Return to the The Data Chain website homepage

Welcome to thedatachain

About thedatachain

thedatachain is all about the business of information logistics - from creation to deletion - taking the data centre as the hub around which today's IT issues revolve. Here you'll find up-to-the-minute videos on topics including The Cloud, Virtualisation, Compliance, Consolidation, Hosting, Outsourcing, Power & Cooling, and Convergence as well as specific technology sectors including security, applications, networking, storage networking, servers, operating systems, power, cooling, cabling and physical data centre infrastructure.

thedatachain team has many years' collective experience in publishing and marketing within the data centre and more general IT markets, and has built this website to reflect the importance of providing an information resource that is in tune with today's 'Facebook' generation.

Big Data Use Case

30 Jan 2014

Learn how the various data management and processing tools are used 

View video details

Cyber Security. Evolved.

17 Sep 2013

In less than 300 seconds you can experience the speed and intensity of a cyber attack.

View video details

Microsoft Least Trusted Brand In Poll of Data Storage Companies

17 Apr 2014

New Report Suggests Businesses Turning to Swiss Data Storage Companies As Trustworthy Alternative to US Brands

Read news post

Centerprise celebrates winning major contract with HM Treasury

17 Apr 2014

Centerprise International (Ci) has won a major four-year contract to deliver media and wireless ICT services to the Treasury.

Read news post

Absolute Software helps UK’s leading commercial radio group transform mobile device management

10 Oct 2013

Global’s IT team has to manage around 1,700 valuable mobile devices, used across the UK. Sales staff are frequently out of the office meeting prospects whilst staff at the Exeter office, which covers south west England, may only come into the office once a fortnight.

Read article

Why Your CMS Is A Hacker’s Dream Come True

04 Oct 2013

They are everywhere.

Not hackers per se, but the very platforms whose vulnerabilities hackers seek to exploit. I’m talking about content management systems (CMSs). As you may be aware, 20% of the top sites have already adopted CMS, and enterprises of all sizes will continue to rely on CMSs to edit, modify, and publish content from a central interface.

Read article

Negative reinforcement: How NOT to improve user behavior

24 Sep 2013

One of the interesting aspects of security awareness training is the intersection of information security with human resources. We know from experience that security practitioners are not always experts in the latter, but what we recently saw from Dave Clemente was a real doozy.

Read article

The BYOD dilemma

18 Sep 2013

There is a myth amongst businesses that if you welcomingly accept BYOD (Bring Your Own Device) into the workplace, it will increase productivity.

To some extent, this is true. On the other hand, however, there is the issue that if you don’t have an IT infrastructure that can handle a large number of different devices accessing the network, day to day operations can’t be properly carried out.

Read article
 



Copyright 2010-14 The Data Chain Website design and management by CBJ Digital Ltd.