A blog for users, storage solution providers -- including value-added resellers (VARs), systems integrators, managed service providers (MSPs) and consultants -- about data storage hardware and software products and services, backup/archiving products and services, disaster recovery, storage area networks (SANs) and network-attached storage (NAS).
A Cohesity executive wants to make something clear about the company’s self-described product line.
“Hyper-converged secondary storage is not a trend,” chief marketing officer Lynn Lucas said. “It’s a category.”
The numbers in the most recent Cohesity revenue report shine a light on that state…READ MORE
We have spoken about machine learning and the internet of things as tools to optimize location analytics in logistics and supply chain management. It’s an accepted fact that technology, especially cloud-based, can benefit companies by optimizing routes and predicting the accurate estimated time of a…READ MORE
I am in a partnership with my project managers to define their measures of success. Each of the project managers has to have certain goals in life. These goals should be clear and measurable goals. Unless those are clear, you can’t ascertain how to measure them. And unless you measure them, you can’…READ MORE
Visual analytics company Tableau Software has launched a new data engine technology called Hyper. The software is included in the Tableau 10.5 version release.
Hyper is designed to ‘slice and dice’ massive volumes of data in a short period of time.
The concept is: 5X faster query speed and up …READ MORE
Slicing up user stories into something useful has been trouble at every company I have worked with. Usually what happens is the development gets stories in various states. One story is clear cut and takes a day. The description of another story seems clear cut, but ends up taking a week or more. Pro…READ MORE
An alert TenForums member reports seeing some “new” attributes show up in the help file for the attrib command. Next, numerous community members jump in to provide explanations and information. Bam, I learn about new OneDrive file attributes uncovered. Happily, I also get a glimpse into ReFS, too. …READ MORE
If you were at the PASS Summit, Live360 in November, or SQL Saturday in Slovenia in December, you may have noticed that I couldn’t make it to these events. It turns out that I had a medical issue that I needed to deal with as soon as possible.
Over the six months or so before t…READ MORE
Database image via FreeImages
Speculation has grown around whether or not Salesforce plans to move off of Oracle databases. Check out the details behind the possible move in this week’s roundup.
1. Salesforce databases remain Oracle, for now – Jesse Scardina (SearchSalesforce)
Oracle and Sa…READ MORE
Articles have recently appeared in the Daily Telegraph and on the BBC website making the claim that age checking, as required under the Digital Economy Act, will drive adolescents towards the dark web. They quote an impact assessment dated March 2017 and based on a draft produced in the previous y…READ MORE
Microsoft’s acquisition of Avere for an undisclosed sum, announced at the beginning of the year, marks the swallowing of an always-interesting storage player and a significant move for Microsoft and its cloud strategy.
The move is a clear play to boost Microsoft’s hybrid cloud capabilities, a…READ MORE
The recently concluded Citrix Summit 2018 underscored two important trends: a continued concentration on the vendor’s core technology stack and an emphasis on cloud-based business.
The refocusing has actually been going on for a while. In 2015, the company began discontinuing products deemed no l…READ MORE
Cybersecurity is no longer just an IT problem; it’s a cross-functional priority for the enterprise. As cyberattacks and cyber risk continue to swell, the cybersecurity consciousness among the C-suite is growing — and even CFOs are being called upon to help promote cybersecurity.
According to Sum…READ MORE
Contrast Cars and Roads from 100 Years Ago with Today’s – Now compare poles and wires; what is our excuse for not progressing the grid in the face of EMP and terror threats?
Once upon a time, this country had no interstate highway system – that is, the interconnected freeways …READ MORE
Concern about government-mandated backdoors in technology products may be at an all-time high, but the recent discovery of an “HP backdoor” in Lenovo networking gear should prove equally alarming for the IT industry.
The computer maker last week issued a security advisory, LEN-16095, for an authe…READ MORE
Using Machine Learning to Bolster Unified Endpoint Management
Machine learning is critical to your future. According to IDC, 40% of all digital transformation initiatives will be supported by cognitive/AI models by 2019. However, if you’re looking to modernise your approach to endpoint manageme…READ MORE
Richard Branson has overturned his Virgin Trains stooges’ decision to stop selling the Daily Mail, instantly pouring cold water over accusations that the billionaire who sued the NHS might be too “moralistic”.
But mounting the moral high horse based on employee discomfort with Paul Dacre’s …READ MORE
The demise of construction and services giant Carillion has brought fresh scrutiny of outsourcing in government. Frankly, you could find some event almost every year that brings fresh scrutiny of outsourcing in government – from the IT disasters documented by Computer Weekly over the years, to fai…READ MORE
Is the future of secure cryptocurrency storage and payment simply “cash in hand”? Inspect a Gadget looks at how one firm’s human microchip implant could help.
We’ve all looked on with interest as the Bitcoin rollercoaster has soared, dived and soared again over recent weeks. Quite the ride for …READ MORE
Software and silicon design company Synopsys has just published an interesting report that classifies chief information security officers (CISOs) into four archetypes or what it calls “tribes”.
Through in-person interviews with 25 CISOs from some of the world’s largest firms, such as Facebo…READ MORE
Transport Layer Security (TLS) is a protocol that provides privacy and data integrity between two communicating applications. Continued…
Quote of the Day
“TLS and SSL have defined secure communications on the internet for decades. They enable everything from secure browsing to e-commerce t…READ MORE