Welcome to thedatachain
thedatachain is all about the business of information logistics - from creation to deletion - taking the data centre as the hub around which today's IT issues revolve. Here you'll find up-to-the-minute videos on topics including The Cloud, Virtualisation, Compliance, Consolidation, Hosting, Outsourcing, Power & Cooling, and Convergence as well as specific technology sectors including security, applications, networking, storage networking, servers, operating systems, power, cooling, cabling and physical data centre infrastructure.
thedatachain team has many years' collective experience in publishing and marketing within the data centre and more general IT markets, and has built this website to reflect the importance of providing an information resource that is in tune with today's 'Facebook' generation.
Brocade Redefines SAN Management and Operation for EMC Entry-Level Primary Storage and Data Protection Solutions for EMC Business Partner Program Participants
07 May 2014
Mid-sized Businesses Can Now Deploy Fibre Channel SANs in EMC VSPEX Solutions to Help Ensure Enterprise-Class Reliability, Availability and Performance for New EMC VNXe and EMC Data Domain SystemsRead news post
07 May 2014
SANS Pen Test Berlin 2014, Europe’s largest dedicated Training Event and Summit for Penetration Testers and Ethical Hackers presents 5 courses including “SEC573: Python for Penetration Testers” and the new “SEC760: Advanced Exploit Development for Penetration Testers”Read news post
10 Oct 2013
Global’s IT team has to manage around 1,700 valuable mobile devices, used across the UK. Sales staff are frequently out of the office meeting prospects whilst staff at the Exeter office, which covers south west England, may only come into the office once a fortnight.Read article
04 Oct 2013
They are everywhere.
Not hackers per se, but the very platforms whose vulnerabilities hackers seek to exploit. I’m talking about content management systems (CMSs). As you may be aware, 20% of the top sites have already adopted CMS, and enterprises of all sizes will continue to rely on CMSs to edit, modify, and publish content from a central interface.Read article
24 Sep 2013
One of the interesting aspects of security awareness training is the intersection of information security with human resources. We know from experience that security practitioners are not always experts in the latter, but what we recently saw from Dave Clemente was a real doozy.Read article
18 Sep 2013
There is a myth amongst businesses that if you welcomingly accept BYOD (Bring Your Own Device) into the workplace, it will increase productivity.
To some extent, this is true. On the other hand, however, there is the issue that if you don’t have an IT infrastructure that can handle a large number of different devices accessing the network, day to day operations can’t be properly carried out.Read article