A blog for users, storage solution providers -- including value-added resellers (VARs), systems integrators, managed service providers (MSPs) and consultants -- about data storage hardware and software products and services, backup/archiving products and services, disaster recovery, storage area networks (SANs) and network-attached storage (NAS).
External storage systems are all-but-obsolete in the software-defined era. At least that’s the fable shared repeatedly across the industry. But cloud and enterprise customers are collaborating to write a different tale, featuring legacy storage as a central character.
Similar to the “tape i…READ MORE
Stacked die is a newer technology gaining traction in a variety of electronics applications, due to the fact that OEMs continue to demand greater capabilities and performance in smaller printed circuit boards (PCBs). As the name implies, stacked die means one bare chip is placed on top of another on…READ MORE
Here’s an interesting tidbit of information, courtesy of Forbes magazine. That story references a December 10 Windows Insider Program blog post. It’s from Michael Fortin, MS CVP for Windows, entitled “Windows monthly security and quality updates overview.” In that memo, Fortin identifies update rele…READ MORE
Open source news to end the week looks to the somewhat incongruous connection between Menlo Park California and Helsinki — it can only be MariaDB Corporation with that HQ combo.
Updates to end 2018 see the new availability of the MariaDB Connector for Node.js, giving developers a method to build…READ MORE
The year was 1999. Dial-up service was the most popular way to get online, people used to drive to stores to get DVD’s – and compact disks. The iPod would not exist for two more years and MP3 players were awkward and hard to use. What most college students did have was a CD player and the ability to…READ MORE
For those who are new to functional programming, basic Java lambda syntax can be a bit intimidating at first. Once you break lambda expressions down into their component parts, though, the syntax quickly makes sense and becomes quite natural.
The goal of a lambda expression in Java is to implemen…READ MORE
Two and a bit years ago – I should remember, it was on my birthday! – I was presenting a panel debate on the latest Cybersecurity deterrents. With four vendors and two consultants on the panel, it was the general consensus that deciding exactly which combination of products and services a compan…READ MORE
Citizen development is a low code approach to software development that allows people to create software programs without needing to know anything about programming languages or how to write code. Continued…
Quote of the Day
“Low-code development platforms provide opportunities to citizen deve…READ MORE
Return of the missing PSDiagnostics members in PowerShell v6.2 preview 3.
In Windows PowerShell v5.1 the PSDiagnostics module contains these members:
The U.S. Food and Drug Administration took an innovative approach to combating the national opioid crisis earlier this year. The FDA issued a challenge to medical device developers to leverage technology in the fight against opioid addiction and abuse.
In response to the FDA Innovation Challenge:…READ MORE
In this contributed post, MJ Chun, director of product, Anki, explains why children need to be exposed to science, technology, engineering and maths (Stem) from a young age.
Coding was added to the UK curriculum in 2014 but we recently undertook some research which revealed 43% of parents strugg…READ MORE
In a recent online presentation, Check Point Software Technologies founder and CEO Gil Shwed stated that “we are at an inflection point” when it comes to cybersecurity.
Shwed’s statement came on the heels of Check Point’s release of its 2018 report that found 97% of surveyed companies were unprep…READ MORE
It’s always interesting to read about how the BackBlaze backup service is doing with its hard disk drives. Like companies such as Facebook and Google, it uses so many hard disk drives that it ends up stripping off extraneous parts and building its own structures with them. But because the company …READ MORE
On the face of it, cloud storage should be an ideal candidate for an “excess capacity”, “sharing economy” business model.
Otherwise termed “Uberization”, we’ve seen the rise of apps and services that seek to marry excess capacity in cars, homes etc to those looking to use it, and ge…READ MORE
The Computer Weekly Developer Network (CWDN) team recently got to meet with enterprise applications company IFS at its Sri Lanka headquarters in Colombo.
The meetings were designed to explore the work its IFS Labs division is currently undertaking, talk to senior local management to find out why …READ MORE
The question for Adobe CFO John Murphy was how had digital transformation changed his job. Are there decisions you’re involved in today that would wouldn’t have been involved in 10 years ago? he was asked.
Murphy, who assumed the CFO role at Adobe in April, was being interviewed at the recent MIT…READ MORE
Azure is a great platform to use, and the new Managed Disks are fantastic as you just need to set it and forget it. However, if you run into the problem that I can recently with moving the VM from one resource group to another, you’ll run into a stumbling block pretty fast. I hit this because …READ MORE
The government recently announced plans that – despite facing delays and setbacks – a new Emergency Services Network (ESN) will be phased in from the beginning of 2019. It will replace the legacy infrastructure, Airwave, a radio-based terrestrial trunked radio (Tetra) network.
Now, Tetra, and…READ MORE
A recent interaction with DH2i CEO and Co-Founder, Don Boxley about the key technology transformations in 2019, he talks about two key developments he foresees in 2019 regarding IoT and Hybrid Cloud. So, his 2019 predictions go as follows. The first prediction says Enterprises will replace VPNs with…READ MORE
So it turns out the O2 mobile network failure that took out data access for some 30 million people this week, was caused by an expired software certificate – no great conspiracy, no programming error, no undiscovered bug, no malicious interference, but one of the most basic systems administration …READ MORE