Featured Blog

Uncharted Waters by Justin Rohrman

member Blog

From the Cloud to Virtualization, Software As a Service to Web Services, ideas seem to be everywhere all the time. Somewhere, somehow, someone needs to separate the wheat from the chaff. We’ve asked Matt Heusser to provide his insight and commentary on the prevailing issues for IT staff today.


Vetting New Employees

August 29, 2016 - I was eaves dropping on a conversation about vetting technical skill during an interview in a local Slack channel last week. One person suggested live programming or logic exercises on a white board. Others responded that this is inhumane and rigged against people that need a quiet space without people hovering over their shoulders to...... READ MORE


  • Good Software Tester Is Not Easy To Become

    member Blog

    The person in this question is Bachelor of Engineering in EEE (Electrical and Electronics Engineering). Also, she has very poor knowledge about programming. But she wants to become a good software tester. Therefore, she wants to know the important skills to develop for this purpose. My reply goes li…READ MORE

    Jaideep Khanduja11,345 pointsBadges:
  • NordVPN on test, EastEnders in Las Vegas

    editorial Blog

    In a world where we need software to ‘just work’ and developers know that the average user attention span is just one or two seconds, it’s always pleasing to find a product with the Ronseal factor. NordVPN does exactly what it says on the virtual tin and just works.

    For those ‘road warrio…READ MORE

    Adrian Bridgwater9,155 pointsBadges:
  • Rackspace cloud gets acquired, set to go private

    editorial Blog

    An equity firm will acquire Rackspace so the cloud vendor can go private and transition away from competing with the likes of Amazon Web Services and partner with them instead. The $32 per share cash deal is valued at $4.3 billion.

    Rackspace is one of the earliest cloud providers that tried to co…READ MORE

    Sonia Lelii3,545 pointsBadges:
  • Optimising WMI calls–part 1

    member Blog

    Recently saw some code where user was running this

    $bootupMemory = gwmi -Query “SELECT * FROM Win32_OperatingSystem” -ComputerName $srv
    $cpuLoad = gwmi -Query “SELECT * FROM Win32_Processor” -ComputerName $srv

    $tSessions = gwmi -Query “SELECT * FROM Win32_TerminalService” -ComputerName $srv

    Richard Siddaway6,610 pointsBadges:
  • PASS Speaker Idol Sign Ups Are Closing Soon

    member Blog

    If you were planning on signing up for the PASS Summit Speaker Idol you have a little over two days left in order to get signed up. Signups close at 11:59pm on August 31st, 2016 as pure the official rules.

    So go get signed up, or sign up your favorite speaker that you’ve seen at a SQL Saturday o…READ MORE

    Denny Cherry67,510 pointsBadges:
  • Six IoT design mistakes you need to avoid

    editorial Blog

    As IoT solutions continue to expand their audience, the work they’ll be tasked with will be increasingly complex. For example, smart cities will feature IoT connected surveillance, automated transportation, smarter energy management systems and environmental monitoring. In healthcare, IoT monitoring…READ MORE

    Gianfranco Bonanome0 pointsBadges:
  • Cisco ASA FirePOWER Services Licensing

    member Blog


    In order to have the full Next Generation Features enabled on the Cisco ASA FirePOWER Module one should ensure that they have appropriate licenses. Currently Cisco is offering follow licenses for Cisco ASA FirePOWER Services

    License Types


    License Type

    Service Subscri…READ MORE

    Yasir Irfan6,880 pointsBadges:
  • Vetting New Employees

    member Blog

    I was eaves dropping on a conversation about vetting technical skill during an interview in a local Slack channel last week. One person suggested live programming or logic exercises on a white board. Others responded that this is inhumane and rigged against people that need a quiet space without peo…READ MORE

    Justin Rohrman1,345 pointsBadges:
  • What does the WhatsApp privacy policy update signify?

    editorial Blog

    Last week, the news of WhatsApp updating its privacy policy hit the stands. In Searchlight, executive editor Linda Tucci spoke with industry experts to find out how businesses can use mobile messaging platforms to communicate with customers to drive the customer-brand relationship and why the growin…READ MORE

    Mekhala Roy150 pointsBadges:
  • US DoD Win10 Rollout Deadlines Slip

    editorial Blog

    Last February, DoD Deputy Secretary Bob Work issued a directive for Windows 10 migration in 12 months. Essentially, unless a waiver is granted, all DoD Windows clients should run Windows 10 by February 2017. Alas, it now looks like a US DoD Win10 rollout deadlines slip is inevitable. I reported here…READ MORE

    Ed Tittel7,560 pointsBadges:
  • TechTarget's weekly roundup (8/22 - 8/29)

    editorial Blog

    Wish image via FreeImages
    What’s on your wish list for VMworld 2016? Check out what several experts want in this week’s roundup.

    1. IT’s VMworld 2016 wish list: Bring VDI costs down – Ramin Edmond (SearchVirtualDesktop)

    IT experts share their wish lists for VMworld 2016. For SMBs, it’s high…READ MORE

    Michael Tidmarsh47,950 pointsBadges:
  • VA partners with NCI, DoD for precision medicine program

    editorial Blog

    The Department of Veteran Affairs (VA) is partnering with the National Cancer Institute (NCI) and the Department of Defense (DoD) to form the nation’s first screening program intended to provide targeted and individualized therapies for cancer patients.

    The tri-agency precision medicine partnersh…READ MORE

    Tayla Holman410 pointsBadges:
  • Softchoice: Windows 10 adoption elusive among customers

    editorial Blog

    With Windows 10 having celebrated in July its first year on the market, service provider Softchoice has found a scant presence of the OS within its client base.

    Softchoice’s recent study of its clients’ IT environments, which looked at more than 400,000 Windows-based devices at 169 North American…READ MORE

    Spencer Smith1,505 pointsBadges:
  • Service Management conferences offer more

    editorial Blog

    The week of August 17th saw some of the world’s foremost experts in Service Management travel to Brisbane, Australia for their 19th annual national conference. The conference is hosted by itSMFA, the Australian chapter of the IT Service Management Forum (itSMF) head-quartered in the UK. itSMF cha…READ MORE

    Carlos Casanova25 pointsBadges:
  • Apollo Software Renews Interest in Rope Memory

    member Blog

    The recent publication of the original Apollo 11 lunar module code in GitHub is bringing new interest to a really arcane form of storage: Rope memory.

    Let’s get the Moore’s Law, kids-these-days aspect of this over with right away: The Apollo Guidance Computer (AGC) had just “36,864 sixteen-…READ MORE

    Sharon Fisher8,265 pointsBadges:
  • Security experts fear voting machine hacks during general election

    editorial Blog

    After a Democratic National Committee email leak, security experts are warning against a possible voting machine hack come November. Also in GRC news, the New York branch of one of Taiwan’s largest banks has been fined $180 million after violating compliance regulations, and a data leak by hacker gr…READ MORE

    Christian Stafford25 pointsBadges:
  • Governance isn't enough when it comes to designing secure software

    editorial Blog

    In a world where IT capabilities, tools, and infrastructure are evolving at an unprecedented pace, it’s easy to get swept up in the forward momentum. But enterprises are beginning to realize that while free open source code and low-cost cloud infrastructure are certainly valuable, unbridled and un…READ MORE

    jasontee30 pointsBadges:
  • It’s time for all-flash says IBM, but IT chiefs won’t necessarily agree

    editorial Blog

    “We’re going all-flash!” That was the message this week from IBM product marketing VP Eric Herzog. Though that’s not quite the truth, Herzog’s proclamations were pretty clear.

    He said: “Regardless of workload for primary storage, all-flash is the answer. That even includes big data wo…READ MORE

    Antony Adshead2,180 pointsBadges:
  • Hackonomica

    editorial Blog

    The BBC has reported that the University of Bournemouth was attacked 21 times by ransomware.
    the observant report notes, that this occurred in spite of the university having its own cybersecurity course.
    As every Comp Sci student knows, the first thing you do when you log onto the college network …READ MORE

    Cliff Saran6,910 pointsBadges:
  • Whose bloatware is killing your on-line sales?

    editorial Blog

    Internet marketeers appear to have only just discovered that  half their audience “won’t even wait three seconds” for a website to load. I was, however, more interested to learn that average response times are now 4.5 seconds and growing.  Back in 1971, I was taught than an average response time o…READ MORE

    Philip Virgo3,425 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: