A Call for Open Cybersecurity Middleware
  • Published in

While attending Splunk.conf 15, I sat in on an interesting presentation given by Christof Jungo, head of security architecture and engineering at Swisscom.

Read More
Mobile is Here....Are you Ready?
  • Published in

Mobile is Here....Are you Ready? Mobile data traffic is expected to grow at a CAGR of around 45 percent between 2013 and 2019, resulting in a 10-fold increase over that time span...learn more about how mobile traffic will impact your network in this new infographic. ...

Read More
Media Advisory: Juniper Networks Demonstrates Latest VMware Integrations for Simplified Network Security and Automation at VMworld 2015 Europe
  • Published in

Dateline City: SUNNYVALE, Calif. SUNNYVALE, Calif.--(BUSINESS WIRE)--Juniper Networks (NYSE:JNPR), the industry leader in network innovation, today announced details regarding its upcoming participation at VMworld 2015...

Read More
Can A Pure Storage Company Make It Big?
  • Published in

There has been a lot of time and [electronic] ink expended of late in the build-up to, and eventual launch of, the Pure IPO yesterday. Most of the commentary has concentrated on the valuation and stock trading zone. As I write this, the stock price has floated down softly to around $15.50, off from...

Read More
Service Provider Problems with Analytics Tools

Gigamon Director of Service Provider Solutions Andy Huckridge recently spoke at the Telecom Council...

Read More
Signature Update #2543

Signature Update #2543 247 new signatures:HIGHHTTP: Typo3 CMS...

Read More
Networking: Intelligence Augmentation vs. Artificial Intelligence

I recently read the book Machines of Loving Grace: The Quest for Common Ground Between Humans and...

Read More
It’s a Team Effort: Developing a Culture of Cybersecurity in the Workplace

It’s a Team Effort: Developing a Culture of Cybersecurity in the Workplace ...

Read More
Junos 14.1 FIPS 140-2 Certification is Most Comprehensive Certification Yet

Junos 14.1 FIPS 140-2 Certification is Most Comprehensive Certification Yet ...

Read More
U.S. Critical Infrastructure Continue to Make Risky IT Bets

When the term “critical infrastructure” is mentioned in conversation, thoughts immediately turn...

Read More
IBM Gets Clever(safe) to Broaden Cloud Offerings

Yesterday IBM announced its intent to acquire Cleversafe, a Chicago-based object storage vendor....

Read More
Amazon AWS and Rackspace - A Cloud Hole-in-one?

Francis Ouimet had Eddy Lowery, Tiger Woods had Steve Williams, Jordan Spieth has Michael Greller,...

Read More

Videos

Venessa Moffat, EMEA Channel Manager, Ekkosense and Nick Ewing, MD of Efficiency IT, discuss the new partnership between the two companies which brings together EIT’s expertise in data centre design, build,...
Jo Debecker, Managing Partner and Global Head of Wipro FullStride Cloud, discusses the ways in which the sustainability agenda is shaping the data centre landscape, with cloud and AI seen as both challenges...
Stephen Douglas, Head of Market Strategy at Spirent, discusses the company’s 5th annual 5G outlook report, which finds that 5G Standalone (SA) market is picking up significant speed, alongside similar...
Dr. Alyson Freeman; Customer & Innovation lead, Sustainability & ESG, Dell Technologies, discusses the sustainability challenges facing the data centre industry and some of the ways in which the facility...

News

Nalco Water, an Ecolab company, and ITE are joining forces through the signing of a Memorandum of Understanding (MOU) to solidify a collaborative partnership that will advance knowledge transfer, education,...
Metomic surveyed more than 400 CISOs to better understand the biggest challenges security leaders are up against in 2024, along with their top priorities and initiatives.
OpenText brings together customers, partners and industry luminaries to explore the transformative power of AI as the force multiplier for human potential.
New Barracuda report explores why just 43% of organizations surveyed have confidence in their ability to address cyber risk, vulnerabilities, and attacks.