Oracle and ARM are working together to make the Java programming language more suitable for ARM processors, in order to encourage its use for embedded systems and enterprise software.

Oracle and ARM are working together to make the Java programming language more suitable for ARM processors, in order to encourage its use for embedded systems and enterprise software.
OpenStack has grown into a true enterprise proposition, according to Rackspace VP of Technology and Products, Nigel Beighton.
Given the record number of attendees at this year’s Reseller Middle East Partner Excellence Conference, it was clear that the region’s channel players wanted to hear how to tackle new challenges.
Walking through the PlayStation 3 section of my local Virgin Megastore recently, I came across something amazing – the chain has started accepting trade-ins as partial payment for new games.
SAP co-CEO Jim Hagemann Snabe will leave his post in May 2014 to become a member of the enterprise software vendor’s supervisory board, leaving Bill McDermott as sole CEO.
As forward-looking enterprises consider the future of their IT architectures, the key question emerging is not public versus private cloud, but rather how the enterprise will ensure consistency across an environment that includes both.
WatchGuard Technologies has been awarded a “Performance Verified Certification” by independent test lab, Miercom, for performing nearly 3.5 times faster …
Cisco is building a router for the Internet of Everything, the company’s initiative to connect the billions of devices – or 99 percent of the world – that it claims isn’t already connected.
The Chinese cyber-spies behind the widely publicised espionage campaign against The New York Times have added Dropbox and WordPress to their bag of spear-phishing tricks.
Enterprises are gaining the ability to turn existing storage platforms over to flash even as solid-state media remains mostly a tool for caching and for applications with special requirements.
A number of factors are increasing demand for improved access control; new technology capabilities, escalating security threats, and the trend to converged access control solutions that combine multiple applications either on smartcards or a new generation of Near Field Communications (NFC) – enabled mobile phones.
Red Hat today announced that it has named a new vice president of Global Strategic Alliances. Scott Musson, previously of VMware, will be responsible for Red Hat’s global alliance, system integrator and independent software vendor (ISV) relationships, and will manage Red Hat’s strategic relationships with HP, IBM, Dell and Cisco.
Red Hat has announced dates and details for the fifth annual Red Hat Europe, Middle East and Africa Partner Conference scheduled to take place in Madrid, from Sept. 29 – Oct. 2, 2013.
Does the business truly understand the complications of balancing new trends with less glamorous legacy applications? Joe Lipscombe investigates the balancing act.
A group of 26 U.S. senators, cutting across party lines, are seeking “public answers” on whether the National Security Agency collected in bulk other data such as credit card purchases and financial information in the U.S. besides phone records.
Cisco waited too long to address the software-defined networking trend now sweeping the industry, Chairman and CEO John Chambers said last week at the Cisco Live conference.
When the Commercial Bank of Dubai’s storage capacity was running out, it faced a dilemma familiar to many — increase capacity and face the maintenance costs, or take on a complete technology refresh.
Copy data management company, Actifio, and dedicated Middle East partner, Spectrami, have launched a Customer Experience Centre in Dubai dedicated to enhancing the customer experience for their wide breadth of partners and users… More pictures inside.
A U.S. researcher at IBM who invented the basic building block of the modern DRAM has been honoured with a prestigious Japanese award and a $500,000 prize.
SAP has significantly improved the security of its products over the past few years but many of its customers are negligent with their deployments, which exposes them to potential attacks that could cripple their businesses, according to security researchers.