4G as a mobile telecommunications technology has been bandied around for over a decade or so and has appeared prematurely in several guises, predominately due to industry rumors, gossip and, alas, hype ...
Read the full post

Synchronization is now an enabler for many high-value services. In the case of new mobile technologies, it’s even a prerequisite for service availability. Quite simply – if you don’t have sync you don’t have service! Synchronization enables business and if ever the flow of dollars is stopped someone will pay. With this kind of value attached, it’s no surprise that there’s so much interest both in the provision of synchronization as a service and in monitoring the service quality ...

Read the full post
Across Europe and beyond, businesses are moving their mission-critical data to the Nordics. With cheaper land prices and cold conditions ideal for cooling servers, the cost advantages offered by data centers in Scandinavia and the Baltics are impossible to ignore. Even more significant is the low price of electricity, which makes running a data center near the North Pole incredibly efficient – in many cases, up to 50% cheaper when compared with central Europe ...
Read the full post

The enterprise is rapidly deploying new classes of compute and storage on the network edge in order to service the plethora of devices that are populating the internet of things (IoT). But while the edge forms a vital link between centralized resources and the multitude of data points all around us, it is by no means the only link in what is emerging as a highly dynamic and intelligent data chain. In between the data center, the cloud facility and the edge is a host of systems and architectures that some experts are starting to call “fog computing” ...


Read the full post
In today’s evermore networked society, data protection is a serious business. Security breaches lead to unwanted headlines and a loss of trust in enterprise organizations (such as banks or healthcare providers). Data security and keeping ahead of potential attackers, is a rapidly evolving field of development. Potential areas may involve safeguarding modern cloud computing environments or protecting commercial activities over the web ...
Read the full post