Fujitsu
Not logged in » Login
X

Please login

Please log in with your Fujitsu Partner Account.

Login


» Forgot password

Register now

If you do not have a Fujitsu Partner Account, please register for a new account.

» Register now

Recent Discussion:

NickBown | 22.12.2018, 14:18
We have come across this issue as well, and don't seem to have found a way around it (the server is ...
NickBown | 20.12.2018, 18:40
Hi everyoneWe've got an RX2540 M1 which won't boot past the Fujitsu splash screen (which shows the i...
MarkM | 15.10.2018, 11:33
Hi there.I do not believe the Fujitsu policy on this subject has changed.So NO you can not order dri...

News

October 20, 2017
In our world of data-dependent services, few security breaches can and will cause as much damage as a well-timed ransomware attack that encrypts vital information and only 'releases' the affected files after a large sum of money is paid. Over the course of the past five years, these schemes have turned out to be the proverbial pain in the rear.
 
0 comments | 783 views
October 18, 2017
Fujitsu has further expanded its already large workstation portfolio with a completely redesigned CELSIUS M770 and a refreshed CELSIUS R970 model.
 
0 comments | 1068 views
October 11, 2017
Over the past 12 months, 93% of large corporations and 87% of SMEs reported they fell victim to security breaches and cyber attacks. Worse yet, in 60% of all cases the adversaries gained up to nine months of free access to confidential, sensitive information before someone spotted their activities. Among the most favorite targets of criminal hackers and state-sponsored spies are passwords and other user credentials.
 
0 comments | 644 views
September 28, 2017
Quite a while has passed since IT mags found anything positive to write about the world's oldest open-source browser. The arrival of Firefox 57.0beta (aka Firefox Quantum) could put an end to this season of lukewarm-at-best coverage.
 
0 comments | 766 views
September 22, 2017
Over the past couple of days, representatives of the European Union and the United States have looked into the current state of the inner workings of the EU-U.S. Privacy Shield, the data exchange/data protection rules the two parties carved out after the European Court of Justice had scrapped its predecessor, the so-called Safe Harbor agreement, as a result of the NSA's and other agencies' mass surveillance.
 
0 comments | 722 views
September 15, 2017
Fujitsu channel partners who wish to become (or already are) SELECT Experts on Hybrid Cloud need to know how to customize the Catalog Manager, understand how to include a service and expose it, do a pricing model and generate a revenue stream. This is precisely what yesterday's TechCommunity WebTalk enables them to do.
 
0 comments | 853 views
August 31, 2017
Senior IT professionals from all over the world agree that "pressure is growing fast on IT infrastructure and operational processes, with no signs of this abating anytime soon." That was the key result of a survey conducted among IT leaders from various industries such as Manufacturing, Retail and Financial Services. As it stands, IT ops teams are often flooded with routine tasks in infrastructure and platform management and can only dedicate a fraction of their working hours to implementing or developing/planning new services. The preferable method for solving these problems would be to automate key operations activities and eventually move on to the full-fledged software-defined data center (SDDC).
 
0 comments | 677 views
August 29, 2017
A fairytale is about to turn into data center reality: VMware has successfully turned its former Project Goldilocks into a production-ready SaaS (Software-, or in this case rather Security-as-a-Service) offering and presented it during the U.S. leg of its annual VMworld inhouse trade show.
 
0 comments | 616 views
July 26, 2017
In April 2010, the late Steve Jobs wrote an open letter to tell Adobe and the rest of the world about his "Thoughts on Flash." In it, he explained why the multimedia software was no longer allowed to run on iPhones, iPods and iPads. Aside from performance issues on mobile devices, he cited security concerns as one key reason for the decision. Moreover, Jobs was also confident that more capable and secure web technologies could easily take over Flash's role. Some seven years later, Adobe is finally preparing to give in to the Apple founder's verdict.
 
0 comments | 932 views
July 21, 2017
Back in 2011, Germany's eco - the largest Internet industry association in Europe with over 1,000 member organizations – hosted its first Internet Security Days (ISD), a conference-exhibition mix designed to help companies protect their webpages and customer-facing IT processes. Meanwhile, the ISD are a well-established event that attracts participants from all over the continent.
 
0 comments | 845 views
July 11, 2017
California-based storage vendor Viking Technology, a specialist in non-volatile, DRAM and high-density stacking technologies, has launched a line of SAS SSDs with raw capacities of 25 and 50 TB.
 
0 comments | 908 views
June 29, 2017
At its annual Live event in Las Vegas, networking behemoth Cisco has introduced a fresh concept for connecting computing devices through a new class of solutions that will "learn, adapt and evolve" over time. The idea is to make network management easier and more intuitive – and use machine learning to help customers protect their data traffic.
 
0 comments | 584 views
June 26, 2017
From centralized to distributed to hyper-converged: The history of computing infrastructures often seems to evolve in a circular motion. Now the Linux market leader has started to support the most recent fashion with its introduction of Red Hat Hyperconverged Infrastructure, integrated, software-defined, fully open source compute and storage platform designed for remote sites and edge deployments.
 
0 comments | 724 views
June 24, 2017
For the larger part of the past 30 years, finding speech recognition programs that work with Microsoft products wasn't exactly problematic. However, things could get tricky if one wanted solutions that were affordable, not limited in language and/or application support, and not third-party programs, all at the same time. Users still seeking for such a package may want to take a look at Microsoft's new Dictate add-in for office applications.
 
0 comments | 689 views
June 23, 2017
The Standard Performance Evaluation Corporation (SPEC) has responded to vendor and user requests for a benchmark that allows for "comparisons of system and compute performance to be made between platforms with different instruction sets and operating systems" based on current hardware and applications.
 
0 comments | 842 views
June 22, 2017
HPC enthusiasts on both sides of the Atlantic may not enjoy hearing this, but their renowned biannual ranking of the world's most powerful scientific computer systems sometimes suffers from the same key symptom that makes many soap operas so hard to digest: predictability. Once a supercomputer has conquered a spot among the 10 or 20 fastest number crunchers, it usually retains that position for years – much like Larry Hagman and Patrick Duffy did in "Dallas." The TOP500's latest edition (no. 49) seems to adhere to the same rule, but eventually provides a little more entertainment value.
 
0 comments | 759 views
May 29, 2017
Retro is the new modern: a Russian programmer recently spotted a bug in NTFS 3.1, the file system that's been employed to 'keep together' all Microsoft operating systems since the days of Windows XP. As it happens, this bug can be used to tamper with computers running Windows 7 and Windows 8.1 as well as the occasional age-defying Vista machine.
 
0 comments | 1033 views
May 28, 2017
Along with its huge positive impact, the 'digital revolution' has also produced a number of less desirable side effects. One of these is an increasing lack of privacy that's often induced by all too talkative data transfer protocols. The Internet Engineering Task Force (IETF) has now issued a recommendation (RFC 8165, published under the ISSN 2070-1721) that's supposed to remediate these shortcomings.
 
0 comments | 937 views
May 27, 2017
Romanian security outfit Bitdefender has introduced a fresh piece of software that promises to protect virtualized environments against so-called root level attacks, i.e. attacks that aim to bypass conventional security mechanisms, which typically shield VMs and guest OS's, but not the hypervisor they run on.
 
0 comments | 1229 views
May 05, 2017
For the third consecutive year, Fujitsu is recognizing channel partners who have delivered outstanding value for customers through digital transformation projects. The contest is open to more than 16,000 members of our global SELECT Partner program and get to pick those of their peers who should be officially rewarded for their accomplishments.
 
0 comments | 569 views
 
Page 7/24    3   4   5   6   7   8   9   10   11   12