Specialist data center news for North America
These search results are from across the Techday Network of sites
Intel adds U and Y series to 8th gen family
They are designed for maximum connectivity speeds and come with a range of upgrades to suit modern requirements.
New HPE Pointnext capabilities accelerate transition to memory-driven computing
Memory-Driven Computing is a new computing architecture that puts memory, not processing, at the centre of the computing platform.
Global eFPGA market to triple by 2024, reaching US$9 billion
Opportunity in the eFPGA market is growing as it renovates the chip design process and changes the way the data centres are maintained.
HPE expands its portfolio with the ProLiant DL325 Gen10 server
Customers can supposedly achieve enterprise-class process, memory and I/O performance without paying for a dual-processor server.
Where to buy your Coffee Lake - Ingram's best Intel offer
The comprehensive partner programme is just one among many the reasons to buy Intel's latest offerings from Ingram Micro.
Intel delivers huge leap forward with 8th Generation Core desktop processor range
Intel's latest offering steps things up a notch, increasing the total core count while infusing the units with company's Hyper-Threading Technology.
Intel's new processors promise to relieve space & power constraints in edge computing
The processors will be supported by system software updates to protect customers from the security exploits like “Spectre” and “Meltdown.”
Whitepaper: How to explain why IT security needs more budget
Do you want to convince your higher-ups that IT and security need more budget?
Whitepaper: How to make sure your security architecture keeps up with surging network speeds
The annual cost of cybercrime is expected to exceed US$6t by 2021 with a large contributor being the sheer amount of data that requires processing.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?