Fujitsu
Not logged in » Login
X

Please login

Please log in with your Fujitsu Partner Account.

Login


» Forgot password

Register now

If you do not have a Fujitsu Partner Account, please register for a new account.

» Register now

Recent Discussion:

NickBown | 22.12.2018, 14:18
We have come across this issue as well, and don't seem to have found a way around it (the server is ...
NickBown | 20.12.2018, 18:40
Hi everyoneWe've got an RX2540 M1 which won't boot past the Fujitsu splash screen (which shows the i...
MarkM | 15.10.2018, 11:33
Hi there.I do not believe the Fujitsu policy on this subject has changed.So NO you can not order dri...

News

February 18, 2017
As the digital transformation of our economy and society is gaining ever more momentum, more and more IT-savvy criminals are trying to exploit the weaknesses and shortcomings of yet-to-be-established technologies. Oftentimes with success: 'highlights' from last year include the successful October 21 DDoS attack on DynDNS, a service that maps domain names to IP addresses, which was launched over a gigantic IoT botnet and caused long-lasting outages of popular services and web sites like Airbnb, GitHub, PayPal, and Twitter. Other felons extorted tens of thousands of dollars from hospitals whose computer systems they had previously contaminated with ransomware.
 
0 comments | 1121 views
February 15, 2017
Security incidents are never easy to deal with, but time and again unskilled assailants have been known to leave traces on hacked computers that enable CISOs and IT teams to protect their networks against further onslaughts – and, occasionally, to strike back. These traces typically take on the form of files that show up on a hard drive, but definitely don't belong there. However, meanwhile vicious criminals have figured out several methods to circumvent regular detection mechanisms. One of these methods is the so-called fileless attack.
 
0 comments | 1308 views
February 14, 2017
As many of you know, Fujitsu operates production facilities and branch offices in multiple European locations. This puts us in a very comfortable position whenever it comes to delivering products and services across the EMEIA region. But did you know that we also offer the opportunity to visit with us in order to gain deeper insights into Fujitsu products and technologies?
 
0 comments | 1551 views
January 28, 2017
"Crime doesn't pay," says an old adage. Still every year statistics about so-called cyber-crimes – i.e. the online equivalent of felonies that were previously only committed in the real world – provide us with evidence to the contrary. The latest "Consumer Security Risks Survey" from Kaspersky Lab is no exception to the rule.
 
0 comments | 1145 views
January 24, 2017
As Microsoft releases updated installation media for Windows 10 v1607 (aka the Anniversary Update) through its various upgrade and licensing channels, the company also announces that support for the earliest edition will end on March 26, 2017.
 
0 comments | 1107 views
January 24, 2017
Cisco's WebEx branch is widely known for delivering online collaboration and conferencing tools for the enterprise. Over time, their software became so popular that browser vendors like Google and Mozilla were prompted to introduce plug-ins that enable Chrome and Firefox users to directly join a conference. With success: the Chrome extension alone is said to have 20 million active users – who could potentially fall victim to a simple yet effective security bug.
 
0 comments | 1072 views
January 19, 2017
Installing the quarterly Oracle Critical Patch Updates is rarely a lot of fun, but the collection available in Round 1, 2017 might cause irritation due to the sheer number of amendments.
 
0 comments | 1077 views
January 11, 2017
Taming big data and extracting valuable intelligence from multiple data sources in the enterprise just got a whole lot easier.
 
0 comments | 1098 views
January 05, 2017
Every year, IT security pros of all experience levels welcome the arrival of what could sarcastically be dubbed the "Golden Raspberry Awards of Software" – meaning, the list of software products with the most security holes in them, as recorded by Mitre Corporation in its Common Vulnerabilities and Exposures (CVE) database in the year leading up to the list's publication. The winner of the 2016 Un-Award for Most Bugs Reported was Android with a whopping 523 distinct vulnerabilities logged in the CVE.
 
0 comments | 1152 views
January 02, 2017
While we're a little late this year, we still wanted to take the opportunity to thank our community members and readers for the fantastic experience of the past 12 months and wish you all a happy, healthy and safe New Year, with maximum success in all your endeavors. "May the force be with you!"
 
0 comments | 587 views
December 30, 2016
Allegedly named after the world's smallest mountain, Google's latest software-related initiative has nonetheless set high goals for itself: the idea is to scan the world's most popular cryptographic libraries for known weaknesses in order to help IT departments and CISOs set up secure implementations.
 
0 comments | 1100 views
December 28, 2016
We all know from experience that many long-term liaisons between browsers and operating systems were created for rational grounds rather than because of immediate or emerging bonds of sympathy between two software makers. Surprisingly enough, though, such strained relationships are often among the longest-lasting in the industry – as was the case with Mozilla's Firefox browser and Microsoft's discontinued-but-not-yet-completely-deceased OS's.
 
0 comments | 1388 views
December 27, 2016
Scheduled Java release dates have long had a reputation for being unreliable, regardless of whether we're talking about end user oriented or enterprise editions. Now the developers at Oracle, who have been entrusted with oversight of the Java EE project, are trying to overcome the almost habitual delays.
 
0 comments | 1019 views
December 26, 2016
Azure Storage easily qualifies for a top position among Microsoft's most popular cloud services, not least because it allows users to efficiently get rid of on-premises capacity problems. The key here is that it lets users upload very large sets of unstructured object data also known as BLOBs (short for: Binary Large Objects).
 
0 comments | 1134 views
December 23, 2016
Swiss-based software outfit Veeam, famous for its agentless backup solutions for virtualized environments, has made its first foray into the field of protecting data on physical systems.
 
0 comments | 1383 views
December 22, 2016
For a good while, British chip designers ARM Ltd. have been trying to secure themselves a share of the growing market for HPC processors. So far with limited success – right now, the field belongs to Intel and IBM. But ARM's chances may well increase in the near future, since it has now acquired Allinea Software, a company prominent for its HPC development and performance monitoring tools.
 
0 comments | 1173 views
December 20, 2016
Three months after the delayed release of their second JavaScript framework, the developer team have now outlined their plans for future releases as well as a new naming convention.
 
0 comments | 841 views
December 08, 2016
"Driving Digital Transformation" was the motto of this year's successful Fujitsu Forum that drew more than 12,500 attendees from 83+ countries to Munich in mid-November. Footage of the highlights, keynotes and more is now available here at TechCommunity – or via YouTube.
 
0 comments | 1076 views
November 30, 2016
In the early 2000s, WYSIWYG editors were a major asset in the tool chest of aspiring web designers who hoped these programs would help them generate/write clean HTML code in no time flat. In those days, virtually no one had heard about services and tools like Facebook, Tumblr or WordPress that have since turned the ability to create visually appealing websites from a rare talent into an acquired skill. Google's revamped Sites app now promises to take simplification to a new level, as it lets corporate users build web pages and wikis "without writing a single line of code."
 
0 comments | 1193 views
November 30, 2016
Czech software outfit JetBrains, provider of popular tools like IntelliJ IDEA and CLion, has launched a public early access preview (EAP) of "Rider," a cross-platform development tool based on the company's own IntelliJ and ReSharper technologies.
 
0 comments | 934 views
 
Page 9/24    5   6   7   8   9   10   11   12   13   14