What Does Brexit Mean for IT Infrastructure Companies?

A summary of how the Brexit decision may affect IT infrastructure companies; including data centers, cloud computing companies, and tech companies.

Read more

The European Data Center Market is Heating Up

Consolidation in the European data center market is heating up as experts predict an increase in demand for colocation space.

Read more

The Advisor, IT Industry News – Q2 2016

IT industry news, cloud and containers, Safe Harbor changes, data breach prevention tips, and cloud cost optimization use cases.

Read more

Network and Hardware Vendors, M&A Activity 2015

a summary of mergers and acquisitions from 2015 within network and hardware vendor companies.

Read more

Security Service Providers, M&A Activity 2015

A recap of mergers and acquisitions from 2015 in the managed security market segment

Read more

Unified Communications Service Providers, M&A Activity 2015

Recap of mergers and acquisitions in 2015 for Unified Communications Service Providers

Read more

Cloud Service Providers, M&A activity 2015

Cloud Service Provider, Mergers and acquisitions in 2015

Read more

Network Service Providers, International – M&A Activity in 2015

A summary of mergers and acquisitions with International Network Service Providers from 2015

Read more

Network Service Providers, US – M&A Activity in 2015

List of Internet Network Service Providers (ISPs) in the United States that have merged, acquired, or been acquired in 2015.

Read more

Top 7 Cloud Influencers You Need to Know About

Cloudyn recently published a blog on the top 7 cloud influencers that you need to know about. Read more to learn about the top 7 cloud influencers

Read more

The US-EU Safe Harbor Framework Collapsed

The decision made by the European Court of Justice to invalidate the Safe Harbour Agreement created shock waves for US companies.

Read more

Tips for Developing a Cybersecurity Strategy

Tips for completing a risk assessment, mitigating risk, and making informed choices when deciding on a cybersecurity strategy for your organization.

Read more
Skip to content