Big Data
Big Switch Networks unveils BigSecure Architecture for dynamic cyber-defence at Terabit performance
Introduces cloud-native application traffic visibility by dynamically monitoring VM, container and public cloud environments Big…
The great submarine leak
The wide-ranging data leak on India’s French-origin Scorpene submarines hosted on its website recently by…
Lenovo: A Disruptor and the Challenger to Watch in the Data Centre Space
Today, disruption is the new norm. It is no longer a question of “if”, but…
Commentary on Yahoo leak
Rick Holland, vice president of Strategy at Digital Shadows A listing has been identified on the Real Deal…
Gemalto releases findings of first half 2016 Breach Level Index
Data breaches up 15% and compromised data records up 31% compared to previous six months…
Data Republic launches open data marketplace
Data Republic has announced the launch of the Open Data Marketplace, a world-first governed marketplace…
Acronis empowers SMBs to fortify data protection with up to 2TB of free cloud storage
Aggressive promotion aimed at driving greater adoption of complete data protection Acronis has announced a limited-time…
Locating a new weapon for Australia’s data detectives
In an era of big data, where every officer and vehicle is a sensor, how…
Stulz and TSI announce joint venture to deliver modular data centre solutions
STULZ has announced a joint venture and majority shareholding in Technology Space Integration (TSI). The joint…
Hewlett Packard Enterprise Introduces Industry-First ‘Single Source of Truth’ Solution for Global Information Management and Governance
HPE Verity combines industry-leading big data analytics with information archiving, data protection, eDiscovery and more,…
Big data & the internet
Think you’re ready for Big Data and IoT? Standard tests are just not enough. Rapid…
Four steps to implementing a big data program in the cloud
Big data projects don’t exist in a vacuum. Your big data infrastructure elements should have…
The Benefits of Network Monitoring
By Keith Bromley, Senior Solutions Marketing Manager, Ixia Network monitoring is rapidly becoming a hot…
Analysis of the Cyber Security Strategy: Strategic pillars of change
Strategic pillars of change: Analysis of the Cyber Security Strategy By Tony Campbell On the…