Fujitsu
Not logged in » Login
X

Please login

Please log in with your Fujitsu Partner Account.

Login


» Forgot password

Register now

If you do not have a Fujitsu Partner Account, please register for a new account.

» Register now

Recent Discussion:

MarkM | 15.10.2018, 11:33
Hi there.I do not believe the Fujitsu policy on this subject has changed.So NO you can not order dri...
blondie63 | 07.10.2018, 09:30
Hi, i’ve bought a server for my customer: TX1320M3 E3-1230V6 3.5GHZVPN: T1323SX130ITSN: YMBK014865Be...
JuergenL | 10.06.2018, 10:58
Hi Johannes,Download DeskView Client (to be installed on all the clients) or DeskView Instant BIOS M...

News

February 15, 2017
Security incidents are never easy to deal with, but time and again unskilled assailants have been known to leave traces on hacked computers that enable CISOs and IT teams to protect their networks against further onslaughts – and, occasionally, to strike back. These traces typically take on the form of files that show up on a hard drive, but definitely don't belong there. However, meanwhile vicious criminals have figured out several methods to circumvent regular detection mechanisms. One of these methods is the so-called fileless attack.
 
0 comments | 868 views
February 14, 2017
As many of you know, Fujitsu operates production facilities and branch offices in multiple European locations. This puts us in a very comfortable position whenever it comes to delivering products and services across the EMEIA region. But did you know that we also offer the opportunity to visit with us in order to gain deeper insights into Fujitsu products and technologies?
 
0 comments | 929 views
January 28, 2017
"Crime doesn't pay," says an old adage. Still every year statistics about so-called cyber-crimes – i.e. the online equivalent of felonies that were previously only committed in the real world – provide us with evidence to the contrary. The latest "Consumer Security Risks Survey" from Kaspersky Lab is no exception to the rule.
 
0 comments | 840 views
January 24, 2017
As Microsoft releases updated installation media for Windows 10 v1607 (aka the Anniversary Update) through its various upgrade and licensing channels, the company also announces that support for the earliest edition will end on March 26, 2017.
 
0 comments | 791 views
January 24, 2017
Cisco's WebEx branch is widely known for delivering online collaboration and conferencing tools for the enterprise. Over time, their software became so popular that browser vendors like Google and Mozilla were prompted to introduce plug-ins that enable Chrome and Firefox users to directly join a conference. With success: the Chrome extension alone is said to have 20 million active users – who could potentially fall victim to a simple yet effective security bug.
 
0 comments | 804 views
January 19, 2017
Installing the quarterly Oracle Critical Patch Updates is rarely a lot of fun, but the collection available in Round 1, 2017 might cause irritation due to the sheer number of amendments.
 
0 comments | 777 views
January 11, 2017
Taming big data and extracting valuable intelligence from multiple data sources in the enterprise just got a whole lot easier.
 
0 comments | 778 views
January 05, 2017
Every year, IT security pros of all experience levels welcome the arrival of what could sarcastically be dubbed the "Golden Raspberry Awards of Software" – meaning, the list of software products with the most security holes in them, as recorded by Mitre Corporation in its Common Vulnerabilities and Exposures (CVE) database in the year leading up to the list's publication. The winner of the 2016 Un-Award for Most Bugs Reported was Android with a whopping 523 distinct vulnerabilities logged in the CVE.
 
0 comments | 833 views
January 02, 2017
While we're a little late this year, we still wanted to take the opportunity to thank our community members and readers for the fantastic experience of the past 12 months and wish you all a happy, healthy and safe New Year, with maximum success in all your endeavors. "May the force be with you!"
 
0 comments | 445 views
December 30, 2016
Allegedly named after the world's smallest mountain, Google's latest software-related initiative has nonetheless set high goals for itself: the idea is to scan the world's most popular cryptographic libraries for known weaknesses in order to help IT departments and CISOs set up secure implementations.
 
0 comments | 792 views
December 28, 2016
We all know from experience that many long-term liaisons between browsers and operating systems were created for rational grounds rather than because of immediate or emerging bonds of sympathy between two software makers. Surprisingly enough, though, such strained relationships are often among the longest-lasting in the industry – as was the case with Mozilla's Firefox browser and Microsoft's discontinued-but-not-yet-completely-deceased OS's.
 
0 comments | 936 views
December 27, 2016
Scheduled Java release dates have long had a reputation for being unreliable, regardless of whether we're talking about end user oriented or enterprise editions. Now the developers at Oracle, who have been entrusted with oversight of the Java EE project, are trying to overcome the almost habitual delays.
 
0 comments | 718 views
December 26, 2016
Azure Storage easily qualifies for a top position among Microsoft's most popular cloud services, not least because it allows users to efficiently get rid of on-premises capacity problems. The key here is that it lets users upload very large sets of unstructured object data also known as BLOBs (short for: Binary Large Objects).
 
0 comments | 767 views
December 23, 2016
Swiss-based software outfit Veeam, famous for its agentless backup solutions for virtualized environments, has made its first foray into the field of protecting data on physical systems.
 
0 comments | 881 views
December 22, 2016
For a good while, British chip designers ARM Ltd. have been trying to secure themselves a share of the growing market for HPC processors. So far with limited success – right now, the field belongs to Intel and IBM. But ARM's chances may well increase in the near future, since it has now acquired Allinea Software, a company prominent for its HPC development and performance monitoring tools.
 
0 comments | 713 views
December 20, 2016
Three months after the delayed release of their second JavaScript framework, the developer team have now outlined their plans for future releases as well as a new naming convention.
 
0 comments | 588 views
December 08, 2016
"Driving Digital Transformation" was the motto of this year's successful Fujitsu Forum that drew more than 12,500 attendees from 83+ countries to Munich in mid-November. Footage of the highlights, keynotes and more is now available here at TechCommunity – or via YouTube.
 
0 comments | 692 views
November 30, 2016
In the early 2000s, WYSIWYG editors were a major asset in the tool chest of aspiring web designers who hoped these programs would help them generate/write clean HTML code in no time flat. In those days, virtually no one had heard about services and tools like Facebook, Tumblr or WordPress that have since turned the ability to create visually appealing websites from a rare talent into an acquired skill. Google's revamped Sites app now promises to take simplification to a new level, as it lets corporate users build web pages and wikis "without writing a single line of code."
 
0 comments | 772 views
November 30, 2016
Czech software outfit JetBrains, provider of popular tools like IntelliJ IDEA and CLion, has launched a public early access preview (EAP) of "Rider," a cross-platform development tool based on the company's own IntelliJ and ReSharper technologies.
 
0 comments | 627 views
November 29, 2016
Microsoft has announced several updates for its Office 365 software suite that are supposed to make collaboration with co-workers easier and more efficient. The new capabilities include real-time co-authoring in PowerPoint, the ability to upload attachments to the cloud directly from Outlook, and more.
 
0 comments | 690 views
 
Page 7/22    3   4   5   6   7   8   9   10   11   12