Zwei-Faktor-Authentifizierung für den „Informationsmotor Analytics“: Über Smartphone und Co. Nutzer eindeutig identifizieren - Big Data-Infrastrukturen tokenlos absichern Autorin: Julia Manderbach, freie Journalisti

  1.000.000.000.000.000.000.000 Zettabyte – diese Datenmenge überschritt das globale digitale Universum erstmals im Jahre 2010, laut der IDC-Studie "Extracting value from Chaos". Die Sammlung, Verarbeitung und Analyse dieser enormen Datenmengen wird in der IT-Welt unter dem Phänomen „Big Data“ zusammengefasst. Um diese Informationsmasse handhaben zu können, bedarf es riesiger Infrastrukturen. Bedenkt man den Wert der Daten, die dort kursieren,...

Read More


Halfords revamps IT environment

LANDesk Management Suite 9.5 helps Halfords provide robust user experience and on-demand access to information.

Read More

Desktone and GreenBytes partner

Desktone, Inc. and GreenBytes, Inc. have announced a strategic partnership to offer service providers an all-in-one on-premises solution. By combining the Desktone DaaS Platform with the GreenBytes vIO virtual storage appliance, the companies are making high-performance virtual desktop environments simple and affordable.

Read More



The new addition will deliver an increased performance compared to existing Leaseweb services and...
Deutsches Zentrum fur Luft- und Raumfahrt (DLR) - the German Aerospace Center - has awarded NEC...
Data-centric organisations in healthcare, financial, and travel services trust Scality RING as the...
Nasuni, a leading enterprise data platform for modern hybrid cloud environments, has announced a...
Cohesity and HPE enables TEC Eurolab to maximize data security and resiliency, improve customer...
In benchmark testing at early deployments, combined solutions deliver 3X performance vs....
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more