GridGain Sets Record Sales in First Half of 2016

Series B Financing, Product Updates and Major Industry Awards Demonstrate Strong Momentum for In-Memory Data Fabric Company

Series B Financing, Product Updates and Major Industry Awards Demonstrate Strong Momentum for In-Memory Data Fabric Company

Expanded Connector Library, Performance Upgrades and New Security Features Empower Organizations to Manage the Most Complex Integration Challenges With Ease

World–s Premier Systems Integrators and Value Added Resellers Join With Delphix to Increase Data Agility

Kenessey Assumes Helm as Company Expands Global Product Offerings and Reach

Computop integrates the Amazon Payments interface "Login and Pay with Amazon", which can be used by more than 300 million Amazon customers in online stores worldwide.
Developers Are Working to Bring Down Cost, But Should Also Focus on Environmental Control Devices and on Retrofitting of Existing Products, Says Lux Research

Milan, Italy, July 12 2016 – Italtel, a multinational corporation specializing in Network Functions Virtualization (NFV), Software Defined Networking (SDN) and All-IP communications, today announced it has joined the Hewlett Packard Enterprise (HPE) OpenNFV Partner Program as an official Application Partner to help Communications Service Providers (CSPs) launch new services faster, easier and more cost-effectively through the virtualization of their network functions.

Research from RiskIQ shows risk associated with brand communications on social media
London, UK, 12 July, 2016 – New research conducted by OnePulse for RiskIQ, the leader in external threat management, has found that 65% of Brits engage with retail brands on social media with 44% saying they click on links provided by brands. The research also found men are more likely to follow a link without knowing where it directs, more than half (51%) admitted to be quick to click as opposed to 2 in 5 wome
PowerPRO Sets New Standards for UPS Energy Savings and TCO

Behavioral Analytics Highlighted as Innovative Approach to Cyber Security