A blog for users, storage solution providers -- including value-added resellers (VARs), systems integrators, managed service providers (MSPs) and consultants -- about data storage hardware and software products and services, backup/archiving products and services, disaster recovery, storage area networks (SANs) and network-attached storage (NAS).
One of my favorite things about interviewing women in technology has been hearing all their helpful tips and insights. Many of these women spent decades in the tech world, moved up the career ladder, innovated in their areas of expertise, started new businesses, and created more opportunities for th…READ MORE
Hyundai, along with a handful of key investors, is pumping more money into Grab, Southeast Asia’s largest ride-hailing service in an effort to bring its mobility services to the region.
The South Korean car maker is already dabbling in car-sharing on its own in the US, Netherlands and Austria, …READ MORE
A prime number is a whole number greater than 1 whose only factors are 1 and itself. A factor is a whole number that can be divided evenly into another number. Continued…
Quote of the Day
“The security of many encryption systems is based on mathematical problems involving prime numbers so larg…READ MORE
When Intel CEO Brian Krzanich took the stage last night at CES 2018 in Las Vegas, he began his keynote by addressing the elephants in the room – the recently disclosed Meltdown and Spectre vulnerabilities affecting modern CPU architectures, including Intel’s.
Those remarks lasted approximately …READ MORE
Time now to check in with Downtime linchpin Sophia the robot, who’s been dazzling the world once again – this time at CES 2018.
No, it’s not wig-cleaning day for Ray’s wife at Disney World’s “Hall of Everybody Loves Raymond”. It’s the darling of Hanson Robotics, live in Las Vegas an…READ MORE
This is a guest post by Peter Duffy, CTO, Sumerian
British consumers are increasingly bombarded with a constant stream of companies attempting to bring their latest deals and products to their customers’ fingertips.
This has fantastic implications for both parties involved, however in orde…READ MORE
Politics, rightly or wrongly, has an impact on government technology projects. It’s an inevitable part of having a democracy and political prowess can be used to drive transformation, but can it also become an obstacle to success?
Earlier this week, I wrote a story in which shadow Cabinet Offic…READ MORE
Taking a laptop across the border? There’s good news and bad news.
As you may recall, since 2009 there has been an ongoing struggle with how much right the U.S. government has to search laptops that people are carrying into the U.S., without a warrant, or even any particular reason other than t…READ MORE
Changes in smartphone purchasing trends have hurt Samsung.
Samsung released the Galaxy Note 8 in the last two weeks of the third quarter of 2017, around the same time as Apple released its three latest iPhone versions 8, 8 Plus and X. Samsung mobile sales decreased by 6% for the quarter. Why? Bec…READ MORE
The following is a roundup of last week’s SearchCIO and SearchCompliance content.
With digitization, unpredictability comes with the territory. This is epitomized by Gartner’s revised IT spending forecast for 2017, which shows a modest increase in worldwide spending, but less than originally pr…READ MORE
IT, and security especially, is overloaded with slick marketing terms that have little or no substance behind them – the classic “solution searching for a problem” scenario.
But… just occasionally the complete opposite prevails, as in the most recent test project I’ve just completed for…READ MORE
Google created Project Oxygen in 2013 to review data starting in 1998 about every person they employed. This project reviewed data surrounding hiring, firing and people leaving google, and how people move around in the company. The goal was to discover what made the best Google employee. The result …READ MORE
One of the most popular topics coming out of the CNCF’s KubeCon event in Austin was the concept of a “Service Mesh”.
There were a number of great sessions (videos) at KubeCon about Service Mesh technologies (including Istio, Envoy, Linkerd and Conduit).
This week we discussed the basics of Se…READ MORE
Way back in this post https://richardspowershellblog.wordpress.com/2008/03/27/start-and-end-of-week/ I showed how to find the start of the week. I recently had a question about how to restrict the display to just the date.
PowerShell uses the .NET datetime class for working with dates so there…READ MORE
With so many natural disasters in the news this year, many enterprises have thought about their approach to disaster recovery — and whether their plan is foolproof.
The cloud provides many benefits for disaster recovery (DR), and enables an enterprise to safeguard its data across multiple region…READ MORE
Digital transformation is tied to the broader trend of business transformation and takes ______ to take hold.
b. a while
Which is correct?
Both a while and awhile refer to a vague period of time. However, a while is used as a noun meaning “a period of …READ MORE
This is a guest blogpost by Sebastian Darrington, UK MD at Exasol
The days of operating a single vendor IT software estate are behind us. Such is the pace of innovation and change, putting all your eggs in one basket simply won’t do.
Businesses need the ability to mix and match, leveraging t…READ MORE
Before embarking on a new year of reporting on IT industry trends in the channel, we wanted to take a moment to review some of our 2017 coverage that struck a chord with readers. Not surprisingly, stories about some of the industry’s most recognizable vendors received attention. The majority of thes…READ MORE
New Year image via FreeImages
Happy New Year everyone! I hope everyone got to spend some quality time with their friends and families. But it’s time to get back to work and start totaling up the points in this month’s activity contest. But before that, let’s take a look at December’s contest.
The recently released Cisco Press title “Cisco Firepower Threat Defense (FTD)” by Najmul Rajib is a great treat to read as he addresses most of the new concepts and new approach one has to adapt to enhance his/her Cisco’s Firepower technology.