A blog for users, storage solution providers -- including value-added resellers (VARs), systems integrators, managed service providers (MSPs) and consultants -- about data storage hardware and software products and services, backup/archiving products and services, disaster recovery, storage area networks (SANs) and network-attached storage (NAS).
After recent Windows Defender updates and the latest 1903 Windows 10 CU (KB4507453) Windows 10 may show interesting misbehavior. Symptom: running the sfc /scannow command produces error text rather than a clean bill of health. Reports from TenForums and Bleeping Computer confirm and describe this ph…READ MORE
The road to master java is a long and thorny one. But over my years as a coder, I’ve picked up a hint or two. But how to become a good Java programmer isn’t a question with a simple answer? You don’t need any formal training. You don’t need to sit in a classroom and earn a diploma. And you can certa…READ MORE
We’ve talked before about DNA storage, or the ability to store large amounts of data in DNA. Now there’s another company that’s taking a stab at it.
While DNA storage is incredibly dense and is thought to last longer than traditional magnetic storage, it’s expensive and slow.
So now th…READ MORE
Big traditional banks have embraced fintech, some more than others, with Royal Bank of Scotland/NatWest one of the more active.
Through its innovation cells RBS Group incubate startups in a Wework office in central London.
At the back end of 2016 as part of this project, the banking group st…READ MORE
I recently completed a report for a long-time client, Kemp Technologies, in the area formerly known as L-B/ADC – i.e. Load-Balancing/Application Delivery Control.
It really hit home, during the testing, just how much this “technology” has changed. For starters, we didn’t ever really talk about th…READ MORE
Every few years there is a shift, where regular employees become consultants. Around fifteen years ago, it was frustrated employees becoming XP Coaches. Then it was employee to Scrum Master. Today people are moving toward “Agile Coaching.” I’m going to lump all these jobs into the space of consultin…READ MORE
Passwordless authentication is a verification process where a user confirms his or her identity without the requirement of manually entering a string of characters. Continued…
Quote of the Day
“Passwordless authentication isn’t automatically secure, and its security depends on its implementati…READ MORE
GUEST BLOG: As companies continue to face an enormous digital skills gap, Helen Wollaston, Chief Executive of WISE, the campaign for gender balance in science, technology, engineering and maths (STEM), calls on industry leaders to set targets to increase representation of women in tech in this contr…READ MORE
Even just a decade ago, it was hard to believe that computers would be able to drive cars or easily recognize pictures of a cat. The programming and AI tools around at that time struggled with computers seeing the world around them and processing that information accurately.
In the last 10 years,…READ MORE
Team collaboration apps are everywhere, but deploying them isn’t an immediate recipe for success for organizations looking to improve workflow collaboration. Attitudes toward the role of team collaboration apps, as well as the method of deployment all play a role in the success of adopting team coll…READ MORE
PowerShell v6.2.2 has just been released.
One breaking change – the Enter-PSHostProcess is disabled when system is in lock down mode.
The jumplist is now created in STA to avoid potential CLR crash
Other changes are around the build process.
These changes shouldn’t have impact on you…READ MORE
The recently announced Azure Bastion service looks like a pretty slick service. It provides a secure way into your VMs without the need to VPN in. It gives you the same authentication that you’d expect from the Azure Portal (MFA, AAD Credentials, etc.) all while giving you a pretty easy to manage …READ MORE
“Once you put someone in orbit, it is a lot harder to fix it if something goes wrong,” says Paul Kostek, a senior Institute of Electrical and Electronics Engineers (IEEE) member and senior systems expert at Base2.
But things do go wrong. About 1:08:53 into the BBC’s excellent documentary, E…READ MORE
On the afternoon of 17th July Lord Lucas will chair a round table to launch a national debate on Digital Skills. Cconfirmed opening speakers include
Ben Mason from Global Bridge (opening up new pathways between employers and recruits in the North east),
David Willett, Corporate Director of t…READ MORE
Alluxio is a well-known name among the world’s top internet companies. In fact, 7 out of the top 10 internet companies use open-source data orchestration technology developed by Alluxio. The launch of Alluxio 2.0 at the recent AWS Summit in New York announces a lot more power in it. The open-source …READ MORE
Microsoft has dropped planned policy changes that would have compelled Microsoft channel partners to pay for software they have been using under internal use rights licenses.
Amid considerable partner dissent, Microsoft on July 12 rolled back its plan to cut IUR licenses, a move that would have…READ MORE
With Kubernetes now established in many organisations as the container orchestration platform of the future, are cracks already starting to show? Well, not exactly – but if I could pull out one common theme from what’s hot in the world of cloud-native, it’s the dawning light of Day Two.
People use headphones while they’re at work, get used to the facts.
Now then, some of those people are call centre workers, some of them are air traffic controllers, some of them are telesales people and some of them have a job that inherently demands that they don a pair of ‘cans’ over the…READ MORE
Things changed at BlackBerry, more than once, to be fair.
The company that used to be known as Research in Motion (RIM) decided to drop the somewhat incongruous name and some bright spark in marketing decided to rename the company after the device brand that we once all knew and loved.
The latest select committee report by MPs into the progress of digital government in the UK has resurrected a question that has reared its head on several occasions in the past – do we need a unique single identifier for every citizen, to be associated with our online presence?
This debate was …READ MORE