Quantcast
Channel: Networks Asia - IT news
Browsing all 2029 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

What Extreme's string of networking acquisitions means for enterprises

Extreme Network’s recent string of acquisitions – including it’s recent $100 million auction-buy of Avaya’s networking business, it’s purchase of Brocade’s Ethernet IP networking assets and its...

View Article


Image may be NSFW.
Clik here to view.

HPE highlights innovation in software-defined IT, security at Discover

At its Discover conference, HPE pulled back the curtains on firmware security and advances in software-defined IT aimed to reduce costs and increase system flexibility for its users and help it stay...

View Article


Image may be NSFW.
Clik here to view.

GitHub Enterprise users get project management, data access improvements

GitHub has added data access tools and advanced project management to GitHub Enterprise, the on-premises version of the company’s code-sharing platform.Here are the notable features in GitHub...

View Article

Image may be NSFW.
Clik here to view.

7 ways AI will revolutionize business travel

In April, United Airlines hit a huge pocket of public relations turbulence after a passenger was forcibly removed from one of its partners’ airplanes. The incident raised questions about blindly...

View Article

Image may be NSFW.
Clik here to view.

Fujitsu, 1QBit work on quantum-inspired AI cloud service

Fujitsu and 1QB Information Technologies are collaborating on applying quantum-inspired technology to the field of artificial intelligence (AI), focusing on the areas of combinatorial optimization and...

View Article


Image may be NSFW.
Clik here to view.

Employees in Singapore lack the tools for effective collaboration

Employers in Singapore are not providing the right tools for employees to effectively collaborate and communicate internally across the organization, as well as externally with customers, according to...

View Article

Image may be NSFW.
Clik here to view.

Retarus E-Mail Security now includes E-mail Live Search and optimized...

Global information logistics provider Retarus continues the expansion of its e-mail security services by making a high-performance phishing filter and a new e-mail live search portal available to its...

View Article

Image may be NSFW.
Clik here to view.

EY bolsters APAC cyber-security business with Australian acquisition

Professional services firm EY has entered into an agreement to acquire one of Oceania’s leading identity and access management (IAM) providers, Melbourne- based Open Windows Australia Pty Ltd.The...

View Article


Image may be NSFW.
Clik here to view.

China's new cybersecurity law brings significant challenges and shift in...

The controversial new Cybersecurity Law which came into force on 1 June 2017 in China brings significant change and some uncertainty for companies but is to be expected in a rapidly evolving...

View Article


Image may be NSFW.
Clik here to view.

ANA Systems chooses IBS Software as a strategic technology partner

IBS Software has entered into a strategic partnership with ANA Systems (ASY), the IT division of ANA group (ANA), to enhance it's global delivery capabilities for innovative technology solutions for...

View Article

Image may be NSFW.
Clik here to view.

The top 5 mobile security threats

A smartphone can feel like a ticking time bomb to IT security pros. With the BYOD trend now well established in the workplace, and employees less vigilant about avoiding malicious links, the chances...

View Article

Image may be NSFW.
Clik here to view.

Don't be left behind by IPv6 deployment, ISOC warns enterprises

They have the resources, the expertise and, though they may not realize it, the need -- but it turns out that enterprises are often the ones that don't yet have IPv6.That's the finding of the Internet...

View Article

Image may be NSFW.
Clik here to view.

iOS 11 is here: Top 6 new features you need to know from WWDC

Siri in iOS 11 has learned to sound like an actual human—and that’s just the beginning when it comes to the new mobile operating system for iPhones and iPads.Apple CEO Tim Cook and friends gave us a...

View Article


Image may be NSFW.
Clik here to view.

How Windows 10 changes enterprise mobility management

Since its release 21 months ago, Windows 10 has forced companies to rethink how enterprise mobile management (EMM) is handled in their corporate environments.Unlike its predecessors, Windows 10 comes...

View Article

Image may be NSFW.
Clik here to view.

Legal impact of Data Protection and Management in the Digital Age

With increasing access to mobile devices and the internet, the amount of data created annually worldwide is predicted to soar to 180 zettabytes (180 trillion gigabytes) in 2025, with approximately 80...

View Article


Image may be NSFW.
Clik here to view.

A 10-step cybersecurity checklist for smart cities

In order to guide smart city developers, Trend Micro has come up with a quick 10-step cybersecurity checklist they can refer to when implementing smart technologies.Cities will get smarter over time....

View Article

Image may be NSFW.
Clik here to view.

'Judy' is possibly the largest malware campaign found on Google Play

Check Point researchers have discovered another widespread malware campaign on Google Play, Google’s official app store. The malware, dubbed “Judy”, is an auto-clicking adware which was found on 41...

View Article


Image may be NSFW.
Clik here to view.

Number of enterprise mobile apps is not accelerating, says Gartner report

More than a quarter of enterprises globally have not built, customized or virtualized any mobile apps in the last 12 months, according to the latest mobile app survey by Gartner, Inc.This number is...

View Article

Image may be NSFW.
Clik here to view.

Report identifies roadblocks to digital transformation in APAC

Many IT professionals in Asia Pacific are facing significant challenges when it comes to digital transformation and application development. A new report from OutSystems reveals that most organizations...

View Article

Image may be NSFW.
Clik here to view.

Tenable launches cloud-based vulnerability management platform

Tenable Network Security, Inc. has released its cloud-based Tenable.io platform, delivering new and enhanced capabilities to empower organizations to understand and reduce their cyber risk across the...

View Article
Browsing all 2029 articles
Browse latest View live