Fujitsu
Not logged in » Login
X

Please login

Please log in with your Fujitsu Partner Account.

Login


» Forgot password

Register now

If you do not have a Fujitsu Partner Account, please register for a new account.

» Register now

Recent Discussion:

NickBown | 22.12.2018, 14:18
We have come across this issue as well, and don't seem to have found a way around it (the server is ...
NickBown | 20.12.2018, 18:40
Hi everyoneWe've got an RX2540 M1 which won't boot past the Fujitsu splash screen (which shows the i...
MarkM | 15.10.2018, 11:33
Hi there.I do not believe the Fujitsu policy on this subject has changed.So NO you can not order dri...

News

July 21, 2018
Ever since the heydays of GeoCities and Tripod, Internet users around the world have tended to store increasingly larger chunks of information online. Today, that (mega-)trend remains unbroken, not least due to the fact that there's practically no limit to the purposes such platforms can be used for. From operating a web shop through writing a travel blog to keeping a personal diary, pretty much everything is in the mix, and it's only logical that everyone involved will at some point upload documents (like invoices or receipts), notes, conversations with friends and colleagues, graphs and other drawings, and many, many photographs and videos. Then one day, the inevitable happens: Your trusted hosting platform informs you that it will raise prices, loosen privacy protections, merge with another service or simply close up shop – and that you have 90 or sometimes 30 days left to transfer all your files and data to a new host.
 
0 comments | 816 views
July 18, 2018
Once per quarter, there's an event that administrators tasked with managing Oracle software do not look forward to, and that's the day when the company's so-called Critical Patch Update is released. The reason for such nervousness is easy to detect: Because of their specific release cycle, these updates typically address hundreds of vulnerabilities at once – a situation that's usually exacerbated by the fact that these flaws are dispersed across dozens of software products. However, even by Oracle's standards this month's package of 334 security fixes is likely a record breaker.
 
0 comments | 494 views
July 17, 2018
Archiving chunks of business data over long periods of time is not only a legal requirement for many businesses, it also provides an effective solution to help manage growing amounts of retained data. With the new ETERNUS CS8050 NAS, Fujitsu has developed a fast and reliable archiving solution that offloads daily backup for inactive but still important business data, helping customers to streamline daily backups.
 
0 comments | 562 views
July 12, 2018
Halfway through the week, Fujitsu started looking for participants in this year's SELECT Innovation Awards, a contest that is open to all SELECT Partner Program members and will reward the winner with US-$10,000 as a first prize.
 
0 comments | 298 views
June 29, 2018
Wireless networks have long been a popular target for criminal hackers of all skill and sophistication levels, especially if they still use the outdated WEP and WPA security protocols. Last fall, researchers found that even the more mature WPA2 was susceptible to offline key reinstallation (KRACK) attacks. Consequently, the Wi-Fi Alliance – the industry association that defines and maintains standards for wireless networking – is now pushing for the implementation of new protective features for enterprise and personal installations.
 
0 comments | 595 views
June 28, 2018
Mozilla has updated the stable version of its browser and added a number of goodies that speed up page rendering, simplify tab management and enhance security.
 
0 comments | 372 views
June 26, 2018
The Internet Engineering Task Force (IETF) has announced plans to retire old editions of the Transport Layer Security Protocol (TLS) as soon as possible.
 
0 comments | 520 views
June 25, 2018
After five years of Chinese dominance, U.S. institutions and supercomputer makers managed to dethrone the seemingly invincible duet of Sunway TaihuLight and Tianhe-2A and replace them with their exorbitantly powerful Summit and Sierra systems. Fujitsu, whose Oakforest-PACS and K computer systems dropped to position nos. 12 and 16 respectively, turned in a good performance nonetheless with its AI Bridging Cloud Infrastructure (ABCI), which debuted at #5.
 
0 comments | 339 views
June 23, 2018
Fujitsu has developed and produced the prototype of an ARM processor that is supposed to power the so-called Post-K System, the direct successor to the company's famous K computer.
 
0 comments | 628 views
June 22, 2018
Helsinki-based software and service company Basemark has introduced a new graphics performance evaluation suite that's useful for both consumers and IT departments.
 
0 comments | 312 views
June 19, 2018
Cisco's security division Talos has published additional information regarding the modular router malware VPNFilter that first made headlines at the end of May.
 
0 comments | 496 views
June 14, 2018
Four students from the Chalmers University of Technology in Gothenburg, Sweden, won the 2018 Fujitsu Innovation Award for their conception of a "smart intersection" that would help to increase the efficiency of traffic control systems and enhance traffic security.
 
0 comments | 849 views
June 01, 2018
130 channel partners from all across Europe, 30 Speakers, 86 workshops, and three keynotes on important topics such as the EU's just-implemented GDPR (General Data Protection Regulation), Artificial Intelligence, Quantum Computing and IoT – this pretty much sums up what happened at this year's TechCommunity Workshop at Lisbon in mid-May.
 
0 comments | 1818 views
May 30, 2018
The Korean electronics and memory technology giant announced it has taken up mass production of a new line of small outline dual in-line memory modules (SoDIMMs) aimed at boosting the gaming capabilities of laptop computers.
 
0 comments | 707 views
May 30, 2018
From healthcare through manufacturing to the distribution of welfare, modern societies are increasingly grappling with previously unknown challenges that will shape our lives in the near and not-so-near future. Examples include demographic ageing, the disintegration of family ties and a resulting increase in single-parent/single-person households, growing workforce mobility and migration, or the near-permanent reorganization of manufacturing processes and industrial infrastructures. In all of these areas, modern ICT technologies can contribute a great deal to much-needed solutions.
 
0 comments | 610 views
May 29, 2018
Google's browser developers have kicked off the rollout of the latest version of the world's most popular web viewer. The new edition adds various security fixes, drops a less successful protective technology and supports the Web Authentication (WebAuthn) standard that allows for logins without passwords.
 
0 comments | 671 views
May 25, 2018
The networking hardware giant's security division has identified a particularly nasty bit of modular malware that infiltrates routers and NAS systems, especially those deployed in SOHO environments.
 
0 comments | 977 views
May 18, 2018
Enterprises are increasingly under cyberattack, which can lead to data loss or corruption. The latest threat is ransomware, which became one of – if not the – most popular cyber-attack schemes in recent years, with adversaries invading infrastructures, encrypting critical data and not 'releasing' them unless and until users pay the equivalent of thousands of dollars in crypto-coins for the unlock keys. As attacks of this nature become more sophisticated each day, organizations that are locked out of their data face a trail of damage that can take weeks or months to repair.
 
0 comments | 795 views
May 16, 2018
Every spring, organizers and event planners from Berlin, Cologne and Hanover start running ads and sending out invitations for the annual Internet Security Days – by its own description the leading conference on cybersecurity and related topics in Germany. Since its inception in 2003, the event – which is hosted by Germany's eco Association of the Internet Industry and the publishing house Heinz Heise, which is renowned for its roster of IT publications and news services – has served as some sort of one-stop shop for C-level executives from all industries who wish to learn about the latest trends, cast a glance at protective software and service offerings, or discuss practical implications of legal frameworks for privacy protection.
 
0 comments | 623 views
May 09, 2018
It's no secret that, historically speaking, the 'war' between proprietary and open source software has not only cost both factions are fortune, but was also instrumental in creating a whole mountain range of missed opportunities. Against this backdrop, it's always heartening to see the two camps come to terms and cooperate, as in this latest project, which was announced yesterday at the Red Hat Summit 2018 in San Francisco.
 
0 comments | 891 views
 
Page 5/24    1   2   3   4   5   6   7   8   9   10