
0 comments | 921 views
May 07, 2016
Despite much debate, Microsoft's ambitious foray into the SaaS world may eventually pay off: new figures obtained from web analytics firm Net Applications earlier this week suggest it's a downright success – that's good news for Redmond after a couple of rough years.
 
0 comments | 1603 views
May 03, 2016
Microsoft's SQL Server Team has announced the latest version of its "data platform" will be generally available from June 1 – and goes to combat with Oracle.
 
0 comments | 1534 views
April 29, 2016
Since the days of Heartbleed, developers working for the OpenSSL project and their customers have become pretty sensitive to any security issue that may pop up along the way. Meanwhile, security patches are handed out on a more regular basis (roughly every three months or faster if necessary) – and the next one is due next week.
 
0 comments | 1601 views
April 28, 2016
Delaware-based software company CloudBees, specialist in creating tools for continuous integration, has introduced a new version of its continuous delivery platform.
 
0 comments | 1651 views
April 25, 2016
As media services like Netflix continue to boom and more and more companies rely on 'the cloud' to deliver presentations or AV material, so-called content delivery networks (CDNs) turn into cornerstones of the digital business. So it doesn't come as too much of a surprise that Google wants a piece of the pie that was previously allotted to providers like Akamai, CloudFlare or Level 3.
 
0 comments | 869 views
April 19, 2016
Often mocked for its focus on sleek design, French hardware specialist LaCie (now a Seagate company) has a reputation for building storage devices whose performance matches their looks. The latest addition to the roster comes off promising as well.
 
0 comments | 1807 views
April 16, 2016
In recent months, so-called ransomware – Trojans that encrypt critical computer files and only decrypt them again after a considerable amount is payed to the criminals who spread the malicious program – has turned into a major threat for home users as well as company networks. Meanwhile, several security experts started to build free tools that help victims recover their data without losing money. The problem is that these tools can be hard to find – at least for the vast majority of users whose knowledge of IT security is limited. But now a new website is supposed to cure that ill.
 
0 comments | 978 views
April 12, 2016
Just one week and a half ago, the launch of Intel's fourth-generation Xeon® E5-2600 processor line and the accompanying refresh of our PRIMERGY dual-socket servers dominated the blogs on this page. Today, we can add relevant details that let product upgrades appear even more worthwhile: the new models have set a total of seven world records in important benchmarks like SPECint, SPECpower, TPC-E and VMmark 2.5.2 for virtualization performance, database processing and energy efficiency.
 
0 comments | 4619 views
March 31, 2016
For several years in a row, Adobe's Flash Player software has been a source of serious concerns for corporate and homes users alike. As a result, some software vendors even went so far as to block or blacklist the browser plug-in altogether. The latest "Threat Report" from Finnish security outfit F-Secure now provides new ammo for the anti-Flash coalition.
 
0 comments | 955 views
March 30, 2016
For the first time in nearly a decade, the U.S. National Institute of Standards and Technology (NIST) has addressed the issue of email security: on Tuesday this week, it issued the second draft of Special Publication (SP) 800-177, which is supposed to propagate "recommendations and guidelines for enhancing trust in email." Stakeholders like mail server and network administrators are invited to turn in comments.
 
0 comments | 815 views
March 15, 2016
Market researchers at the International Data Corporation (IDC) have finished their analysis of worldwide storage sales for the period from October to December as well as the entire year. The results reveal a shift away from standard technologies towards server-based, software-defined and cloud solutions. Also among the rising stars were original design manufacturers (ODMs) – companies that build systems for the growing group of hyperscale data centers and deliver directly to their customers.
 
0 comments | 1843 views
March 14, 2016
As popular as they were (and in some areas still are), optical media always had a couple of issues in the storage context. One was capacity: CDs, DVDs and even Blu-rays can only hold limited amounts of data, which makes them awkward to use. The other is durability: all three disc types are susceptible to scratches and other types of damage, and they deteriorate over time, which makes them unfit for long-term data retention and archiving, e.g. of medical data or high school/university diplomas. Because of these problems, optical discs went through a long period of decline starting in the early noughties.
 
0 comments | 2305 views
March 05, 2016
Anyone who thought SSDs might still take several years to catch up with HDD capacities stands corrected: on Thursday this week, Samsung began shipping its latest flagship SSD, dubbed PM1633a, a real 'monster' with 15.36 TB storage capacity.
 
0 comments | 1165 views
February 27, 2016
Computer clusters have been around for nearly five decades, but so far only very few vendors have applied the underlying concept to graphics processing and built so-called render farms. This week, market leader NVIDIA made things a little easier for anyone who uses their GPUs with the introduction of Iray® Server.
 
0 comments | 1631 views
February 24, 2016
As open source software continues to gain popularity, the operating systems, applications and tools published under that licensing scheme turn into valuable targets for miscreants trying to obtain confidential information or wreak havoc on IT infrastructures. Over the past weekend, some of these folks hacked their way into the official Linux Mint site in order to upload fake ISOs and compromise the user forum's database.
 
0 comments | 919 views
February 18, 2016
One of the smart things to do to push your career in IT is to obtain a Microsoft certificate. You should however keep in mind that these 'report cards' aren't made for eternity – and that Redmond's training team may regroup, revise or retire courses and exams any moment, in line with company policies. This time around, the bell tolls for a number of Lync and Windows 8/8.1 certificates.
 
0 comments | 765 views
February 18, 2016
Security researchers have identified a vulnerability in the GNU C Library (glibc) that could enable adversaries to hijack routers, servers and other hardware with the help of specially crafted DNS packages. The flaw, which has been submitted to the Common Vulnerabilities list under the moniker CVE-2015-7547, affects several major core functions present in standard Linux distributions, such as SSH, sudo, and curl.
 
0 comments | 1665 views
 
Page 13/26    9   10   11   12   13   14   15   16   17   18  
X

Please login

Please log in with your Fujitsu Partner Account.

Login


» Forgot password

Register now

If you do not have a Fujitsu Partner Account, please register for a new account.

» Register now