A blog for users, storage solution providers -- including value-added resellers (VARs), systems integrators, managed service providers (MSPs) and consultants -- about data storage hardware and software products and services, backup/archiving products and services, disaster recovery, storage area networks (SANs) and network-attached storage (NAS).
The biggest downside of traveling to places far and wide is jetlag. If you’ve never flown father than 1 or 2 timezones you’ve never experienced the true joy that is jetlag. For most people traveling east, sucks while traveling west isn’t to bad. I’m one of these people.
What most people do, espec…READ MORE
Check out part one of this blog post to see how you can take advantage of mobile’s expanding reach.
Going beyond keeping up with your competitors and streamlining your business processes, there’s the matter of user engagement, arguably the strongest case for going mobile. Engagement doesn’t mean …READ MORE
Mobile image via Shutterstock
Between Android, iOS and Windows Phone, which is the best choice for you? Find out in this week’s roundup.
1. Android, iOS, Windows mobile OS war a positive for customers – Jake O’Donnell (SearchConsumerization)
Which mobile OS is best for your enterprise? IT p…READ MORE
April 1st, 2014, saw the release of SQL Server 2014, Microsoft’s cloud first data platform. Latest in a long line of relational database management systems, SQL Server 2014 boasted a range of new and improved features. This included greater performance through In-Memory OLTP, increased availabili…READ MORE
Overland Storage has upgraded its GuardianOS operating system, which powers its SnapServer Dx1 and Dx2 NAS, to make its devices more compatible with Windows in mixed environments. The upgrade is also designed to boost performance, and includes a new BitTorrent-powered sync-and-share feature for …READ MORE
This is something that bears repeating by all of us. It’s very important that everyone identify web addresses before clicking the link. Malicious web sites that look legitimate are commonly used by cyber-crooks to trick unwary users.
It’s very easy to identify the true address of a link: just pla…READ MORE
My MINI Cooper is parked in a garage. In the car is a pile of coins that if counted would amount to $34, probably. That’s why I locked the doors, hid the coins, parked in sight of the lot attendant and ensured that nothing else of value was in view of passersby.
Paranoid? Maybe. For $34 I probabl…READ MORE
With the upcoming release of Windows 8.1 Update 2 reportedly immanent, expected to fall on Patch Tuesday in August (8/12/2014), there’s certainly been a lot of fuss and bother lately about what’s coming (or not) for upcoming Windows releases including that particular one. With a variety of Russian a…READ MORE
WhatIs.com Word of the Day
SMAC (social, mobile, analytics and cloud) is the concept that four technologies are currently driving business innovation. SMAC creates an ecosystem that allows a business to improve its operations and get closer to the customer with minimal overhead and maximum reach….READ MORE
By Lynn Haber
If a lack of awareness about IT solutions equals opportunity for savvy partners, then Kaspersky Lab’s recently released survey results highlight a healthy opportunity for channel partners that have expertise in virtualization security.
In the “Global IT Security Risks Survey 2014…READ MORE
The greatest trick the devil ever pulled was making mainstream media believe that everyone in IT was an experienced Linux SysAdmin.
Or so I thought as I traveled to Portland, Oregon for OSCON 2014 (all content and videos included). I wasn’t exactly sure what to expect, although I’ve been to seve…READ MORE
He was arrested twice for computer crimes and wire fraud. At the time of his second arrest, he was on probation from the first, caught by a large multi-agency dragnet including the FBI.
The actual term in the FBI press release was “manhunt”; he has been called The World’s Most Famous Hacker.
We have a number of mobile chat apps available in the market – or rather on internet market – Whatsapp, Line, Viber, WeChat, Facebook messenger, twitter and so on. Most of these apps support cross platforms so as to enable you to connect with your friends irrespective of the mobile they use and the …READ MORE
More than one person thought it was from the Onion: Police have trained dogs to smell out child pornography. But the truth is no laughing matter.
First of all, the dogs can’t smell pornography, child or otherwise. For heaven’s sake, writers. Have some credibility.
What the dogs (publicized in …READ MORE
I was at this social gathering organized by one of the top global consulting companies for their current and potential customers. It had attendance from veteran industry leaders, founders of companies, CEOs and CFOs, sprinkled with a few Venture Capital heads and off-course partners from the sponsor…READ MORE
I recently did an interview for Slashdot with the CTO of a company that brokers used commercial and enterprise IT hardware. Some readers agreed with what he had to say, some didn’t, and a few were trolls (which is typical on Slashdot). But today, I want to talk about personal gear, and what I have t…READ MORE
If you’re doubting fully integrating mobile into your business model, take a good hard look at Uber. As reported in this week’s Searchlight, many finance professors argued Uber wasn’t worth the $17 billion price tag indicated by investors this spring. But their argument, it seems, was based on a f…READ MORE
There are 4 cmdlets for working with the history in a PowerShell session:
Add-History – adds an entry to the history
Clear-History – clears the history
Get-History -enables you see the current history
Invoke-History – enables you to run a line in your history
Get-History is the one I …READ MORE
Vendors form an essential part of our team that strives to excel in our organizations and vendors play a prominent role in the implementation of our IT plans. The vendors include those who supply and install hardware, those who put in our networks, develop software, help implement application system…READ MORE
Organizations of all stripes are feeling the impact of mounting risk. In the past few weeks alone: Wall Street’s big banks reacted to a changing regulatory landscape; a new survey found that many companies do not have an adequate enterprise risk management strategy; and chief information security of…READ MORE