Dell has announced new enterprise technology to ‘help customers architect new data centres and modernise campus networks’.

Dell has announced new enterprise technology to ‘help customers architect new data centres and modernise campus networks’.
Critics of the U.S. National Security Agency’s bulk collection of U.S. residents’ telephone records should offer a better way to track terrorists and protect the country against attacks, the agency’s director said Wednesday.
Hackers infiltrated computers belonging to the foreign affairs ministries of five unnamed European countries ahead of the G20 Summit in September, according to security researchers at FireEye.
According to a new study by Forrester Research, commissioned by Data-as-a-Service firm BDNA, 73 percent of high-level IT decision makers cite the complexity of data as the largest challenge in making effective IT decisions in the next 12 months.
Miniature tablets are becoming more and more popular, with devices like Google’s Nexus 7 and Apple’s iPad mini in the vanguard. Acer tried to bring Windows to the mini form with its Iconia W3 earlier this year, but that tablet was hampered by an awful screen, a bulky chassis, and a slow processor.
It’s a cold, hard fact that enterprises are putting more strain on their networks now than ever before. On top of this, never before has the risk of downtime been more pertinent―businesses simply can’t afford for their networks to be down, even momentarily, meaning the pressure is on CIOs to ensure that all services are up-and-running all of the time.
The three-day higher education conference, attracted participants from not only the region but also Asia, Europe and the USA.
A Russian-speaking group is advertising “bulletproof” hosting for cybercriminals from data centres in Syria and Lebanon, an apparent effort to place new services in locales where Western law enforcement has little influence.
Huawei has used its 2nd Middle East Smart Cities Summit in Doha to highlight the key factors that will drive increased adoption of Smart City infrastructure over the coming three to five years.
New attack campaigns have infected point-of-sale (PoS) systems around the world with sophisticated malware designed to steal payment card and transaction data.
Eight top tech companies in the U.S. have asked governments around the world to reform surveillance laws and practices, and asked the U.S. to take the lead.
If you’re in the market for a high-performing, low-priced Ultrabook, this has to be the one to go for.
Thirteen people, including the creator of Blackhole, a popular exploit tool used to infect computers with malware, were arrested and charged in Russia with creating and participating in a criminal organisation.
The Nasdaq computer index Friday hit its highest point since November 2000, in the wake of the dot-com bust, despite mixed reports this week from the hardware and components sector.
Once heavily reliant on the Chinese market, Lenovo is now looking to make acquisitions as it tries to expand its growing enterprise business to other countries.
When it comes to security, it seems everyone’s in a state of perpetual panic. Whether it’s mobile malware, BYOD or hacktivism, over the course of 2013 the issue of protecting valuable information and resisting attack has inspired a dizzying and persistent challenge.
CNME asks a panel of experts to look forward to the nine biggest storage trends of 2014.
Balancing security priorities with business flexibility and agility is a tough challenge, says Anthony Perridge, EMEA Channel Director, Sourcefire.
Following reports about U.S. surveillance worldwide, a United Nations panel has adopted a draft resolution on potential threats to human rights such as the right to privacy in the digital age.
The number of 4G-LTE mobile connections worldwide is forecast to pass one billion by 2017, according to a new study by GSMA Intelligence, the research arm of GSMA, the international trade body for mobile operators.