Return to the The Data Chain website homepage

Welcome to thedatachain

About thedatachain

thedatachain is all about the business of information logistics - from creation to deletion - taking the data centre as the hub around which today's IT issues revolve. Here you'll find up-to-the-minute videos on topics including The Cloud, Virtualisation, Compliance, Consolidation, Hosting, Outsourcing, Power & Cooling, and Convergence as well as specific technology sectors including security, applications, networking, storage networking, servers, operating systems, power, cooling, cabling and physical data centre infrastructure.

thedatachain team has many years' collective experience in publishing and marketing within the data centre and more general IT markets, and has built this website to reflect the importance of providing an information resource that is in tune with today's 'Facebook' generation.

Big Data Use Case

30 Jan 2014

Learn how the various data management and processing tools are used 

View video details

Cyber Security. Evolved.

17 Sep 2013

In less than 300 seconds you can experience the speed and intensity of a cyber attack.

View video details

Brocade Redefines SAN Management and Operation for EMC Entry-Level Primary Storage and Data Protection Solutions for EMC Business Partner Program Participants

07 May 2014

Mid-sized Businesses Can Now Deploy Fibre Channel SANs in EMC VSPEX Solutions to Help Ensure Enterprise-Class Reliability, Availability and Performance for New EMC VNXe and EMC Data Domain Systems

Read news post

Berlin to host SANS Europe’s largest Pen Test and Ethical Hacking Event

07 May 2014

SANS Pen Test Berlin 2014, Europe’s largest dedicated Training Event and Summit for Penetration Testers and Ethical Hackers presents 5 courses including “SEC573: Python for Penetration Testers” and the new “SEC760: Advanced Exploit Development for Penetration Testers”

Read news post

Absolute Software helps UK’s leading commercial radio group transform mobile device management

10 Oct 2013

Global’s IT team has to manage around 1,700 valuable mobile devices, used across the UK. Sales staff are frequently out of the office meeting prospects whilst staff at the Exeter office, which covers south west England, may only come into the office once a fortnight.

Read article

Why Your CMS Is A Hacker’s Dream Come True

04 Oct 2013

They are everywhere.

Not hackers per se, but the very platforms whose vulnerabilities hackers seek to exploit. I’m talking about content management systems (CMSs). As you may be aware, 20% of the top sites have already adopted CMS, and enterprises of all sizes will continue to rely on CMSs to edit, modify, and publish content from a central interface.

Read article

Negative reinforcement: How NOT to improve user behavior

24 Sep 2013

One of the interesting aspects of security awareness training is the intersection of information security with human resources. We know from experience that security practitioners are not always experts in the latter, but what we recently saw from Dave Clemente was a real doozy.

Read article

The BYOD dilemma

18 Sep 2013

There is a myth amongst businesses that if you welcomingly accept BYOD (Bring Your Own Device) into the workplace, it will increase productivity.

To some extent, this is true. On the other hand, however, there is the issue that if you don’t have an IT infrastructure that can handle a large number of different devices accessing the network, day to day operations can’t be properly carried out.

Read article

Copyright 2010-14 The Data Chain Website design and management by CBJ Digital Ltd.