Fujitsu
Not logged in » Login
X

Please login

Please log in with your Fujitsu Partner Account.

Login


» Forgot password

Register now

If you do not have a Fujitsu Partner Account, please register for a new account.

» Register now

Recent Discussion:

NickBown | 22.12.2018, 14:18
We have come across this issue as well, and don't seem to have found a way around it (the server is ...
NickBown | 20.12.2018, 18:40
Hi everyoneWe've got an RX2540 M1 which won't boot past the Fujitsu splash screen (which shows the i...
MarkM | 15.10.2018, 11:33
Hi there.I do not believe the Fujitsu policy on this subject has changed.So NO you can not order dri...

News

August 03, 2015
Amazon has made its MySQL-compatible, cloud-optimized database engine Aurora available to AWS and RDS customers in the U.S. and Europe.
 
0 comments | 1331 views
July 31, 2015
Japanese security specialist Trend Micro has noticed that cyber-crooks are increasingly targeting point-of-sales (PoS) systems via the notorious Angler Exploit Kit, their current favorite sophisticated malware.
 
0 comments | 1353 views
July 31, 2015
Intel and Micron Technology are working on 3D XPoint („Crosspoint"), a new non-volatile kind of transistor-free chip which they claim will be 1,000 times faster than NAND flash and 100 times faster than NVMe SSDs, will endure a 1,000 times more write cycles, and won't cost the earth on top of it all. Sample chips with 128 GB capacity are expected for the end of the year.
 
0 comments | 2947 views
July 29, 2015
Online storage services are still the killer application that prompts users to flock to and around CSPs, regardless of where they are – at home, at the office or on the go. But protecting confidential information in such environments isn't exactly easy, especially if there's no encryption option or the CSP has access to customers' encryption keys. Google's new service – currently in beta state – is an attempt to give users "more control over how [they] manage security on Google Cloud Platform."
 
0 comments | 1369 views
July 26, 2015
Microsoft has announced the market availability of its new corporate security platform Advanced Threat Analytics (ATA) for this August. Promising immediate detection of cyber-attacks, ATA's software uses a proprietary algorithm to interact with Active Directory (AD) to display all recent suspicious activities in a single timeline.
 
0 comments | 1611 views
July 23, 2015
Users increasingly appreciate the convenience of adopting 2 in 1 devices as an all-around, no compromise alternative to using a tablet and a separate notebook. That's why Fujitsu is further expanding its line-up in the fast-growing segment with the freshly designed STYLISTIC Q665 model based on processors from Intel's Core® M-5Y series.
 
0 comments | 2384 views
July 22, 2015
Last week's storage session ended a successful first season of TechCommunity webcasts that thrived thanks to the active and energetic participation of our members. In keeping with our short tradition, we now present the audio recording and presentation files for streaming or download.
 
0 comments | 1115 views
July 18, 2015
Developed and run by China's National University of Defense Technology, Tianhe-2 – also known in English as MilkyWay-2 – leads the TOP500 list of the world's most powerful supercomputers for the fifth consecutive time since it first took the top spot exactly two years ago. This kind of inertia appears to be rather typical among the highest-ranking systems on the list these days, as does a slowdown in performance growth observed by the TOP500 project, a group of HPC experts from the U.S. and Germany.
 
0 comments | 686 views
July 15, 2015
Last week saw a successful and lively webcast about our PRIMEFLEX offerings for core Microsoft applications like SharePoint and Lync. As per usual, we provide you with an option to watch a rerun of the entire presentation including complete and detailed configuration advice.
 
0 comments | 1737 views
July 08, 2015
With more and more users trying out flash storage, Samsung has opted to make the faster, more resilient media type even more attractive by adding more real estate to its 850 EVO and PRO SSDs, which will soon sport twice the maximum capacity of previous models. The obvious target are customers who work with demanding applications, e.g. for 4K video editing.
 
0 comments | 709 views
June 30, 2015
Two years after the Snowden leaks, U.S. authorities are taking technical steps to regain at least some of the trust that was lost as a result of NSA attempts to compromise a certain encryption method.
 
0 comments | 734 views
June 30, 2015
Today, 75% of all German companies use some kind of business or customer data analysis as a basis for strategic decisions. 48 percent claim that the process yields useful results.
 
0 comments | 770 views
June 19, 2015
In their constant battle with NVIDIA, the makers of the Radeon™ GPU have now introduced a new line of flagship models, dubbed the R9 Fury series. The most notable improvements over previous models will reportedly come from an innovative technology called High-Bandwidth Memory, or HBM for short.
 
0 comments | 827 views
June 06, 2015
San Francisco's most popular cloud storage service has added some new features that are supposed to strengthen security and simplify business integration.
 
0 comments | 1285 views
June 05, 2015
A few years back, everybody wondered why all of a sudden Larry Ellison wanted to buy Sun Microsystems. Meanwhile, we know the answer: Oracle's spiritus rector was looking for the right hardware to accommodate the company's many software products as well as the production know-how that came with it and turned "Big Red" into a serious competitor in the server field.
 
0 comments | 838 views
June 01, 2015
Microsoft has confirmed rumors about the release date of its upcoming desktop OS that started to spread at the end of last week.
 
1 comments | 2856 views
May 31, 2015
At its TechWorld event, the current No. 1 in worldwide desktop and No. 4 in worldwide server sales introduced a new pair of "feature-rich" storage systems that cover a range of standard business scenarios and come at an entry-level price.
 
0 comments | 1649 views
May 28, 2015
Britain's leading IT security firm Sophos has introduced a software tool that's supposed to protect servers and desktops running the open source OS against "Linux-based and cross-platform exploits." The basic installation is cost-free.
 
0 comments | 1928 views
May 27, 2015
The storage and cloud infrastructure markets are constantly undergoing consolidation. Among the latest proofs for this trend is Virtustream, a provider of cloud software and cloud IaaS solutions, which will slip under the EMC umbrella in Q3/2015.
 
0 comments | 619 views
May 26, 2015
Austria-based pentesting company SEC Consult Vulnerability Lab warns of a critical vulnerability in the NetUSB technology developed by KCodes, a Taiwanese vendor of network devices and related software. NetUSB is used to implement "USB over IP" functionality in larger networks and enables workforces to access printers, external HDDs or speakers as though they were locally connected peripherals. According to SEC Consult, the vulnerability could affect routers from up to 26 manufacturers, including leading firms such as D-Link and Netgear.
 
0 comments | 806 views
 
Page 14/24    10   11   12   13   14   15   16   17   18   19