Fujitsu
Not logged in » Login
X

Please login

Please log in with your Fujitsu Partner Account.

Login


» Forgot password

Register now

If you do not have a Fujitsu Partner Account, please register for a new account.

» Register now

Recent Discussion:

NickBown | 22.12.2018, 14:18
We have come across this issue as well, and don't seem to have found a way around it (the server is ...
NickBown | 20.12.2018, 18:40
Hi everyoneWe've got an RX2540 M1 which won't boot past the Fujitsu splash screen (which shows the i...
MarkM | 15.10.2018, 11:33
Hi there.I do not believe the Fujitsu policy on this subject has changed.So NO you can not order dri...

News

March 17, 2017
After a 123-month run, Microsoft will officially pull the plug on any Windows Vista installations that may still exist on April 11, 2017. Users who are still running the ancient OS should switch to a more recent version.
 
0 comments | 1234 views
March 15, 2017
VMware Labs have issued a new tool that helps admins to better monitor, analyze and understand virtual machines' storage I/O behavior. Data obtained from this tool can then be used to improve capacity planning and performance tuning.
 
0 comments | 1670 views
February 28, 2017
Back in December, we reported that Oracle developers had published a roadmap that gave an overview of the new features contained in the upcoming version of Java EE and said the framework was due out in "late 2017." More recent leaks from the community now suggest that "late" might mean early in the second half of the year.
 
0 comments | 1021 views
February 28, 2017
Fans of Athlon and Phenom CPUs as well as users with limited budgets had long waited for this day: last week, AMD chief Lisa Su finally introduced the company's new flagship product, the Ryzen™ 7 desktop processor. Targeted at gamers and content creators, the new eight-core model will be available in three editions, arrive in stores on March 2 – and sell for less than half the price of comparable Intel gear.
 
0 comments | 1515 views
February 18, 2017
As the digital transformation of our economy and society is gaining ever more momentum, more and more IT-savvy criminals are trying to exploit the weaknesses and shortcomings of yet-to-be-established technologies. Oftentimes with success: 'highlights' from last year include the successful October 21 DDoS attack on DynDNS, a service that maps domain names to IP addresses, which was launched over a gigantic IoT botnet and caused long-lasting outages of popular services and web sites like Airbnb, GitHub, PayPal, and Twitter. Other felons extorted tens of thousands of dollars from hospitals whose computer systems they had previously contaminated with ransomware.
 
0 comments | 1200 views
February 15, 2017
Security incidents are never easy to deal with, but time and again unskilled assailants have been known to leave traces on hacked computers that enable CISOs and IT teams to protect their networks against further onslaughts – and, occasionally, to strike back. These traces typically take on the form of files that show up on a hard drive, but definitely don't belong there. However, meanwhile vicious criminals have figured out several methods to circumvent regular detection mechanisms. One of these methods is the so-called fileless attack.
 
0 comments | 1437 views
February 14, 2017
As many of you know, Fujitsu operates production facilities and branch offices in multiple European locations. This puts us in a very comfortable position whenever it comes to delivering products and services across the EMEIA region. But did you know that we also offer the opportunity to visit with us in order to gain deeper insights into Fujitsu products and technologies?
 
0 comments | 1673 views
January 28, 2017
"Crime doesn't pay," says an old adage. Still every year statistics about so-called cyber-crimes – i.e. the online equivalent of felonies that were previously only committed in the real world – provide us with evidence to the contrary. The latest "Consumer Security Risks Survey" from Kaspersky Lab is no exception to the rule.
 
0 comments | 1208 views
January 24, 2017
As Microsoft releases updated installation media for Windows 10 v1607 (aka the Anniversary Update) through its various upgrade and licensing channels, the company also announces that support for the earliest edition will end on March 26, 2017.
 
0 comments | 1185 views
January 24, 2017
Cisco's WebEx branch is widely known for delivering online collaboration and conferencing tools for the enterprise. Over time, their software became so popular that browser vendors like Google and Mozilla were prompted to introduce plug-ins that enable Chrome and Firefox users to directly join a conference. With success: the Chrome extension alone is said to have 20 million active users – who could potentially fall victim to a simple yet effective security bug.
 
0 comments | 1149 views
January 19, 2017
Installing the quarterly Oracle Critical Patch Updates is rarely a lot of fun, but the collection available in Round 1, 2017 might cause irritation due to the sheer number of amendments.
 
0 comments | 1149 views
January 11, 2017
Taming big data and extracting valuable intelligence from multiple data sources in the enterprise just got a whole lot easier.
 
0 comments | 1163 views
January 05, 2017
Every year, IT security pros of all experience levels welcome the arrival of what could sarcastically be dubbed the "Golden Raspberry Awards of Software" – meaning, the list of software products with the most security holes in them, as recorded by Mitre Corporation in its Common Vulnerabilities and Exposures (CVE) database in the year leading up to the list's publication. The winner of the 2016 Un-Award for Most Bugs Reported was Android with a whopping 523 distinct vulnerabilities logged in the CVE.
 
0 comments | 1225 views
January 02, 2017
While we're a little late this year, we still wanted to take the opportunity to thank our community members and readers for the fantastic experience of the past 12 months and wish you all a happy, healthy and safe New Year, with maximum success in all your endeavors. "May the force be with you!"
 
0 comments | 622 views
December 30, 2016
Allegedly named after the world's smallest mountain, Google's latest software-related initiative has nonetheless set high goals for itself: the idea is to scan the world's most popular cryptographic libraries for known weaknesses in order to help IT departments and CISOs set up secure implementations.
 
0 comments | 1168 views
December 28, 2016
We all know from experience that many long-term liaisons between browsers and operating systems were created for rational grounds rather than because of immediate or emerging bonds of sympathy between two software makers. Surprisingly enough, though, such strained relationships are often among the longest-lasting in the industry – as was the case with Mozilla's Firefox browser and Microsoft's discontinued-but-not-yet-completely-deceased OS's.
 
0 comments | 1490 views
December 27, 2016
Scheduled Java release dates have long had a reputation for being unreliable, regardless of whether we're talking about end user oriented or enterprise editions. Now the developers at Oracle, who have been entrusted with oversight of the Java EE project, are trying to overcome the almost habitual delays.
 
0 comments | 1081 views
December 26, 2016
Azure Storage easily qualifies for a top position among Microsoft's most popular cloud services, not least because it allows users to efficiently get rid of on-premises capacity problems. The key here is that it lets users upload very large sets of unstructured object data also known as BLOBs (short for: Binary Large Objects).
 
0 comments | 1199 views
December 23, 2016
Swiss-based software outfit Veeam, famous for its agentless backup solutions for virtualized environments, has made its first foray into the field of protecting data on physical systems.
 
0 comments | 1472 views
December 22, 2016
For a good while, British chip designers ARM Ltd. have been trying to secure themselves a share of the growing market for HPC processors. So far with limited success – right now, the field belongs to Intel and IBM. But ARM's chances may well increase in the near future, since it has now acquired Allinea Software, a company prominent for its HPC development and performance monitoring tools.
 
0 comments | 1257 views
 
Page 9/24    5   6   7   8   9   10   11   12   13   14