CloudBees Jenkins Enterprise and CloudBees Jenkins Operations Center bundled into a single solution

CloudBees has announced at the Jenkins User Conference/Europe the availability of its new CloudBees Jenkins Platform, offering customers large and small the ability to adopt continuous delivery on their path to a DevOps culture.

Read More

Linux Container deployment plans grow

Developer benefits remain compelling; integration, management and development skills gaps remain challenges to enterprise adoption.

Read More

SUSE elevates Docker in SUSE Linux Enterprise Server 12

Open source Docker automates application deployment in Linux containers, improving efficiency.

Read More

Improving customer experience through cloud-based technology reporting tools

ACCO Brands, one of the world's largest suppliers of branded office products, has streamlined its contact centre system by replacing the on premise PBX with 8x8 Solutions’ cloud-based unified communications platform.

Read More

How do you avoid cloud evaporation?

Written by William Rabie, Head of Cloud, EMEA & APAC, iland.

Read More

Cloud security training courses for EMEA

New workforce study statistics reveal almost half of UK infosec workers say cloud-based services are a security concern.

Read More

Unique dual-region strategy, sustainability, and next-generation cloud architecture help customers...
Zscaler has acquired Edgewise Networks, a pioneer in securing application-to-application...
Global air filter company selects Interoute as its worldwide digital infrastructure...
Trustwave has released the second-annual 2015 Security Pressures Report, based on a survey of 1,016...
Over two-thirds of surveyed IT professionals believe cloud account takeovers are a significant risk...
Study finds 86% of enterprises have adopted a multi-cloud strategy; 60% are moving mission-critical...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more