Member bloggers at IT Knowledge Exchange come from a variety of walks of life. Some are IT practitioners, helping their companies large and small continue to execute on their IT goals. Some are noted experts, authors and thinkers, helping set the bar for where IT is going tomorrow. Some are consultants, either solo or with large organizations. Some are helping build the very products that will make that tomorrow possible.
A lot of them are doing some mix of the above.
All of IT Knowledge Exchange’s bloggers, however, are expected and have committed to holding a high standard when it comes to transparency and accuracy, and we’re taking the step to outline that commitment to you here.
IT Knowledge Exchange bloggers often have a variety of roles in the industry they cover. This can give them unique insights and a depth of expertise, but it can also lead to trouble if possible conflicts of interest are not disclosed.
In light of this, IT Knowledge Exchange bloggers will:
- Post information on their background and expertise, including education, experience, and previous and current employers if that experience has helped shaped their expertise.
- Make clear their membership in any trade organizations or groups that relate to the material they are writing.
- Clearly disclose any payments or gifts they receive from industry groups, including vendors, trade organizations, analyst firms, or anyone else with a vested interest in selling something.
- Let their readers know if they are using affiliate links when linking to books, audio recordings or anything else they can purchase online.
- Make clear their source material, which includes linking to sources if available and never claiming others’ ideas or words as their own.
Members and visitors have a lot of choices when it comes to technical knowledge online, and to earn their trust and time, IT Knowledge Exchange bloggers work hard to make sure that they present the most accurate information available.
IT Knowledge Exchange bloggers will:
- Only publish information they believe is accurate as of the date they’re writing.
- Not pass along rumors without providing some context as to how reliable that information is.
- Be open to corrections from their readers and work to update material if proven incorrect.
- Be willing to print respectful responses from those with opposing points of view, whether in the comments or as a guest post on their own blog.
Since IT is a swiftly changing field, information that is accurate and complete one day might be obsolete even a few months or days later, and we encourage readers to comment with updates when applicable.
* * *
The bloggers at IT Knowledge Exchange have upheld a very high standard of quality, and most have been following these guidelines on their own for years. If you have any questions about this policy, however, please reach out to us at ContactUs@ITKnowledgeExchange.com.
Here they are, this week’s IT blog top 10. No guns or fallen comrades, just a great range of topics. Check them out and let them know in the comments section if they rev your jet engine. Have a favorite blog post you’d like to share? Hate my puns/metaphors? Let me know in the comments as well. We always welcome your feedback, so email me at Melanie@ITKnowledgeExchange.com or let me know on Twitter!
1. An open source clustered NAS deep dive by Beth Pariseau for Storage Soup.
3. First look at Windows 2008 R2 SP1 puts emphasis on virtualization by Brendan Cournoyer for The Windows Server Notebook.
4. Xen vs. KVM: The battle lines are drawn by Colin Steele for the Search Server Virtualization Blog.
5. CIO challenge: A generation of social media addicts by Linda Tucci for Total CIO.
One of our goals here at IT Knowledge Exchange is to provide you, our members, with efficient and useful ways to navigate and improve the IT industry. Whether it’s through our monthly themes, our question and answer forum, or one of our many member blogs, we’re always trying to keep that conversation going amongst our members. We love to get feedback on how you think we’re doing, what we can do better, and how you’d like to get involved more. As always, you can email me at Melanie@ITKnowledgeExchange.com. Connect with us on Twitter, let us know your area of expertise and we’ll add you to one of our Twitter lists so we can better serve you and you can better serve each other. If you’re an active Twitter user, let us know your handle in the comments section and we’ll be sure to connect with you!
A sneak peek at tomorrow’s member highlight: Our very own Graeme Elliott, or SpiritSoft, of Sydney, Australia and The Art of Storage blog. He’s an expert in TSM, VTL, Virtual Storage, File Virtualization, NAS and SAN. He’s been busy the past couple weeks getting a head start answering this month’s Storage in 2010 questions and last month’s Virtualization in 2010 questions.
Check out what he has to say on how to keep user home directories on NAS from consuming all available storage space, or click through to his profile to see all of his questions and answers. For updates on his blog, connect with Graeme on Twitter!
Back in April, we announced that you could be browsing IT Knowledge Exchange on a brand-spanking new iPad. Since then, we’ve seen some great questions and answers and we’ve even been able to put ITKE handles to faces with everyone uploading photos and updating profiles. First of all, thank you to everyone who participated: Our community wouldn’t be as diverse and thriving without all of you. You’re awesome.
Second of all, a BIG congratulations to TomLiotta and Aguacer0 for winning the iPad contest! Their contributions to IT Knowledge Exchange kept them consistently in the top 10 throughout the contest. Be sure to keep an eye out for the next contest, you never know what we’ll be giving away.
This week’s top 10 most-watched IT questions run the gamut from ethics to VMWare to printing to cloud computing. If you’re an expert in one of these areas, head over to IT Answers and share your wealth of knowledge. Not an expert? No worries; head over and get your questions answered by IT professionals.
1. Network admin code of ethics? asked by ITKE, answered by Labnuke and discussed by Dee101, Meandyou and Technochic.
2. VMware or Xen? asked by ITKE, answered by Aguacer0 and discussed by Mrdenny.
3. Looking for Backup solution for VMWare environment asked by ITKE, answered by Mrdenny and discussed by SpiritSoft.
4. Dos printing problem asked by Stoe09 and answered by Meandyou.
SharePoint 2010 allows your company to quickly respond to changing business needs. Your people can share ideas and expertise, create custom solutions for specific needs and find the right business information to drive your business forward.
I hope you’ll join us.
Here are the IT Knowledge Exchange community’s top 10 blog posts from this past week. See something you like? Let them know. What were some of your favorite posts from this past week? Let me know at Melanie@ITKnowledgeExchange.com!
1. Microsoft: 0, VirnetX and i4i: 490 Million by Melanie Yarbrough for the Enterprise IT Watch Blog.
2. New Zealand vendor making next generation IDS a reality by Robert Westervelt for Security Bytes.
3. S3 adds Tier 2 for 10 cents per GB by Beth Pariseau for Storage Soup.
4. SQL Injection attack used in breach of 168,000 Netherlands travelers by Robert Westervelt for Security Bytes.
5. Xen vs. KVM: The battle lines are drawn by Colin Steele for the Search Server Virtualization blog.
Here are the top 10 of the most-watched questions from the past week. One of them has yet to be answered, so head over to IT Answers and have your say.
1. Sending e-mail attachment from mainframe CSV format asked by Uddaraju19 and answered by Meandyou.
2. Cost to upgrade to SQL Server 2008 R2 asked by ITKE, answered by MicrosoftExpert and discussed by Mrdenny.
3. Consistency errors on virtualized SQL 2000 SP4 servers asked by ITKE and discussed by Mrdenny.
4. DOS printing problem asked by Stoe09 and answered by Meandyou.
5. Licensing problems when virtualizing servers? asked by Michael Morisy, answered by Dee101 and discussed by Mrdenny, 59Apache and Cklunt.
Here they are: the top 10 blog posts across IT Knowledge Exchange for the past week. If you think one of them’s totally excellent, let them know in the comments section. Enjoy!
1. New Trojan masquerades as Adobe update by Robert Westervelt for Security Bytes
2. Gartner’s take on emerging business intelligence technology by Christina Torode for the TotalCIO blog.
3. Xen vs. KVM: The battle lines are drawn by Colin Steele for the SearchServerVirtualization Blog.
4. First look at Windows 2008 R2 SP1 puts emphasis on virtualization by Brendan Cournoyer for The Windows Server Notebook blog.
5. SQL Server 2008 R2 has been released to manufacturing by mrdenny for SQL Server with Mr. Denny.