A blog for users, storage solution providers -- including value-added resellers (VARs), systems integrators, managed service providers (MSPs) and consultants -- about data storage hardware and software products and services, backup/archiving products and services, disaster recovery, storage area networks (SANs) and network-attached storage (NAS).
LF Networking (LFN) is the label used by the Linux Foundation to denote the coming together of seven top networking projects.
In other (arguably more straightforward) words, LFN is an open source networking stack.
The openly stated aim of LFN is to increase harmonisation across platforms, com…READ MORE
The government recently announced plans that – despite facing delays and setbacks – a new Emergency Services Network (ESN) will be phased in from the beginning of 2019. It will replace the legacy infrastructure, Airwave, a radio-based terrestrial trunked radio (Tetra) network.
Now, Tetra, and…READ MORE
A recent interaction with DH2i CEO and Co-Founder, Don Boxley about the key technology transformations in 2019, he talks about two key developments he foresees in 2019 regarding IoT and Hybrid Cloud. So, his 2019 predictions go as follows. The first prediction says Enterprises will replace VPNs with…READ MORE
It was Java 8 that saw the inclusion of lambda expressions, a concept that has long been baked into languages such as Groovy and Ruby, but due to various language constraints, had never made it into the Java language. As organizations slowly move to Java 8 and Java 11 platforms, more and more develo…READ MORE
In this case, CU means cumulative update for Windows 10. Servicing stack updates, also known as SSUs, pave the way for successful CU installs. As the MS Servicing stack updates web page explains, these updates “provide fixes to the servicing stack, the component that installs Windows updates.” In es…READ MORE
After what seems like years of waiting, it appears that the benefits and promises of 5G will soon be delivered. Far from being simply the next generation of mobile networking, 5G will be 100 times faster than its predecessor and will offer 25 times lower latency, providing unimaginably faster respon…READ MORE
Veeam updates to its flagship product and AWS data protection include the ability to migrate old data to cheaper cloud or object storage.
Update 4 of Veeam Availability Suite 9.5 is scheduled to be released this month to partners. General availability will follow at a date to be determined. Veeam…READ MORE
So it turns out the O2 mobile network failure that took out data access for some 30 million people this week, was caused by an expired software certificate – no great conspiracy, no programming error, no undiscovered bug, no malicious interference, but one of the most basic systems administration …READ MORE
In this guest blog, Jennifer Major, head of internet of things (IoT) at SAS UK & Ireland, discusses the obstacles and the opportunities involved creating diversity in analytics.
In the face of the constant soundbites we hear about the British tech sector’s “worrying” lack of diversi…READ MORE
Christmas Image via FreeImages
It may not be “officially” winter time yet, but it sure feels like it outside! It’s time to heat things up with some prizes that are sure to make Santa jealous this holiday season. But first, let’s see who won the activity contest in November!
$150 Amazon gift …READ MORE
It’s December, the time of year when real IT pros are so busy working they look up and realize it’s Christmas Eve. They don’t have anything for family, let alone “Christmas Stocking Stuffer”-sized gifts for friends and peers.
Don’t be that person.
For the fourth time, I’m going to take a crack…READ MORE
Last time I showed how to get the number of occurrences of each character in a string but how do you count the occurrence of given character in a string?
You use one of the fundamental concepts on which PowerShell is built – its composability. In other words PowerShell is composed of…READ MORE
The Computer Weekly Developer Network (CWDN) team recently got to meet with enterprise applications company IFS at its Sri Lanka headquarters in Colombo.
The meetings were designed to explore the work its IFS Labs division is currently undertaking, talk to senior local management to find out why …READ MORE
Process mining software is a type of program that analyzes data in enterprise application event logs in order to learn how business processes are actually working. Continued…
Quote of the Day
“Process mining is all about automatically discovering the as-is business process from the data that a…READ MORE
Tom Cruise has posted a video alongside Mission: Impossible – Fallout director Christopher McQuarrie, encouraging fans to adjust their television settings to improve their viewing experience of the film, and we ache for when we had that enthusiasm.
It’s normal to feel uncomfortable watching Tom…READ MORE
The TSA once dropped my laptop and it made me nervous about the fact that a machine on the road is a delicate thing. To be clear, the fine people at the US Transportation Security Administration (TSA) do a fabulous and invaluable job of keeping us safe and I appreciate them right down to their cott…READ MORE
Editor’s note: In this opinion piece, industry analyst Zeus Kerravala shares his thoughts on open data centers and Extreme Networks’ approach. Extreme Networks is a client of Kerravala’s ZK Research, a consulting firm based in Westminster, Mass.
Open is an overused word in the networking industr…READ MORE
What with World Backup Day, Electronic Records Day, Ask an Archivist Day, and Sysadmin Day, I suppose it’s no surprise that there’s an E-Discovery Day. Incidentally, it’s Tuesday.
There was, apparently, some controversy about when to schedule E-Discovery Day this year. Typically scheduled o…READ MORE
In this guest post, DevOps consultant and researcher Dr. Nicole Forsgren, PhD, tells enterprises why execution is key to building high-performing technology teams within their organisations.
I often meet with enterprise executives and leadership teams, and they all want to know what it takes to …READ MORE
There’s been a lot of discussions recently about SQL Agent jobs, proxy accounts, and job ownership. I wanted to try and clarify some of the myths out there, including job ownership and permissions.
The owner of a job is the context of the account, that the SQL Agent Job runs as. This account by d…READ MORE