Featured Blog

Yottabytes: Storage and Disaster Recovery by Sharon Fisher

member Blog

A blog for users, storage solution providers -- including value-added resellers (VARs), systems integrators, managed service providers (MSPs) and consultants -- about data storage hardware and software products and services, backup/archiving products and services, disaster recovery, storage area networks (SANs) and network-attached storage (NAS).


Lawyers Dealing With Bitcoin E-Discovery

February 15, 2018 - We talked a couple of months ago about the best places to store bitcoin and other cryptocurrencies and their advantages and disadvantages. It turns out there’s another nuance: Cryptocurrencies and e-discovery. It makes sense. The whole point of cryptocurrency – at least, one of them – is to have anonymous currency that can’t be traced...... READ MORE


  • Digital Disruption Has Become An Opportunity In A Big Way

    member Blog

    Digital disruption has been able to bring a lot of opportunities for new business spectrum. Internet was probably the biggest disruption in bringing the whole world connecting with each other so easily with each other. In fact, different time zones and geographic distances are no longer an issue.Tra…READ MORE

    Jaideep Khanduja17,315 pointsBadges:
  • IoT in 2017: Retrospective lessons from the field

    editorial Blog

    I was recently asked what my biggest takeaway was from this previous year, as well as what I thought might happen in 2018. In a nutshell, it comes down to this: With all the hype around IoT, I believe technology firms invested ahead of actual demand. This resulted in a number of products and solutio…READ MORE

    James Kirkland75 pointsBadges:
  • VMs in Azure region can't talk to MySQL database service in same region

    member Blog

    I ran into an interesting issue last week. I had VMs in the US West region of Azure which was unable to talk to the MySQL database service (PaaS) also in US West. The problem is turned out was due to a new feature that needed some adjusting to make work (there’s already a bug open to get this fixed)…READ MORE

    Denny Cherry68,335 pointsBadges:
  • Canonical got Juju eyeballs for storage

    editorial Blog

    Canonical’s is mixing new potions in its Juju charm store.

    Juju is Canonical’s open source modelling tool for cloud software — it handles operations designed to deploy, configure, manage, maintain and scale applications via the command line interface, or through its optional GUI.

    The Juju c…READ MORE

    Adrian Bridgwater13,390 pointsBadges:
  • TechTarget's weekly roundup (2/12 - 2/19)

    editorial Blog

    Security image via FreeImages
    What do you think about these new reports regarding the Equifax breach? Are you worried about your data? Check out the new details surrounding the breach in this week’s roundup.

    1. Equifax breach worsens, additional consumer data exposed – Madelyn Bacon (SearchSec…READ MORE

    Michael Tidmarsh60,945 pointsBadges:
  • SheHacks hackathon at BU promotes female tech advancement

    editorial Blog

    For 36 hours during the last weekend in January, more than 1,000 attended one of the largest women’s hackathons ever at SheHacks Boston.

    SheHacks Boston organizer Natalie Pienkowska said that the event was a way to counter the “ridiculous” amount of inequality that remains in the modern workplace…READ MORE

    Tom Gambardella15 pointsBadges:
  • Intel P4510 U.2 SSD ships with 64-layer TLC 3D NAND

    editorial Blog

    Intel launched a new P4510 Series of U.2 solid-state drives (SSDs) equipped with its 64-layer triple-level cell (TLC) 3D NAND flash and enhanced firmware, enabling greater storage density and lower random read latency than the prior P4500 model.

    The enterprise Intel P4510 Series is the first data…READ MORE

    Carol Sliwa3,720 pointsBadges:
  • Do Try Microsoft Teams

    editorial Blog

    If you’re an Office 365 subscriber with a company email address enrolled, you owe it to yourself (and your company or organization) to give Microsoft Teams a try. It’s the new “teamwork hub” for the Office 365 environment. It’s likely to replace Skype for Business in the next year or two, too. To th…READ MORE

    Ed Tittel10,545 pointsBadges:
  • Brexit fears and frustrations are mounting for UK tech sector leaders

    editorial Blog

    You wouldn’t exactly classify the leaders of the UK tech sector as a bunch of liberal lefties. For all the stereotypes of bearded Shoreditch sandal-wearers that surround much of the nascent startup scene, if you polled the average UK tech conference for delegates’ political views, you would find…READ MORE

    Bryan Glick5,715 pointsBadges:
  • How worried about Brexit are fintech companies?

    editorial Blog

    An international fintech delegation to UK: now you see them, now you don’t. Just like that.

    I was all geared up to meet 50 fintech companies from across Europe and Israel as part a delegation invited by the Department for International Trade (DIT) and the City of London. I would have got to int…READ MORE

    KarlFl4029,120 pointsBadges:
  • Why doesn’t YouTube ban Logan Paul?

    editorial Blog

    YouTube CEO Susan Wojcicki, speaking at Recode’s Code Media conference in California, has insisted its macabre problem child Logan Paul hasn’t done enough to be kicked off the platform.
    The company’s image has been run ragged by the maniacal vlogger since January’s media storm surrounding h…READ MORE

    Ryan Priest215 pointsBadges:
  • Lawyers Dealing With Bitcoin E-Discovery

    member Blog

    We talked a couple of months ago about the best places to store bitcoin and other cryptocurrencies and their advantages and disadvantages. It turns out there’s another nuance: Cryptocurrencies and e-discovery.

    It makes sense. The whole point of cryptocurrency – at least, one of them – is to…READ MORE

    Sharon Fisher9,165 pointsBadges:
  • rugged DevOps


    Rugged DevOps is an approach to software development that places a priority on making sure code is secure before it gets to production. Continued…

    Quote of the Day
    “It’s possible to develop code that’s even more secure than before the move to DevOps if you approach DevOps and security properly…READ MORE

    Kaitlin Herbert1,470 pointsBadges:
  • PowerShell for loop

    member Blog

    PowerShell has a number of looping mechanisms – do-while; do-until; foreach; while and for loops. In this post I’ll show you how to use the PowerShell for loop.

    A for loop iterates a predefined number 0f times. A basic for loop looks like this:
    for ($i=0; $i -lt 10; $i++) {


    Richard Siddaway8,055 pointsBadges:
  • Machine Learning, what is it and why should I care?

    editorial Blog

    This is a guest blogpost by Luiz Aguiar, data scientist at GoCompare.

    We produce a massive amount of data every day.

    Not only that, our attitudes towards the data we produce are also changing. We’re becoming more comfortable sharing the data we produce with apps, businesses, and other entit…READ MORE

    Brian McKenna3,670 pointsBadges:
  • The Field of (Cloud) Dreams: if you build it, will they come?

    editorial Blog

    In this guest post, Allan Brearley, cloud practice lead at IT services consultancy ECS and Tesco Bank’s former head of transformation, draws inspiration from a 1989 Kevin Costner movie to advise enterprises on how best to approach their move to the cloud…

    Using cloud offers enterprises opport…READ MORE

    Caroline Donnelly4,995 pointsBadges:
  • In praise of recommendation engines, AI with proven ROI

    editorial Blog

    CIOs are developing “a sort of tunnel vision about AI,” Isaac Sacolick, a former CIO who now advises CIOs on big initiatives like digital transformation, told me recently.

    “The CIOs I talk to are starting to believe that everything exciting that’s happening in AI is happening in deep learning,” s…READ MORE

    Linda Tucci7,665 pointsBadges:
  • Baited breadth - the rise of phishing

    editorial Blog

    Reviews of organisational security can be viewed in many positive ways, but all too often with trepidation or resignation. The rise of phishing, where spoof, but increasingly credible, messages try to obtain sensitive information, is a particularly troublesome challenge. It exploits one of the weake…READ MORE

    Rob Bamforth480 pointsBadges:
  • Measuring What Matters in IT Sales


    Welcome to the TechTarget Research Blog. TechTarget, since its very inception, has recognized that enterprise technology buyers need definitive guidance and insight when researching purchases and we have delivered on that promise for over 20 years. Now, we offer information and insight to technology…READ MORE

    Jonathan Brown250 pointsBadges:
  • Extending the shelf-life of enterprise mobile devices

    editorial Blog

    With more businesses expecting enterprise-grade mobile devices to last longer than the average consumer smartphone replacement cycle, keeping those devices secure is a growing challenge.

    According to a survey by Zebra Technologies, 51% of businesses want their mobile computers to last more than f…READ MORE

    Aaron Tan1,250 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: