Return to the The Data Chain website homepage

Blog

Archive for February 2012

Understanding ShoreTel

29 Feb 2012

Adrian Hipkiss, managing director EMEA, ShoreTel writes: I joined ShoreTel as Managing Director, EMEA, this past October, and was invited to meet the board in Sunnyvale, California. Playing it safe, I dressed-up but was surprised to discover a relaxed group of senior executives. A “compliment” about my tie broke the ice and set me thinking about the parallel between Silicon Valley and ShoreTel.

Read blog post

DNSChanger Malware – Are you afraid you’ll lose Internet access on March 8th?

27 Feb 2012

Lauren Smith writes: Over 450,000 computers - including half of the Fortune 500 companies and over 50% of government entities – are still infected with the DNSChanger malware. Don’t be one of them! 

Read blog post

No skeleton key – protecting your organisation on the web

22 Feb 2012

Mark Knight, Director of Product Management, Thales e-Security, writes: Weaknesses in the SSL protocol (the protocol for encrypting information over the internet) or the public certificate authority (CA) ecosystem that underpin it have received a lot of coverage recently and the last couple of weeks have been no exception.

Read blog post

The expectation of collaboration

17 Feb 2012

DeLisa Alexander, SVP People writes: I believe that the future success for businesses to attract and retain top talent relies on a more open management and leadership approach. The workforce is evolving and the new employee is part of a major change affecting not only how we hire and who we hire, but how our companies operate on a basic level. It’s especially prevalent in the new generation entering the workforce.

Read blog post

Fiber-to-the-……

13 Feb 2012

James Donovan at CommScope writes: Over the past years, one infrastructure media technology in particular has become more and more common in catering to the trends in all types of networks, that of optical fiber. When I say networks, I mean it in widest sense to include Wide Area Networks (WAN), Metropolitan Area Networks (MAN), Local Area Networks (LAN), Cellular and Mobile Networks and Broadband Networks.

Read blog post

Certified Ethical Hacker's analysis of FBI-UK police call hack

03 Feb 2012

Graeme Batsman writes: It was reported in the media today that the Metropolitan Police and Federal Bureau of Investigation (FBI) have launched a criminal investigation after computer hackers intercepted a conference call between cyber security experts.

Read blog post

HP Software Introduces New Major Private and Public Cloud Discovery Capabilities with HP Discovery and Dependency Mapping Advanced (DDMA) Content Pack 10

02 Feb 2012

Michael Grainge writes:  Today I am pleased to formally announce the availability of HP Discovery and Dependency Mapping Advanced (DDMA) Edition Content Pack 10. This content pack ten introduces a myriad of new discovery capabilities – including discovery for major private and public cloud service providers, including Amazon Web Services (AWS) and vCloud. Cloud and virtualization discovery allow DDMA to reach beyond the physical world and into the world of private and public cloud services, and virtualized environments. In addition, these new capabilities can address and escalate customers cloud transformation and associated planning activities.

Read blog post
Broadgroup-Skyscraper

Mailing list




Copyright 2010-14 The Data Chain Website design and management by CBJ Digital Ltd.