Fujitsu
Not logged in » Login
X

Please login

Please log in with your Fujitsu Partner Account.

Login


» Forgot password

Register now

If you do not have a Fujitsu Partner Account, please register for a new account.

» Register now

Recent Discussion:

MarkM | 15.10.2018, 11:33
Hi there.I do not believe the Fujitsu policy on this subject has changed.So NO you can not order dri...
blondie63 | 07.10.2018, 09:30
Hi, i’ve bought a server for my customer: TX1320M3 E3-1230V6 3.5GHZVPN: T1323SX130ITSN: YMBK014865Be...
JuergenL | 10.06.2018, 10:58
Hi Johannes,Download DeskView Client (to be installed on all the clients) or DeskView Instant BIOS M...

News

September 25, 2018
Along with ransomware, DDoS attacks are the equivalent of a medieval plague for today's data-and-network-dependent companies. And needless to say, they're all looking for protection against strikes that will not only reliably crash their sites and cause immediate financial loss, but – if occurring repeatedly – can also bludgeon their reputation and drive away customers over the medium term. But which service providers are powerful and trustworthy enough to shield their customers' networks and still stick with European data protection and privacy rules? Two new papers from Germany's Federal Office for Information Security (BSI) aim to help CIOs and their teams find the right partners.
 
0 comments | 62 views
September 23, 2018
Researchers working for Trend Micro's Zero Day Initiative (ZDI) have detected a security hole in Microsoft's Joint Engine Technology (JET) Database Engine that could enable attackers to execute arbitrary code on vulnerable Windows installations. Because there is no patch available yet, the researchers caution JET Engine users not to open files from unknown or untrusted sources.
 
0 comments | 211 views
September 21, 2018
Wouldn't it be just fantastic if users could log into any web portal, mail account and myriad other services without ever having to remember one of those pesky passwords again? Yup it would be, the W3C Consortium decided at some point in 2015, and started working on the Web Authentication (WebAuthn) standard, in collaboration with the FIDO Alliance and various browser makers. Following unusually fast progress, the first Candidate Recommendation was published in March this year. Not much later, both Google and Mozilla incorporated the fresh standard and API into the then-current versions of their Chrome and Firefox browsers – yet another quick decision, but one that may now backfire.
 
0 comments | 71 views
September 14, 2018
UShareSoft, a Fujitsu company and leader in Hybrid IT application automation, has substantially enhanced its UForge AppCenter solution: the platform is now the only one in the market that enables IT teams to fully model both application stacks and their deployment infrastructure 'as code.' The idea here was to make it easier for enterprises to deploy and manage applications agnostically across multi-cloud environments, thus helping to increase business agility as part of digital transformation, without sacrificing governance and control.
 
0 comments | 91 views
August 31, 2018
Online trackers not only invade one's privacy, they also have a negative impact on the overall 'web experience': A study by browser extension maker Ghostery, published last May, revealed that trackers can massively cut into page load speeds – on a truly overburdened page, the rendering process may eat up more than one minute. Whether at home, at the office or on the go, this can seriously compromise the performance of knowledge workers. Plus, in the age of (mobile) broadband, it seems outright ridiculous.
 
0 comments | 225 views
August 28, 2018
Practically on the heels of its latest Threadripper flagship CPU, Intel's old and new nemesis takes on another long-standing rival, in this case GPU market leader NVIDIA, with a fresh line of graphics cards developed specifically for virtualized environments and workloads.
 
0 comments | 317 views
August 27, 2018
Whether it's industry robots, power grids, drones or autonomous vehicles – so-called 'critical' systems and infrastructures play an increasingly important role in economies and societies around the globe. Against this backdrop, it's only logical that numerous hard- and software vendors have stepped up their efforts to develop tamper-resistant building blocks in order to increase the safety of these systems and infrastructures. Among the latest endeavors in this area is the Intel® Safety Critical Project for Linux* OS, which was introduced last Sunday and will be presented to a wider audience at the Open Source Summit in Vancouver later this week.
 
0 comments | 120 views
August 17, 2018
Taiwanese hardware vendor Gigabyte Technology Co., Ltd. – better known under its all-caps marketing moniker – has introduced two new dual-socket servers equipped with 64-bit ARM CPUs that will be offered as a "genuine alternative" to regular x86-64-based hardware for "mainstream datacenter deployment."
 
0 comments | 196 views
August 15, 2018
18 months after the release of its first Ryzen™ desktop CPU and 15 months after the debut of its 32-core EPYC server counterpart, Intel's No. 1 challenger in traditional hardware markets is at it again: AMD kicked off this week with the release of its second-generation Ryzen Threadripper 2990WX, the world's first 32-core desktop processor that can handle 64 threads and delivers clock speeds of 3.0 GHz in standard and 4.2 GHz in "boost" (aka turbo) mode.
 
0 comments | 234 views
August 09, 2018
While IT experts frequently wrestle over numerous issues, there's also a lot of topics they easily agree on. One of these is that once disaster strikes, organizations of all types and sizes can't afford to stay offline for even an hour or two, or worse, lose business- and mission-critical data during a sudden outage. Small businesses in particular are vulnerable to the resulting repercussions: According to Gartner, 70% of small firms that experience major data losses have to close up shop within the next 12 months.
 
0 comments | 259 views
August 03, 2018
To help companies accelerate the transition to software-defined data centers, Fujitsu has launched an upgraded version of its Infrastructure Management software. The powerful software not only allows for simplified, centralized operations and monitoring of entire IT infrastructures, as the name implies, improving data center performance and uptime in the process and thereby enabling major cost and power savings.
 
0 comments | 699 views
July 30, 2018
California-based security and data protection specialist Malwarebytes has released the beta version of a prospective browser add-on that's supposed to shield non-IE/non-Edge users from malicious and other unwanted web content.
 
0 comments | 212 views
July 27, 2018
Workgroups relying on Gmail and Dropbox have long waited for a tool that would help them to better synchronize content between the two platforms. The Dropbox for Gmail add-on, which is available from the G Suite Marketplace, fulfills that need.
 
0 comments | 174 views
July 24, 2018
Never shy to explore unknown terrain, Mozilla's browser developers have come up with a new concept that's supposed to help them detect memory errors in C/C++ code using the AddressSanitizer (ASan) tool and remote crash reports. To implement these functions, they've created a new branch of Nightly builds that can be run alongside other Firefox editions. However, the most original aspect is that users willing to assist the developers will be treated like participants of the Firefox bug bounty program (aka Bugzilla).
 
0 comments | 223 views
July 23, 2018
Western Digital Corp. (WD) and Toshiba have separately announced the successful development of 96-layer, 4-bit-per-cell (aka quad-level cell or QLC), 3D NAND Flash memory. Dubbed BiCS4, the new chip can store up to 1.33 terabits (Tb) of data in a single die, which may then be stacked into a 16-layer architecture, allowing for a maximum of 2.66 TB raw storage capacity in a single package.
 
0 comments | 181 views
July 21, 2018
Ever since the heydays of GeoCities and Tripod, Internet users around the world have tended to store increasingly larger chunks of information online. Today, that (mega-)trend remains unbroken, not least due to the fact that there's practically no limit to the purposes such platforms can be used for. From operating a web shop through writing a travel blog to keeping a personal diary, pretty much everything is in the mix, and it's only logical that everyone involved will at some point upload documents (like invoices or receipts), notes, conversations with friends and colleagues, graphs and other drawings, and many, many photographs and videos. Then one day, the inevitable happens: Your trusted hosting platform informs you that it will raise prices, loosen privacy protections, merge with another service or simply close up shop – and that you have 90 or sometimes 30 days left to transfer all your files and data to a new host.
 
0 comments | 283 views
July 18, 2018
Once per quarter, there's an event that administrators tasked with managing Oracle software do not look forward to, and that's the day when the company's so-called Critical Patch Update is released. The reason for such nervousness is easy to detect: Because of their specific release cycle, these updates typically address hundreds of vulnerabilities at once – a situation that's usually exacerbated by the fact that these flaws are dispersed across dozens of software products. However, even by Oracle's standards this month's package of 334 security fixes is likely a record breaker.
 
0 comments | 168 views
July 17, 2018
Archiving chunks of business data over long periods of time is not only a legal requirement for many businesses, it also provides an effective solution to help manage growing amounts of retained data. With the new ETERNUS CS8050 NAS, Fujitsu has developed a fast and reliable archiving solution that offloads daily backup for inactive but still important business data, helping customers to streamline daily backups.
 
0 comments | 256 views
July 12, 2018
Halfway through the week, Fujitsu started looking for participants in this year's SELECT Innovation Awards, a contest that is open to all SELECT Partner Program members and will reward the winner with US-$10,000 as a first prize.
 
0 comments | 146 views
June 29, 2018
Wireless networks have long been a popular target for criminal hackers of all skill and sophistication levels, especially if they still use the outdated WEP and WPA security protocols. Last fall, researchers found that even the more mature WPA2 was susceptible to offline key reinstallation (KRACK) attacks. Consequently, the Wi-Fi Alliance – the industry association that defines and maintains standards for wireless networking – is now pushing for the implementation of new protective features for enterprise and personal installations.
 
0 comments | 237 views
 
Page 2/22    1   2   3   4   5   6   7   8   9   10