January 23, 2014 Lenovo's Spring Festival Annual Meeting, Lenovo president Yang Yuanqing announced an exciting news that Lenovo 2.3 billion acquisition of the IBM x86 server business, of which about 90% of the amount paid by cash, and The remaining 10% will be paid in stock. The products involved in this transaction include x86 architecture system networking products such as BladeCenter, Cluster, IBM Flex System, System z, IBM PureFlex, System x, etc., while intangible assets are more ...
The "3Par takeover Incident", which began in August this year, has been abuzz with the first head-on showdown between HP and two large companies in the takeover case. After two weeks of intense competition, Hewlett-Packard finally bought 3Par companies at a high price of 2.35 billion dollars. HP and Dale 3Par to become the focus of the industry why do two of companies value a storage enterprise that is not big? The reason is that the cloud storage era is coming soon, facing the IT industry almost crazy competition, who do not want to "lose at the starting line." Two companies are willing to pay a large price to collect ...
[Guide] including the transfer of personal computer business, IBM has been abandoning low-margin business, the transfer of x86 servers in line with IBM's long-term transformation strategy. Tencent Science and technology in the first half of January 20, Lenovo Group has negotiated with IBM, plans to acquire the other side of the x86 server (low-end server) business, but because of the price talks failed. U.S. authoritative media January 19 quoted the source as saying, IBM has again considered the transfer of low-end server business, Lenovo will be another bid is unknown. Dell is a low-end server for IBM, one source said.
Absrtact: The impact of the PRISM program of electronic monitoring in the United States on the information industry is gradually being fermented. Recently, the State Council said it would review the technology companies operating in China, and recently the government has been giving responses in various ways, mainly because the impact of the "Prism program" of the information industry on electronic surveillance in the United States is gradually fermenting. Recently, the State Council said it would review the technology companies operating in China, and recently the government has given a response in various aspects, mainly the domestic substitution of the information industry. Recently, it has been reported that Chinese officials are studying and ...
Spring new atmosphere, stepping into 2012, the server industry and the extension of the data center is a frequent event. From Intel Xeon E5 turned out, set off a wave of new server hot to AMD fierce direct tracking release of fresh CPUs, from Lenovo restructuring business to Dell Business transformation, from Oracle Acquisition Cloud computing company RightNow to IBM buy green hat; from EMC, VMware Build company Canopy to Amazon and eucalyptus integrate public and private clouds, and so on. I thought it was a good omen for the eventful spring. First, new products: ...
HP's server products have long supported Linux while HP is starting to use Linux on its desktop computers. Their server products currently employ a large number of Linux systems, including Rhel (Red Hat Enterprise Linux), Novell's SLEs (SUSE Linux Enterprise server), Oracle Enterprise Linux and Http://www.aliyun.com/zixun/agg ...
In the cloud layout, Microsoft keeps adding. In the cloud era of innovative companies such as Google, Apple and Amazon, veteran IT companies such as Microsoft, Hewlett-Packard and IBM have been unwilling to be a player, changing the rules of the game! Azure is one of the big bets. October 27, 2008, Microsoft's Chief Software architect Ray Ozzie launched a cloud computing platform at the Microsoft Professional Developer Conference (PDC) ...
All of these have the potential to jailbreak or get root permissions by a Third-party application that is prohibited by the installation of a security breach. An infected BYOD connection to the corporate network is another security issue. Walking wireless eavesdroppers can steal corporate data by uploading data from BYOD to personal devices. This article will learn how to protect your enterprise assets with a security policy for a cloud-based BYOD environment. To ensure security in a cloud-based BYOD environment, you need a complete and unambiguous security policy. This article describes the potential for the escape ...
IBM recently unveiled a new initiative based on the existing cloud services in the Tivoli Software portfolio, aimed at boosting cloud service performance again, helping companies cope with cloud challenges and providing technical support for the "smart city" landing. IBM's move to focus attention on cloud computing to the enterprise-level market again. Earlier, an HP survey of people in the IT industry showed that 92% of it executives predicted that cloud computing would become an enterprise-class it base within 5 years, with about 2/3 per cent of those surveyed saying the company planned to use the cloud platform within 3 years. It's also ...
Some time ago, I wrote a blog about the topic, but I finished, I think I still did not talk about nature, this article is a sequel. Internet Applications (Web sites or apps), and the essential difference between enterprise applications, should be discussed from the user. The internet is a strange user, the website for them is self-service system (similar to ATM machine), do not need, and can not be mandatory training for them, such as user registration. So they have to be absolutely retarded and try to reduce the cost of learning. Enterprise application is the company's employees, with mandatory, and before, or system before the line, a ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.