A blog for users, storage solution providers -- including value-added resellers (VARs), systems integrators, managed service providers (MSPs) and consultants -- about data storage hardware and software products and services, backup/archiving products and services, disaster recovery, storage area networks (SANs) and network-attached storage (NAS).
Saw an interesting question about user logon time. How can you tell the logged on user and when they logged on
$logon = Get-CimInstance -ClassName Win32_LogonSession |
sort StartTime -Descending |
select -First 1
$user = Get-CimAssociatedInstance -InputObject $logon -ResultClassName Win32_Ac…READ MORE
On May 25, the European Union enacted the most stringent data protection and breach fines in the world under the new General Data Protection Regulation. As stated by the EU, the goal is to “protect all EU citizens from privacy and data breaches in an increasingly data-driven world.” Its broad reach …READ MORE
When the latest edition of Black Hat USA kicks off in Las Vegas next week, it will find itself deep in the swirl of nation-state election tampering, with top security administrator’s gathering jointly in the White House press room to underscore the dangers of Russian cybermeddling while President …READ MORE
The following post is a guest piece written by Katrine Spirina in her role as an in-house technology journalist with software development company Ocsico covering trends in web and mobile development.
Spirina writes as follows…
The retail and e-commerce industries are extremely consumer-orie…READ MORE
This is a guest blogpost by Neo4j co-founder and CEO Emil Eifrem, who explains why his sector needs its own ‘General Query Language’.
In the same way that SQL helped facilitate the growth and subsequent domination of RDBMS over the database market for the last two decades, to secure its next …READ MORE
Pure Storage is finding a use case for its FlashBlade array that no one expected when the all-flash system for unstructured data launched in 2016.
Brian Schwarz, VP of product management for FlashBlade, said customers are using FlashBlade as a backup target as well as primary scale-out unstruct…READ MORE
Accenture last week scooped up two companies to solidify the product innovation component of its Industry X.0 practice, which aims to help clients develop smart connected products and services.
The IT consulting firm acquired Mindtribe, a hardware engineering firm based in San Francisco. Mindtrib…READ MORE
I admit it, I still use SQL Profiler. I always have, and I will for the foreseeable future. My reasons are pretty simple.
When it comes to troubleshooting I can spin up a Profiler session must faster than an Extended Events session.
Usually, I’m troubleshooting something as a one-off. So…READ MORE
Cloud giant Amazon has announced the open source release of its Alexa Auto SDK (Software Development Kit).
The news comes from the company’s Amazon Voice Services (AVS) division.
The SDK is provided for software application developers working with automobile manufacturers in order for them t…READ MORE
Apple’s Worldwide Developer Conference this week showed some new iOS 12 features that could be exciting for Apple users in the enterprise.
Several features of the new iOS may help improve productivity for business users, by limiting distractions and improving workplace communications. Apple’s i…READ MORE
Something interesting happens on Windows 10 systems with Logitech mice and unifying transceivers. Go into Device Manager, and turn on “Show hidden devices” in the View menu. On such PCs, you’ll see a usually hidden device category called “DriverInterface” show up. On systems with a Logitech mouse an…READ MORE
This is a guest blog post by Brendan O’Rourke, head of design at BriteBill, an Amdocs company.
It’s no secret that today’s customers are more demanding than previous generations. They share their experiences online, they expect instant gratification 24-7, and the competition is just a m…READ MORE
Payment image via FreeImages
How does your organization ensure payment systems are secure? Check out how researchers discovered a new wave of BGP hijacking attacks that are targeting payment systems in this week’s roundup.
1. BGP hijacking attacks target payment systems – Michael Heller (Searc…READ MORE
About Zoho Backstage, Sridhar Vembu, CEO of Zoho Corp. says, “Planning and running an event is a complex operation that has traditionally required different tools for each stage of the process—a website builder, a mass emailing solution, scanners for checking in attendees, and a stand-alone app …READ MORE
With the push to deliver Office and Windows as services, Microsoft subscriptions will be a reality in most IT departments one way or another. But not all organizations are good candidates for going all-in.
Microsoft will continually update Windows 10 rather than release another version going forw…READ MORE
Will Liam Maxwell’s departure be the straw that broke the camel’s back when it comes to government’s progress on digital?
Earlier this week, news broke that Liam Maxwell, the government’s digital czar, is leaving Whitehall to take up a job in the private sector.
Maxwell, who has been p…READ MORE
More companies today are investing in AI-based cybersecurity technology to speed up incident detection and response, to better identify and communicate risk to the business, and to gain a better understanding of cybersecurity situational awareness. That’s according to ESG research that found 12% of …READ MORE
_______ Active Directory enables single sign-on capabilities for Microsoft apps, such as Office 365 and Dynamics CRM.
A. In addition,
B. In addition
A comma should be used after common introductory phrase to give the reader a slight pause. This pause after an introductory ele…READ MORE
As much as we try to embrace all the various wonders of modern technology, we still turn into Danny DeVito’s character as the bitter, resentful father in Matilda whenever we see a news story about artificial intelligence doing something better than us.
Beyond fears surrounding AI taking our jobs …READ MORE
I’m sitting in the office of a high-powered executive, and they tell me how the entire technical staff is “bought in to Agile” and uses BDD to enable continuous delivery.
Then I go talk to the people.
It turns out that builds are performed by the “build master” checks the code out of…READ MORE