August 24, 2016

Fujitsu launches Hybrid Cloud Connect service for connectivity to Public Cloud services

Fujitsu announced the launch of a new Hybrid Cloud Connect service that helps organizations accelerate their digital transformation. It enables integration of cloud-based services into corporate networks, by providing assured connectivity and Quality of Service (QoS) for business critical applications running on hyperscale public clouds including Microsoft Office 365, Azure and Fujitsu’s recently launched Fujitsu Cloud Service K5.


Read more

August 5, 2016

Microsoft updates OneDrive with automatic ‘Pokémon detection’

Considering the number of companies which have opportunistically jumped aboard the Pokémon Go craze, it’s not surprising to see yet another follow suit. Microsoft announced a new feature for OneDrive, its cloud mobile storage service, that automatically detects digital Pokémon from the augmented reality game in photos uploaded from your smartphone.


July 13, 2016

BT and Oracle Collaborate to Make It Easier for Global Organizations to Move to the Cloud

BT and Oracle announced that they are working together to help organizations across the world take advantage of performance, cost and innovation benefits of the cloud. Oracle customers will be able to leverage the high performance, reliability, and security features of the BT Cloud Connect environment to gain direct connectivity to the Oracle Cloud.


Read more

June 29, 2016

5 steps to stronger data security

The old cliche is true: Your organization’s most precious asset is its data. Five basic security building blocks can ensure its safety.

Nearly everything we do in computer security is meant to protect data. After all, we don’t deploy antimalware software, tighten security configurations, or implement firewalls to protect users, per se. Job No. 1 is to protect the organization’s data — including employee and (especially) customer data.

But guess what? People need to work with that data or you wouldn’t store it in the first place — which is why most data security measures focus on ensuring only trusted, authorized parties get access to it. Follow these five recommendations and your mission-critical data will be well protected.


Read more