A blog for users, storage solution providers -- including value-added resellers (VARs), systems integrators, managed service providers (MSPs) and consultants -- about data storage hardware and software products and services, backup/archiving products and services, disaster recovery, storage area networks (SANs) and network-attached storage (NAS).
The PowerShell team have announced the availability of the PowerShell v6 release candidate. https://blogs.msdn.microsoft.com/powershell/2017/11/17/powershell-core-6-release-candidate/
A release candidate is just about done with only bugs to resolve – in other words about what you can expect in…READ MORE
NetApp is showing a legacy storage array vendor can still increase revenue impressively during these days of scant storage growth.
NetApp Wednesday night reported its fourth straight quarter of revenue growth, a year that followed a slump during the vendor’s transition period.
NetApp revenue…READ MORE
Which is correct?
Be careful shopping online: According to security experts, ____ the season for identity theft.
‘Tis is a contraction of it is. The rule with contractions is that we put the apostrophes where the letters are missing. The word…READ MORE
Over the past few years, we have seen the development of predictive software using artificial intelligence techniques. The latest advances in these sorts of tools employ swarm technology to use massive databases of expert knowledge, comprised of billions of constantly updated bits of data, to make a…READ MORE
In the wake of last month’s Fall Creators Upgrade, aka Windows 10 Version 1709, some glitches have popped up. Today’s reported item is minor and easy to fix, but could be vexing nontheless. That’s why I hope my readers can benefit from what I recently re-learned. That is, a Windows 10 upgrade will o…READ MORE
Tweets, facebook posts and blog posts can be powerfull things. The have the ability to sway peoples opinions of others, to drive people to buy software, to sell stock, and to make bad decissions.
Posting cranky posts just to get clicks views and retweets does nothing useful but show that all yo…READ MORE
Cloud image via FreeImages
How should organizations prepare for cloud computing technologies in 2018? Check out six different routes in this week’s roundup.
1. Cloud computing technology for 2018: Transform or die – Joel Shore (SearchCloudApplications)
Oracle roadshow keynoters count six al…READ MORE
This past week the Cloud Native Computing Foundation (CNCF) announced their “Certified Kubernetes Conformance Program”, with 32 distributions or platforms being on the initial list. This allows companies to validate that their implementations do not break the core Kubernetes API implementations, alo…READ MORE
MIT Technology Review’s annual list of Innovators Under 35 recognizes individuals who are tackling hard problems and making notable advances in the areas of AI, virtual reality, robotics and security. This year’s list included Ian Goodfellow, the inventor of generative adversarial networks, and Fran…READ MORE
More senior healthcare executives are planning to grow or expand their telemedicine programs than three years ago, according to a survey by law firm Foley & Lardner.
Of the 100 senior healthcare executives surveyed, 76% said their organization currently offers or plans to provide telemedicine…READ MORE
This is a guest blogpost by Julian Box, CEO, Calligo.
The prospect of ambulance-chasing lawyers interesting themselves in the General Data Protection Regulation (GDPR) is now very real.
With just a few months to go before the European Union’s landmark set of regulations comes into force next…READ MORE
The is a guest post for the Computer Weekly Developer Network written by Lior Abraham in his role as founder of Interana.
Interana is a specialist in interactive behavioural analytics software for digital businesses — its technology works to process the ‘temporal nature of data’ with tools de…READ MORE
LPT (Life Pro Tip): When you move from an apartment, take your child pornography with you.
Carpet installers in an apartment in Beaumont, Texas, found three SD cards in an empty closet. “As they started carpeting a bedroom in the vacant apartment on June 5, 2013, workers found something odd tuc…READ MORE
Cloud seeding is a strategy for uploading large amounts of data to a cloud storage service. Transferring a sizable amount of data to the cloud can take days, weeks or even years. Continued…
Quote of the Day
“Tape provides a great means of cloud seeding. Data is dumped to tape and then shipped …READ MORE
Red Hat has provided a presence (and a lot of free red Fedora giveaways) at SAP’s TechEd Europe 2017 conference in Barcelona this week.
The open source champions (Red Hat, not SAP) have announced the availability of SAP Vora on Red Hat OpenShift Container Platform.
SAP Vora is a distributed …READ MORE
The workforce is evolving as organizations focus their efforts on digital transformation strategies. New approaches to technology are influencing employee productivity and collaboration. Five key technology trends are expected to drive the evolution of digital workforces in 2018.
1. Artificial in…READ MORE
In this guest post, Ross Brewer, managing director and vice president for Europe, Middle East and Africa at cybersecurity software supplier LogRhythm, makes the enterprise case for using artificial intelligence (AI) in the fight against cybercrime.
Organisations face a growing number of increasin…READ MORE
DHH (aka David Heinemeier Hansson, the creator of Ruby on Rails) wrote a blog post in the last week about the value of human exploratory testing. Usage of tools to make software development more sustainable has taken a massive leap in the last 5 years. There are all manner of programming frameworks …READ MORE
It would be churlish not to applaud the government’s pre-Budget commitments to the tech sector – an increase in funding to support tech startups and expanding visa availability for bringing in top overseas talent.
More would have been nice – the new visa places will only amount to a few hun…READ MORE
Panelists speaking at a session titled Right Hand, Left Hand: Transparency, Communication and Conflict at the recent Cambridge Cyber Summit agreed that the government and private industry must cooperate to protect U.S. citizens’ data security and online privacy.
Numerous obstacles remain to a tru…READ MORE