Mobile is Here....Are you Ready?
  • Published in

Mobile is Here....Are you Ready? Mobile data traffic is expected to grow at a CAGR of around 45 percent between 2013 and 2019, resulting in a 10-fold increase over that time span...learn more about how mobile traffic will impact your network in this new infographic. ...

Read More
Media Advisory: Juniper Networks Demonstrates Latest VMware Integrations for Simplified Network Security and Automation at VMworld 2015 Europe
  • Published in

Dateline City: SUNNYVALE, Calif. SUNNYVALE, Calif.--(BUSINESS WIRE)--Juniper Networks (NYSE:JNPR), the industry leader in network innovation, today announced details regarding its upcoming participation at VMworld 2015...

Read More
Can A Pure Storage Company Make It Big?
  • Published in

There has been a lot of time and [electronic] ink expended of late in the build-up to, and eventual launch of, the Pure IPO yesterday. Most of the commentary has concentrated on the valuation and stock trading zone. As I write this, the stock price has floated down softly to around $15.50, off from...

Read More
Service Provider Problems with Analytics Tools
  • Published in

Gigamon Director of Service Provider Solutions Andy Huckridge recently spoke at the Telecom Council Innovation Meeting in Mountain View, CA. See how Gigamon solves the problem of the combination of decreasing ARPU/bit, exponentially increasing big data, and the limited ability of analytics tools to...

Read More
Signature Update #2543

Signature Update #2543 247 new signatures:HIGHHTTP: Typo3 CMS...

Read More
Networking: Intelligence Augmentation vs. Artificial Intelligence

I recently read the book Machines of Loving Grace: The Quest for Common Ground Between Humans and...

Read More
It’s a Team Effort: Developing a Culture of Cybersecurity in the Workplace

It’s a Team Effort: Developing a Culture of Cybersecurity in the Workplace ...

Read More
Junos 14.1 FIPS 140-2 Certification is Most Comprehensive Certification Yet

Junos 14.1 FIPS 140-2 Certification is Most Comprehensive Certification Yet ...

Read More
U.S. Critical Infrastructure Continue to Make Risky IT Bets

When the term “critical infrastructure” is mentioned in conversation, thoughts immediately turn...

Read More
IBM Gets Clever(safe) to Broaden Cloud Offerings

Yesterday IBM announced its intent to acquire Cleversafe, a Chicago-based object storage vendor....

Read More
Amazon AWS and Rackspace - A Cloud Hole-in-one?

Francis Ouimet had Eddy Lowery, Tiger Woods had Steve Williams, Jordan Spieth has Michael Greller,...

Read More
Signature Update #2542

Signature Update #2542 A detector has been released, see complete...

Read More

Videos

Ojonimi Bako, CEO and co-founder of Kaya AI, explains how, by leveraging artificial intelligence, data analytics and automation, the company streamlines procurement processes, enabling faster, more efficient,...
Kelly Hiscoe, Senior Director, Global Partner Programs and Experience and Tim Goodwin, Director International Channel Partnerships, both at Rapid7, explain how the company has developed and launched a new PACT...
Jorge Myszne, Niobium’s Chief Product Officer, explains Fully Homomorphic Encryption, what it is, how it works and, importantly, why data encryption during computation matters in the world of AI, multi-site...
Jonathan Kinsey, EMEA Data Centre Lead at JLL, discusses the findings of JLL’s new 2025 Global Data Center Outlook, exploring the relationship between AI, sustainability and investment demands. Jonathan is...

News

Lennox EMEA is taking cooling performance to the next level by introducing a new range of computer room air handling units (CRAH) designed specifically for high-performance Data Centre applications. The new...
Sustainable frame-based support structure for IT/HPC Deployments, 50% lighter than steel alternatives.
The data center industry is on the brink of rapid transformation, driven by emerging technologies that promise to reshape its future.
Cloud defenders are gaining ground as the cloud landscape comes into focus, with 92% of organizations operating without risky human users.