Third Platform Analytics Explained

The Third Platform is a term that refers to the current phase of the IT revolution in transforming the way people and businesses connect to technology. Unlike the first (computer mainframes) and second (open systems) phases that...

NoSQL Performance Explained

In this era of the ‘Third Platform’, modern applications now operate in myriad IT environments across social media, mobile computing, big data analytics, and cloud, which makes complex demands on your data management....

Hewlett Packard Enterprise (HPE) to Empower Datacentre Modernisation with Just Right IT

A major shift is taking place in the world of technology today, with an explosion in data and application growth expected in the next 5 to 10 years and it is driven by cloud, mobility and big data. By the year 2020, it’s...

SANtricity Explained

As highlighted in the last four ‘Explained’ stories, big data is becoming an immensely popular area of innovation which seems to be accelerating rather than slowing down. Following this trend, businesses increasingly...

Zero Day Attack Explained

Despite the precautions you've taken to protect your network and sensitive data, you're still at risk of a zero-day attack. But what exactly is it? A zero-day vulnerability refers to an undiscovered flaw in computer...

NetApp Well Positioned in the Indonesian Race to Flash

Indonesia is a vast and diverse, rapidly developing country and economy. Unsurprisingly Indonesia’s IT landscape reflects this rapid development. Companies are hungry to join the data-driven age and the requirements for...

Cloud Security Explained

Cloud computing is driving a revolution in the way we work and do business, making IT more efficient and cost-effective. It is being widely adopted across many industry sectors and it is becoming the new normal. Business and data...

Splunk Performance Explained

Operational Intelligence, Getting from Data to Insights Businesses must become smarter, more intelligent. In order to keep up with the pace of competition, they need to be able to have full insight and visibility into its...

Next Generation Endpoint Protection Explained

Endpoint protection or endpoint security is a policy-based approach to network security that addresses risks presented by devices connecting to an enterprise network. As BYOD (Bring Your Own Device) and mobile employees practices...

AI and ML are More Than Hype for Countering New Wave Security Threats

Technology is advancing at breakneck speed, effectively making life easier, more convenient and more efficient for us all. But each new technological development brings with it new waves of cyber threats. There are always those...