From the Cloud to Virtualization, Software As a Service to Web Services, ideas seem to be everywhere all the time. Somewhere, somehow, someone needs to separate the wheat from the chaff. We’ve asked Matt Heusser to provide his insight and commentary on the prevailing issues for IT staff today.
For many consumers, a Wi-Fi router is no more than an ugly but necessary evil to ensure they have untethered access to the internet on all of their devices, says XCellAir co-founder Todd Mersch.
For that reason, the majority – at least 60% according to an IHS Report – are more than happy to l…READ MORE
What will I learn? Will it be fun? Should I leave my iPhone at home?
These are the things we want to know about AnDevCon Boston 2016. So we spoke with Katie Flash, director of conference programs at BZ Media (the coordinators of the conference) about what this year’s AnDevCon will be like.
The graph below illustrates our definition of the uncanny valley, a feeling of unease experienced in reaction to simulations of humans that approach — but don’t achieve — realism. For further explanation and a video demonstration, see the full definition.
The graph was adapted by Smurrayin…READ MORE
“To some extent Agile isn’t a solved problem.”
“Agile needs to freaking grow up.”
“We need to stop calling it Agile.”
“We need to stop saying Agile makes it easy to go faster.”
“Agile got us going, but DevOps is going to take us where we need to go.”
In the confe…READ MORE
A friend of mine recently had to inform his staff of a new password policy requiring all of the following: Upper and lower case letters, a number, a special character, at least 12 characters in length and had not been used in the last six months. Someone sent him this meme in reply:
3D printing specialist XYZ is experimenting with uses for its printing technology, starting with the potential to print food
Computer Weekly has dabbled in the realms of 3D printing before, when the Inspect-a-gadget team attempted to use a do-it-yourself 3D printer with no previous training.
General manager of Arch Graduates, Harry Gooding, explains why he went from recruitment to creating the perfect tech workers for the job
It’s no secret that currently the tech industry is suffering from a skills gap.
Computer Science graduates claim they cannot find work, and industry claims…READ MORE
The sad news that outsourcing pioneer Robert Morgan recently died is a great loss to a great many people.I was with Robert a couple of weeks ago so it was a huge shock to hear of his sudden death.Robert is best known as co-founder of sourcing advisory Morgan Chambers, which cornered its market. It …READ MORE
Today, marks the launch of a new kind of learning experience known as Firebrand Max. It’s a mix of 5-star luxury and accelerated training, aimed at developing technology skills at the highest level in businesses.
Imagine one-on-one instruction, helicopter travel, castle accomodation and you b…READ MORE
The Department for Business, Innovation & Skills has released Debbie Wosskow’s independent review on the potential of the sharing economy,”Unlocking the sharing economy: an independent review”.I haven’t had an opportunity to read the document in full yet, but there are recommendations in there …READ MORE
All the prognostication about when Windows Server 2016 will be available was laid to rest in multiple blogs from Microsoft today when the company announced the next version of the server operating system will launch at the Microsoft Ignite event in Atlanta September 26-30.
Windows Server 2016 wil…READ MORE
Each year, with the publication of A-level results, hundreds of thousands of school leavers embark on a journey that ultimately fuels the talent pool feeding the UK economy. Some argue that a generation brought up on the internet have different expectations of work than previous generations. But,…READ MORE
Accountants don’t get nearly enough love from the business
The only time anyone reaches out to them is generally with open hands asking for something or to challenge them on a position that they take with respect to allocations, budgets, expenditure and other artifacts associated with the account…READ MORE
Security, for a decade or so, didn’t see much in the way of true change – yes, firewalls got smarter, likewise AV products (well, some anyway), IDS became IPS so it could actually stop something happening, encryption became more encrypted and VPNs became more virtual, but typically same old vendor …READ MORE
Increasingly, Amazon’s bread is buttered by its public cloud provider, Amazon Web Services. And while AWS entered the IaaS market 10 years ago with on-premises data centers in its crosshairs, evolution is pushing the cash cow further into new revenue streams.
While AWS has expanded its range of s…READ MORE
You’re never safe in Enterprise IT. Just when you feel you’ve gotten a handle on the last hot topic you’re hit with another. SOA, BPM, Agile, ITIL; You feel like screaming “Enough!” but you know resistance is futile. Gartner have said it’s important so you know full well that you’ll be…READ MORE
Word comes to me that Grace Lee Whitney has died at age 85. She is the actress best known for playing Yeoman Rand on Season 1 of Star Trek (The Original Series [TOS]).
I’m not a huge Trekkie (or Trekker, for those who prefer the term that seems to harbor a little more gravitas for those who f…READ MORE
How successful was your last mobile application development project? A recent survey conducted by the IBM Center for Applied Insights found that two-thirds of mobile application development projects fail to fully achieve budget, schedule and project objectives. So what’s the other one-third do…READ MORE
Companies that offer DCIM tools position them as essential, promising a holistic view of the performance of a data center. The DCIM market went from volatile to pretty stagnant, though a buyout between two of the major vendors could jump start demand.
There are several problems with data cent…READ MORE
User Behavior Analytics (UBA) enables organizations to identify suspicious activity based on how a user interfaces with systems and the environment. Their typing style, most used commands, morning routine, the applications they use, the rate at which they work and many other facets can be analyzed…READ MORE