A blog for users, storage solution providers -- including value-added resellers (VARs), systems integrators, managed service providers (MSPs) and consultants -- about data storage hardware and software products and services, backup/archiving products and services, disaster recovery, storage area networks (SANs) and network-attached storage (NAS).
When a static code analysis tools identify a bug in the production code, there are two approaches organizations can take. The sensible one is to put a software developer or two on the problem and implement an immediate bug fix. The other option is to assemble the software team, debate the relative r…READ MORE
The internet of things offers such exciting possibilities that it’s difficult for organizations to resist the urge to chase the latest shiny object without thinking through the business case.
Return on investment is what decides if (or when) an IoT deployment moves beyond concept to prototype to …READ MORE
Virgin Group founder Richard Branson stepped away from his hurricane relief efforts last week to warn against climate change inaction at Veritas Vision 2017 in Las Vegas.
Branson said the recent trail of hurricanes shows global warming’s destructive powers are a present threat.
“I hope mos…READ MORE
Okay, now it’s time to get baked. Baked tapes, that is. What did you think we were talking about?
The concept of baking tapes has been known for some time – there’s even a 1993 patent on it – but the subject came up again recently in the context of a series of British text-based adventure…READ MORE
PASS Summit is just a month away. That means there’s only just under a month left to get signed up for Denny’s Azure precon. You might be wondering why you want to take a full day session on Azure infrastructure. And that’s an excellent question. The answer is quite simple. Azure is a massive pl…READ MORE
This is a guest post for the Computer Weekly Developer Network written by Chris Gray in his capacity as technical director at Amido.
Amido is a technical consultancy specialising in customer identity, search and cloud services.
Gray writes as follows…
Companies are attracted to cloud native a…READ MORE
URL shortening is the translation of a long Uniform Resource Locator (URL) into an abbreviated alternative that redirects to the longer URL. Continued…
Quote of the Day
“The current issues around URL-shortening security represent a more significant flaw in the design of these URL-shortening se…READ MORE
I still see a lot of people using the WMI cmdlets – Get-WmiObject etc. You really should be using CIM nit WMI. In other words use Get-CimInstance rather than get-WmiObject etc etc.
Why do I say that?
Two main reasons.
Firstly, the WMI cmdlets are effectively deprecated. Any further develo…READ MORE
Three industry experts in their respective fields join hands to adopt open edge computing IoT. The aim is to adopt innovative practices. Huawei joins hands with Infosys and Wapwag at Huawei Connect 2017 for this mission. Infosys is a leading provider of Information Technology and business consulting…READ MORE
HP continues to shine a spotlight on print security with the recent announcement of embedded print security features that aim to mitigate the threat of malware. So how vulnerable are printers to external attacks, and how can businesses limit their risks?
While the prevalence of connected printers…READ MORE
Ed Bott at ZDnet dispenses some excellent advice in today’s Bott Report. In an article entitled “Windows 10 tip: Temporarily delay the Fall Creators Update,” he recasts conventional wisdom for business users. In this age of twice-a-year upgrades, practicing due diligence translates to “Businesses sh…READ MORE
Despite all the promise that the cloud will usher in the next wave of technical innovations, a very traditional distribution model has taken a central role for cloud providers.
With IBM Cloud Mass Data Migration, Big Blue is the latest large-scale vendor to lean on shipping companies to help get …READ MORE
In the process of kicking off a new season of awards judge duty, starting with Techtrailblazers, which focuses on start-ups (and upstarts).
Got me thinking – just what IS a start-up company? Ok – so there are definitions within even Techtrailblazers itself as competitions are based upon rules…READ MORE
Security image via FreeImages
For close to one month, CCleaner malware was spread to users via an infected software update. Check out the total impact of the malware in this week’s roundup.
1. CCleaner malware spread via supply chain attack – Michael Heller (SearchSecurity)
CCleaner malware…READ MORE
Usually I use this blog to write about new technologies or technology trends. But as I’ve been out on the road lately, I’ve had quite a few people ask me about how to get started in podcasting. There are lots of podcasts out there these days, covering nearly every topic. I co-host a couple weekly po…READ MORE
Walking up to DerbyCon 7.0 cybersecurity conference it immediately has a very different feel from the “major” infosec conferences. Attendees would never be caught loitering outside of the Black Hat or DEFCON venues, because no one willingly spends more time than necessary outdoors in Las Vegas. RSAC…READ MORE
This is a guest post for the Computer Weekly Open Source Insider column written by Shawn Powers — describing himself as Linux Journal editor, CBT Nuggets trainer, writer and geek all wrapped into one, Powers has been teaching IT for more than a decade and his specialties are Linux, Chef and inte…READ MORE
This is a guest blogpost by Matt Jones, lead analytics strategist, Tessella
Recent converts to AI and machine learning’s amazing potential may be disappointed to discover that many of its more interesting aspects have been around for a couple of decades.
AI works by learning to distinguish b…READ MORE
Although 3D printing technology has been around since the 1980s, advances in software and hardware are changing the way 3D printing is being used. Especially 3D printing in healthcare, a Wall Street Journal article said.
Gartner, a research firm, predicts that by 2019, 10% of people in the develo…READ MORE
Apple proudly claims it’s set the path of technology for the next decade with its iPhone X, but it would’ve been nice if it just did that with the one it announced half hour earlier.
Instead, the feeling of having an out-of-date handset comes as an instantaneous freebie with the purchase of the…READ MORE