Lenovo Expands its Focus on Telecom and Internet of Things

Lenovo Expands its Focus on Telecom and Internet of Things

Lenovo has recently announced plans for expansion that will eventually enable it to offer greater support to the telecom and IoT infrastructure via the delivery of new disruptive software-defined solutions. This bold new move is a direct result of Lenovo recording its highest revenue quarter in two years. The Lenovo Data Center Group (DCG) is powering on in its journey to deliver a customer-centric product that will hopefully replace the industry norm of expensive legacy solutions.

Read more

Lenovo™ Introduces New Yoga 730 and 530

Lenovo™ Introduces New Yoga 730 and 530

Two new models will join Lenovo’s popular 2-in-1 Yoga devices this year. Powered by Windows 10, the Yoga 730 and Yoga 530 offer the robust performance of a laptop paired with the lightweight convenience of a tablet. Contemporary styling gives these new machines a sleek look to match the intuitive features.

Read more

pay-per-use

HPE Expands “Pay-Per-Use IT” to Key Business Workloads

As one of the leaders in the IT industry, Hewlett Packard Enterprise has been at the forefront of business solutions. The company is now taking things further by expanding its unique “Pay-Per-Use IT” model to many key business workloads.

Read more

zbook

Streamlined Work Solutions with the HP ZBook

Technology is continually evolving, transforming the way people work and play. However, technology also responds to specific needs, seeking to enhance its own usability. While the smartphone and tablet have led the way for the past decade, the future will look to HP’s new detachable ZBook.

Read more

Ransomware

The Evolution of Ransomware and What It Means for Your Business

Ransomware attacks have been a hot topic in the news these days, but this type of malicious activity has actually been happening for years.  Over time, it has become more sophisticated, and the attacks are more damaging than ever.  The best way for business leaders to prevent a threat to their company is to understand the issue.  In this article, we’ll explore its history and discuss how this type of malicious software has evolved over the years.

Read more

HPE OneSphere

HPE OneSphere: World’s Most Advanced SaaS-Based Multi-Cloud Management System

Introducing HPE OneSphere

HPE OneSphere is the first multi-cloud management solution that offers a simplified yet unified service. It covers a range of private clouds, public clouds, hybrid variations, as well as software-driven infrastructure. This is achieved by letting clients access various IT resources – whether it be data, apps, and more – that reside within the cloud structure. Not only does this optimize resources, but it also allows apps and programs to be deployed faster, and helps minimize disruptions due to failovers.

Read more

Lenovo Introduces Its New Portfolio of Intelligent Devices

In recent weeks Lenovo has released six new, major devices to its portfolio. These include:

Read more

Lenovo Delivers Next Generation ‘Green’ Supercomputers

Lenovo computers are proudly leading the industry in the use of recyclable materials. At present, the company is developing the next generation of ‘green,’ eco-friendly supercomputers at competitive prices.

Read more

GDPR Extortion Attempts Are on the Rise Says Trend Micro

Antivirus and cybersecurity tech firm Trend Micro recently announced that GDPR extortion attempts are on the rise, with cybercriminals likely gearing up to attach larger organizations as they work to ensure compliance with the European Union privacy laws. Hackers and scammers can hold companies hostage by leveraging the power to take over control on vital aspects of these corporations if they gain access to their Internet of Things (IoT) devices or other devices on their network.

Read more

How Cisco’s New Encrypted Traffic Analytics Protect Your Network

Protect your network and files from unauthorized access by taking every possible step to prevent hackers from compromising your systems. Cisco has just announced the release of its encrypted traffic analytics (ETA) software that will stop attacks in their tracks and move you out of harm’s way. While hackers will encrypt malicious files and exploits to keep their attacks under the radar, ETA can even read and analyze encrypted malware, stopping it before it causes harm. Having ETA on your network will offer an extra layer of safety and give you peace of mind.