Belief in security breaches

A survey conducted recently by Lieberman Software Corporation reveals that more than 70% of IT security professionals would not be willing to bet $100 of their own money that their organization will not suffer a data breach in the next six months.

Read More

Insider threats and employee-owned devices identified as the greatest risks

New findings from network security management provider AlgoSec also indicate poor change management processes lead to network and application outages.

Read More

Violin Flash Memory Arrays certified with SAP® Sybase® Adaptive Server® Enterprise

Violin Memory, Inc. says that Violin 6000 Series Flash Memory Arrays are now certified for interoperability with SAP® Sybase® Adaptive Server® Enterprise (SAP Sybase ASE), delivering reliability and accelerated performance across a range of enterprise applications.

Read More

Hortonworks, Mirantis and Red Hat team

Hortonworks, Mirantis and Red Hat, Inc. are working together to contribute significantly to Project Savanna under the OpenStack community guidelines to deliver Apache Hadoop on OpenStack. This collaboration aims to provide many benefits including providing open source APIs and simpler transitions when moving Hadoop workloads between public and private clouds because re-tooling will not be required.

Read More


Topaz Team Profiles enable top mainframe professionals to share their methods, techniques, and...
HP kicks off global Amplify Partner Conference with future-ready strategy for driving greater...
Carleton Research Cloud offers rapid, self-service POWER compute resources for faster processing...
Italian inter-university consortium CINECA — one of the world’s most important supercomputing...
Pure Storage has introduced the second generation FlashArray//C, reducing the cost of running...
Pure Storage has expanded its Evergreen Storage Service (ES2) to provide customers with a unified...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more