Not logged in » Login

Recent Discussion:

GGiner | 16.09.2020, 19:02
Today I've spent several hours trying to access ServerView RAID Manager in one of our remote servers...
NunoCosta | 10.07.2020, 10:56
Hi Michel.Our troubleshooting team has no more information on this subject. However, if you need mor...
mlegrafleitas | 09.07.2020, 17:28
Hi Nuno,Very thanks for your response, the storage DX100 S5 is configure with 4 iSCSI CA for SAN red...

News

July 31, 2015
Japanese security specialist Trend Micro has noticed that cyber-crooks are increasingly targeting point-of-sales (PoS) systems via the notorious Angler Exploit Kit, their current favorite sophisticated malware.
 
0 comments | 1946 views
July 31, 2015
Intel and Micron Technology are working on 3D XPoint („Crosspoint"), a new non-volatile kind of transistor-free chip which they claim will be 1,000 times faster than NAND flash and 100 times faster than NVMe SSDs, will endure a 1,000 times more write cycles, and won't cost the earth on top of it all. Sample chips with 128 GB capacity are expected for the end of the year.
 
0 comments | 3834 views
July 29, 2015
Online storage services are still the killer application that prompts users to flock to and around CSPs, regardless of where they are – at home, at the office or on the go. But protecting confidential information in such environments isn't exactly easy, especially if there's no encryption option or the CSP has access to customers' encryption keys. Google's new service – currently in beta state – is an attempt to give users "more control over how [they] manage security on Google Cloud Platform."
 
0 comments | 1913 views
July 26, 2015
Microsoft has announced the market availability of its new corporate security platform Advanced Threat Analytics (ATA) for this August. Promising immediate detection of cyber-attacks, ATA's software uses a proprietary algorithm to interact with Active Directory (AD) to display all recent suspicious activities in a single timeline.
 
0 comments | 2159 views
July 23, 2015
Users increasingly appreciate the convenience of adopting 2 in 1 devices as an all-around, no compromise alternative to using a tablet and a separate notebook. That's why Fujitsu is further expanding its line-up in the fast-growing segment with the freshly designed STYLISTIC Q665 model based on processors from Intel's Core® M-5Y series.
 
0 comments | 2934 views
July 22, 2015
Last week's storage session ended a successful first season of TechCommunity webcasts that thrived thanks to the active and energetic participation of our members. In keeping with our short tradition, we now present the audio recording and presentation files for streaming or download.
 
0 comments | 1527 views
July 18, 2015
Developed and run by China's National University of Defense Technology, Tianhe-2 – also known in English as MilkyWay-2 – leads the TOP500 list of the world's most powerful supercomputers for the fifth consecutive time since it first took the top spot exactly two years ago. This kind of inertia appears to be rather typical among the highest-ranking systems on the list these days, as does a slowdown in performance growth observed by the TOP500 project, a group of HPC experts from the U.S. and Germany.
 
0 comments | 931 views
July 15, 2015
Last week saw a successful and lively webcast about our PRIMEFLEX offerings for core Microsoft applications like SharePoint and Lync. As per usual, we provide you with an option to watch a rerun of the entire presentation including complete and detailed configuration advice.
 
0 comments | 2453 views
July 08, 2015
With more and more users trying out flash storage, Samsung has opted to make the faster, more resilient media type even more attractive by adding more real estate to its 850 EVO and PRO SSDs, which will soon sport twice the maximum capacity of previous models. The obvious target are customers who work with demanding applications, e.g. for 4K video editing.
 
0 comments | 943 views
June 30, 2015
Two years after the Snowden leaks, U.S. authorities are taking technical steps to regain at least some of the trust that was lost as a result of NSA attempts to compromise a certain encryption method.
 
0 comments | 1009 views
June 30, 2015
Today, 75% of all German companies use some kind of business or customer data analysis as a basis for strategic decisions. 48 percent claim that the process yields useful results.
 
0 comments | 1043 views
June 19, 2015
In their constant battle with NVIDIA, the makers of the Radeon™ GPU have now introduced a new line of flagship models, dubbed the R9 Fury series. The most notable improvements over previous models will reportedly come from an innovative technology called High-Bandwidth Memory, or HBM for short.
 
0 comments | 1134 views
June 06, 2015
San Francisco's most popular cloud storage service has added some new features that are supposed to strengthen security and simplify business integration.
 
0 comments | 1784 views
June 05, 2015
A few years back, everybody wondered why all of a sudden Larry Ellison wanted to buy Sun Microsystems. Meanwhile, we know the answer: Oracle's spiritus rector was looking for the right hardware to accommodate the company's many software products as well as the production know-how that came with it and turned "Big Red" into a serious competitor in the server field.
 
0 comments | 1086 views
June 01, 2015
Microsoft has confirmed rumors about the release date of its upcoming desktop OS that started to spread at the end of last week.
 
1 comments | 3839 views
May 31, 2015
At its TechWorld event, the current No. 1 in worldwide desktop and No. 4 in worldwide server sales introduced a new pair of "feature-rich" storage systems that cover a range of standard business scenarios and come at an entry-level price.
 
0 comments | 2196 views
May 28, 2015
Britain's leading IT security firm Sophos has introduced a software tool that's supposed to protect servers and desktops running the open source OS against "Linux-based and cross-platform exploits." The basic installation is cost-free.
 
0 comments | 2649 views
May 27, 2015
The storage and cloud infrastructure markets are constantly undergoing consolidation. Among the latest proofs for this trend is Virtustream, a provider of cloud software and cloud IaaS solutions, which will slip under the EMC umbrella in Q3/2015.
 
0 comments | 855 views
May 26, 2015
Austria-based pentesting company SEC Consult Vulnerability Lab warns of a critical vulnerability in the NetUSB technology developed by KCodes, a Taiwanese vendor of network devices and related software. NetUSB is used to implement "USB over IP" functionality in larger networks and enables workforces to access printers, external HDDs or speakers as though they were locally connected peripherals. According to SEC Consult, the vulnerability could affect routers from up to 26 manufacturers, including leading firms such as D-Link and Netgear.
 
0 comments | 1122 views
May 23, 2015
In response SSL/TSL attacks brought about by vulnerabilities such as Heartbleed and POODLE, the Internet Engineering Task Force (IETF) has provided administrators with a new version of its best current practice (BCP) guide on secure encryption of data in motion. Key advice to be gleaned from the rules laid down in RFC 7525 is as follows: support TLS 1.2 and DTLS 1.2, never ever allow devices to negotiate sessions using TLS 1, TLS 1.1, SSL v2 or SSL v3, and deploy TLS 1.3 as soon as possible.
 
0 comments | 1872 views
 
Page 16/26    12   13   14   15   16   17   18   19   20   21  
X

Please login

Please log in with your Fujitsu Partner Account.

Login


» Forgot password

Register now

If you do not have a Fujitsu Partner Account, please register for a new account.

» Register now