Tag: pod

UltraServe drives cloud expansion with pods 
By Ry Crozier | May 22, 2012 | Comment Now 
Rethinks underpinning platform.
 
Photos: Inside Softlayer's Singapore pod data centre 
Sep 15, 2011 | Comment Now 
Under construction... plus a look at the completed San Jose pod.
 
WA supercomputer makes the Top500 list 
By Brett Winterford | Nov 19, 2010 | Comment Now 
Murdoch University POD only stage one in $80m cluster plan.
 
IBM pitches portable data centres at resources sector 
By Angus Kidman | Oct 14, 2010 | Comment Now 
Brings its modular pod design to Australia.
 
Inside IBM's Portable Modular Data Centre 
Oct 14, 2010 | Comment Now 
Angus Kidman takes a tour of IBM's take on the container data centre, in Brisbane, Queensland.
 
Inside Verb DC's HP Pod data centre 
Aug 19, 2010 | Comment Now 
Today we take a close look at the Verb DC data centre in Wyong, New South Wales, the first to deploy HP's POD infrastructure in the Asia Pacific.
 
Central Coast to host HP pod data centre 
By Brett Winterford | Jul 29, 2010 | Comment Now 
Verb IT builds 20-foot pod in Wyong.
 
Melbourne to host container data centre park 
By Brett Winterford | Jun 1, 2010 | Comment Now 
GreenEdge Data to fill 2000 square metre facility with container data centres.
 
UNSW data centre makes way for student beds 
By Ry Crozier | May 25, 2010 | Comment Now 
New facility to come online in July.
 
Brisbane data centre adds a 32-rack pod 
By Brett Winterford | Apr 20, 2010 | Comment Now 
Another hot aisle containment win.
 
Pod data centre wins over Centrelink 
By Brett Winterford | Mar 25, 2010 | Comment Now 
Canberra Data Centres calls for an "end to the raised floor data centre".
 
Interview: Centrelink CIO John Wadeson 
By Brett Winterford | Sep 8, 2009 | Comment Now 
Wadeson on Gershon cuts, data centres and innovation.
 
Centrelink squeezes beastly servers into pod data centre 
By Brett Winterford | Sep 7, 2009 | Comment Now 
Custom-fits a pod for six Sun M9000 servers.
 
Pod slurping threat to company data 
By RenĂ© Millman | Jun 24, 2005 | Comment Now 
A security researcher has warned how easy it is to copy vast amounts of confidential files using an iPod, a small copying program and some social engineering.
1
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1032

Vote