Commentary for value-added resellers (VARs) and systems integrators on partner programs, storage, security, networking and systems.
It’s a new year and with that comes New Year’s Resolutions. Whether or not you have made any resolutions to be more secure in 2015, it won’t hurt to make or re-affirm one now. One of the best steps you can take is to implement two-factor authentication (2FA) everywhere you can. To help you out with …READ MORE
Think your backup job is tough? How about backing up the entire Internet?
That’s the role fulfilled by the Internet Archive, which is suddenly getting a lot of attention these days, with major articles in publications such as the New Yorker and Medium.
You may wonder, what’s the point of a…READ MORE
Here comes the Super Bowl! And there it goes! Suddenly, there is no compelling reason to buy an even bigger HDTV than you already have, especially if you’re an American male. And low-cost laptop prices seem to be rising slowly after their annual post-Christmas slump. But they *are* rising, and once …READ MORE
A project passes through various stages – project initiation, development, execution, deployment, sign off and closure. All this takes a lot of strategy, energy and power to drive it in right direction. At times projects do get speed but lead to wrong results if not driven in right direction. And at…READ MORE
I needed to modify some text somewhere in a file. The file looks like this
## start file
This is some text.
I want to change something.
But not this.
## end file
I was playing around with various options. The simplest I found was this:
£> $txt = Get-Content .\test.txt
Disaster recovery (DR) is expensive — and not just because traditional disaster recovery services come at a very high price. Other factors contribute to the financial toll of DR: underfunded DR budgets, poor DR planning and testing procedures, and technological deficiencies, all of which contribute…READ MORE
For years, CommVault boasted about how it sold one application that handled all data protection and management needs. That is changing, as its tries to perk up tepid financial growth in a more competitive market.
CommVault CEO Bob Hammer said the one-stop shopping approach still helps with large …READ MORE
Any organization NOT doing an application modernization project this year is in the minority. Over 70% of businesses worldwide are modernizing their application environments to handle mobile, cloud and other emerging digital platforms in 2015, according to a recent survey.
Not only are most busin…READ MORE
This week I’ve found some great things for you to read. These are a few of my favorites that I’ve found this week.
Relational Data Lake
Six Benefits to Planning for SQL Server 2005 and Windows Server 2003 End of Support Now
Put Your New Leadership Knowledge Into Practice
The Robot …READ MORE
Companion resource: The Techtarget version of our free IT Managers step by step Global MPLS Network procurement Mindmap. Every risk, pitfall and opportunity outlined at a glance.
In this article, I share my thoughts on successful WAN sales process surround creating a diagnostic environment.
It’s review time in my part of the work world. Once again, it’s time to sit down, examine the year that has past, and objectively determines what it is I have done over the course of the year. Along with this is the question of how this can be reported upwards to managers and HR.
This can b…READ MORE
We are going digital and we will change the way the industry leverages digital! You know these 20 year old bright B-school interns? I am sure these kids who were born with technology know a lot about how their generation uses the Internet and devices and Internet of Things and wearables… They will…READ MORE
From time to time, I’ll link to episodes of the podcast that reinforce some of the topics discussed on the blog. If nothing else, it saves me a bunch of time transcribing some of the more interesting learning. But we recently did a show with Adrian Cockcroft (@adrianco), currently a VC at Battery V…READ MORE
CIOs and IT professionals have been slow to adopt software-defined networks for a number of reasons: security concerns, lack of familiarity, and the lack of skill sets required of employees. But attitudes are changing, according to a new survey from Logicalis, the international IT solutions and mana…READ MORE
Hi folks! So Samsung is another mobile company hoping to make a splash at MWC.
In an effort to overshadow everyone else, rumor has it that Samsung will either announce or launch the Samsung Galaxy S5. If that’s the case it will probably completely drown out the annoucement of the Foxconn BlackBer…READ MORE
T-Mobile filed a lawsuit last week against Huawei alleging that Huawei employees stole parts and software from a smartphone testing robot named “Tappy.”
In the lawsuit, T-Mobile alleges that between 2012 and 2013, Huawei violated several confidentiality and non-disclosure agreements by stealing T…READ MORE
Microsoft Windows image via Shutterstock
What has been the biggest success in Microsoft Windows history? Find out in this week’s roundup.
1. Microsoft Windows history: A 30-year timeline – Diana Hwang (SearchEnterpriseDesktop)
Microsoft celebrates 30 years of the Windows operating system wh…READ MORE
Channel partners looking for new talent are facing an expensive and tough job candidates market. It’s competitive, costly and the pickings are slim. So what do you need to know about salary expectations as you sift through resumes?
The annual tech unemployment rate is the lowest recorded since …READ MORE
I am a great fan of checking in on my disks from time to time, especially my system/boot disk, which goes by C: on my system. The last time I fired up WinDirStat on my production system, my eyes goggled at the sight of a file named Windows.edb thereupon that had waxed enormous and perhaps even malef…READ MORE
What did the security world look like in 2014? What does it have in store for us in 2015? That’s what our experts discussed in yesterday’s #ITKESecurity Twitter chat. Come check out what they talked about.