Welcome to thedatachain
thedatachain is all about the business of information logistics - from creation to deletion - taking the data centre as the hub around which today's IT issues revolve. Here you'll find up-to-the-minute videos on topics including The Cloud, Virtualisation, Compliance, Consolidation, Hosting, Outsourcing, Power & Cooling, and Convergence as well as specific technology sectors including security, applications, networking, storage networking, servers, operating systems, power, cooling, cabling and physical data centre infrastructure.
thedatachain team has many years' collective experience in publishing and marketing within the data centre and more general IT markets, and has built this website to reflect the importance of providing an information resource that is in tune with today's 'Facebook' generation.
Cyber Security. Evolved.
16 Sep 2013
In less than 300 seconds you can experience the speed and intensity of a cyber attack.View video details
Gartner for Marketing Leaders: Big Insights for a Big Data World
29 Aug 2013
Gartner for Marketing Leaders is focused on helping digital marketing executives succeed. It delivers real-time, personalized independent marketing guidance, from vision through execution.View video details
08 Oct 2013
IT will remain a truly hybrid environment for most organisations
Cloud computing has achieved mainstream deployment in the UK according to the latest research from the Cloud Industry Forum (CIF), with 61 per cent of organisations formally adopting at least one Cloud-based service.Read news post
04 Oct 2013
Web applications are inherently insecure due to vulnerabilities that are hard to patch and easy to exploit.
The OWASP Top 10 list, published by the Open Web Application Security Project, represents a broad consensus among security professionals of the most critical web application security flaws facing today’s organizations.Read news post
10 Oct 2013
Global’s IT team has to manage around 1,700 valuable mobile devices, used across the UK. Sales staff are frequently out of the office meeting prospects whilst staff at the Exeter office, which covers south west England, may only come into the office once a fortnight.Read article
04 Oct 2013
They are everywhere.
Not hackers per se, but the very platforms whose vulnerabilities hackers seek to exploit. I’m talking about content management systems (CMSs). As you may be aware, 20% of the top sites have already adopted CMS, and enterprises of all sizes will continue to rely on CMSs to edit, modify, and publish content from a central interface.Read article
23 Sep 2013
One of the interesting aspects of security awareness training is the intersection of information security with human resources. We know from experience that security practitioners are not always experts in the latter, but what we recently saw from Dave Clemente was a real doozy.Read article
17 Sep 2013
There is a myth amongst businesses that if you welcomingly accept BYOD (Bring Your Own Device) into the workplace, it will increase productivity.
To some extent, this is true. On the other hand, however, there is the issue that if you don’t have an IT infrastructure that can handle a large number of different devices accessing the network, day to day operations can’t be properly carried out.Read article