From the Cloud to Virtualization, Software As a Service to Web Services, ideas seem to be everywhere all the time. Somewhere, somehow, someone needs to separate the wheat from the chaff. We’ve asked Matt Heusser to provide his insight and commentary on the prevailing issues for IT staff today.
Security image via FreeImages
What should the next cybersecurity policy look like for the new presidential administration? Check out some of the suggestions in this week’s roundup.
1. Experts debate national cybersecurity policy suggestions at RSAC 2017 – Michael Heller (SearchSecurity)
How can I start to learn BI? This question is quite vague in many aspects. Firstly, it doesn’t tell if the person is from technology field or some other field. Secondly, it doesn’t reflect the age and experience of the person asking this question. Because, it will make a lot of difference if the per…READ MORE
In this guest post, Mollie Luckhurst, global head of Customer Success at cloud-based collaboration firm, Huddle, outlines the seven employee types that could make or break an organisation’s shift off-premise.
Enterprise IT departments are now well aware of the benefits that cloud-based services c…READ MORE
This is a guest post written for the Computer Weekly Open Source Insider blog by Daniel Jones in his capacity as CTO of EngineerBetter — the organisation is a member of the Cloud Foundry Foundation is UK-based and specialises in Cloud Foundry, BOSH and concourse.
NOTE: BOSH is an open source pr…READ MORE
It’s been a little more than six months since I last wrote about “serverless” and a good bit of change has occurred in the market during that time. In a nutshell, serverless has evolved from a niche topic to one that is gaining more technology options and more actual deployments are starting t…READ MORE
Health data breaches triggered by hacking attacks spiked by 320% in 2016 and ransomware became widespread, according to a report by a health IT cybersecurity firm.
Released the week before HIMSS 2017, the report from CynergisTek, Inc. division Redspin, said that 81% of the health data breaches we…READ MORE
Shortly after the news that Jaguar has pulled its on-line advertising because its adverts were appearing alongside ISIS terrorist recruitment videos came the news that Proctor and Gamble is reviewing all its on-line advertising
When I blogged on the risk that the On-line Advertising market wa…READ MORE
One of the things I look forward to each year at this time is the release of the annual State of the Cloud report from cloud services provider RightScale. That may say more about the quality of my social life than anything else; nevertheless, the study always contains great insight into the psyche o…READ MORE
NetApp is entering the hyper-convergence arena with the latecomer’s cry: We may be last into the market, but we’ll be the best.
Emboldened by the recent strong revenue growth of its late-to-market All Flash FAS (AFF) arrays, CEO George Kurian Wednesday night outlined plans to play rapid catch-up …READ MORE
The following is our weekly roundup of SearchCIO and SearchCompliance content.
Want to improve IT agility? Try the OpenStack framework, says Niel Nickolaisen, CTO at O.C. Tanner Co. In this tip, Nickolaisen shares his team’s OpenStack story and how the framework helped them deliver “fluid, portab…READ MORE
Microsoft’s upcoming Windows Insider Program for Businesses will cater to IT professionals.
Through the program, nicknamed WIP4Biz, IT admins will be able to test new Windows 10 features with their existing systems and give feedback to Microsoft prior to go-live dates. There is already a Windows …READ MORE
Every commuter has experienced the untimely misfortune of a delayed or cancelled bus, train or plane. Yet in today’s day and age of connectivity and smart transit, no one should be left asking, “Where’s my bus?”, let alone wondering what the best transit route is.
One company ready to give commut…READ MORE
The average organization today develops 464 custom applications — some running functions critical to the business — and puts a lot of the software in the public cloud. IT security is in the dark about nearly two-thirds of these applications, according to new research released this week from nonpro…READ MORE
I was born on the cusp of the internet revolution. As a kid, my friends and I roamed the streets and were more or less off the grid. Once we left the house, we were untraceable. We had to run to a friends house or a pay phone (remember those?) to get in touch with a parent.
It takes effort to do …READ MORE
The recent launch of Cisco Identity Services Engine (ISE) 2.2 has increased more visibility and also lots of new features are added. Some of the new enhancements one could see with Cisco Identity Services Engine (ISE) 2.2 are:
The enhance visibility offered…READ MORE
News of the Nokia 3310’s imminent relaunch has brought Downtime over all nostalgic. Take our hand, and come with us to the cloudless summer of 2001. It’s safer there. The sun shines brightly, the global economy is probably all going to be fine, and everything is just generally a great big laugh….READ MORE
ChatOps is the use of chat clients, chatbots and real-time communication tools to facilitate how software development and operation tasks are communicated and executed. Continued…
Quote of the Day
“ChatOps tools are becoming systems of record for IT operations in mainstream organizations, part…READ MORE
Microsoft’s Active Directory cmdlets have some issues. One of the ones that catches everyone when they start using them is that Get-ADUser doesn’t display all properties.
A default call to Get-ADUser displays a subset of the available properties of the user object:
DistinguishedName : CN=FO…READ MORE
BlackBerry hasn’t given up on its mobile device business, but nearly everyone else has.
The company’s smartphone market share dropped to zero — 0.0482% to be exact — in the fourth quarter of 2016, according to Gartner. The enterprise mobility pioneer sold 207,900 units in the quarter; that’s do…READ MORE
Go back 10 or 20 years and direct-attached disk was the norm. IE, just disk in a server.
It all became a bit unfashionable as the virtualisation revolution hit datacentres. Having siloed disk in servers was inherently inefficient and server virtualisation demanded shared storage to lessen the I/…READ MORE