From the Cloud to Virtualization, Software As a Service to Web Services, ideas seem to be everywhere all the time. Somewhere, somehow, someone needs to separate the wheat from the chaff. We’ve asked Matt Heusser to provide his insight and commentary on the prevailing issues for IT staff today.
WhereScape is a data warehouse automation firm.
But what does that mean?
WhereScape is the company name. Data (in its plural form) and datum (in singular) we will take as read. A data warehouse is a federated repository for all the data that an enterprise’s various business systems collect and…READ MORE
if you are an Azure user see this post from the PowerShell team about the Azure Cloud Shell – https://blogs.msdn.microsoft.com/powershell/2017/05/23/coming-soon-powershell-in-azure-cloud-shell/…READ MORE
The seven wastes are categories of unproductive manufacturing practices. Continued…
Quote of the Day
“Lean methodologies are centered around learning: from your customers, your data and from every line of code you build and put in front of customers.” – Christopher Ward
Open source Continuous Automation firm Chef has used its ChefConf 2017 event to announce new capabilities focused on the transition process to cloud-native and container-first environments with consistent automation and DevOps practices.
As we now discuss automation in the context of its benef…READ MORE
NASA. Remember NASA? It’s the once-glorious government agency that put men on the moon, the agency whose Voyager I space probe left our solar system in 2013 for parts unknown, the agency that, in the immortal words of John F. Kennedy, did things not because they were easy, but because they were hard…READ MORE
From February through April 2017, Black Book Research crowdsource-surveyed 8,845 physician practices about the transition to the Medicare Access and CHIP Reauthorization Act (MACRA) of 2015 which aims to transition healthcare from fee-for-service-reimbursement to value-based reimbursement.
The su…READ MORE
When Sanderson Hotel London invited me to a Code First: Girls introduction to coding event (including free cocktails) I decided to see if code still gave me the cold sweats it did at university
Something not many people know about the current business editor of Computer Weekly is that I can progr…READ MORE
I have been reading the Tech UK responses to the party manifestos. Their caution reflects the concerns of their larger members, particularly of currently dominant ISPs, telcos, suppliers and service providers.
Some of these could seriously lose out if the post-Brexit political programme really do…READ MORE
The lack of a major cyber security event is seen as one of the reasons for the indifference towards cyber security in many organisations. That event took place recently, with the WannaCry ransomware affecting organisations in over 150 countries. While basic cyber hygiene could prevent similar atta…READ MORE
May 16th and 17th 2017 saw Eskenzi PR stage its 11th 2-day IT Security Analyst Forum, as usual, in London. The morning of the second day (which was a Wednesday) was the customary CISO (chief information security officer) roundtable. A coming together of 20 or so IT security leaders from blue chip UK…READ MORE
NEW ORLEANS – Veeam Software opened its user conference with the launch of the latest version of its data protection software, moving deeper into cloud and physical device support.
Veeam Availability Suite v10 rolled out today at VeeamON adds continuous data protection, support for network-atta…READ MORE
To determine policy premiums, auto insurers have traditionally used factors such as driving record, vehicle usage and insurance history. This is in addition to outside variables like customer location (collision/theft rates in the area), age and gender (teen males tend to have higher rates), and non…READ MORE
For the past five months, the Current Branch for Windows 10 (Builds 1604 and 1703) has been subject to a spurious DISM issue. (I blogged about this as far back as December, 2016.) That is, running DISM with the /checkhealth option returns a “healthy” verdict. OTOH, the /scanhealth option indicate…READ MORE
Google last week announced Android security features that continue to heighten the company’s enterprise mobility game.
Enterprise security features from the big mobile operating systems, Google Android and Apple iOS, have been a hot topic for years. Now, with BlackBerry down for the count and cyb…READ MORE
Google’s annual worldwide developer conference (Google I/O) kicked off at the Shoreline Auditorium in Mountain View, California on Wednesday morning. Seven thousand people are attending live, and others are viewing the event online at 400 Google I/O Extended events in 85 countries.
This year’s …READ MORE
U.S. companies eager to implement robotic process automation — software that automates how humans interact with software — are often fixated on seeing a proof of concept, said RPA technology expert David Brain. And that’s not good.
“I feel bad going to clients and proving what’s been proven s…READ MORE
Virus image via FreeImages
What do you think about how Microsoft remediated the EternalBlue vulnerability? Find out why experts believe it was poorly handled in this week’s roundup.
1. Vulnerability remediation of WannaCry flaw raises concerns – Michael Heller (SearchSecurity)
Between patch…READ MORE
This is a guest blogpost by Luca Olivari, president, ArangoDB.
Data is one of today’s biggest assets but organizations need the right tools to manage it. That’s why, during the last decade, we’ve seen new data-management technologies emerging and getting past the initial hype. The so-called…READ MORE
Violin Memory – an all-flash storage pioneer whose trials and tribulations we have followed here – finally hit what just about rock bottom for a tech company in the past months.
That is, Violin was declared bankrupt and in January was auctioned off over a period of three days with the winner …READ MORE
Misspellings, suspicious hyperlinks, abnormal sender address, no attempt at personalisation. The classic signs of a phishing email? Or a botched marketing email from IBM promoting — wait for it — a cyber security webinar?
One week ago, the WannaCry ransomware outbreak made headline news, wit…READ MORE