Featured Blog

Yottabytes: Storage and Disaster Recovery by Sharon Fisher

member Blog

A blog for users, storage solution providers -- including value-added resellers (VARs), systems integrators, managed service providers (MSPs) and consultants -- about data storage hardware and software products and services, backup/archiving products and services, disaster recovery, storage area networks (SANs) and network-attached storage (NAS).


LATEST POST:

Facebook’s Private Setting No Shield in Forman Case

April 18, 2018 - If you’ve been revealing secrets on Facebook and thinking that you’re okay because your messages and postings are private, not public, think again: a recent court case ruled that attorneys could rule to more easily discover private as well as public Facebook material. The case is Forman vs. Henkin, and the court that so ruled,...... READ MORE

Blogs

  • Twilio’s developer-first approach to programmable cellular communications

    editorial Blog

    Cloud communications software company Twilio has announced Twilio Programmable Wireless.

    This is programmable cellular communications software that offers APIs to power web-connected Internet of Things (IoT) products.

    To be clear, Twilio is making the cellular connectivity element itself progr…READ MORE

    Adrian Bridgwater13,785 pointsBadges:
  • Growth mindset lets Microsoft love Linux

    editorial Blog

    Timed to coincide with the RSA security conference, Microsoft has announced Azure Sphere, a new solution for creating highly-secured, Internet-connected microcontroller devices. But there’s a bit more to it than that. Enabled by the company’s newly found ‘growth mindset’, Microsoft engineers can hap…READ MORE

    Richard Edwards55 pointsBadges:
  • Huawei’s industry vision offers glimpse into its priorities

    editorial Blog

    At Huawei’s annual analyst summit in Shenzhen this week, the Chinese technology giant unveiled its predictions about what the future holds from a technology perspective in its Global Industry Vision (GIV) 2025 report.

    The crystal-ball-gazing exercise involved the use of its own “unique resear…READ MORE

    Aaron Tan1,515 pointsBadges:
  • RSA IoT Village 2018: Hacking some of the things

    editorial Blog

    RSA attendees who wanted a hands-on taste of hardware hacking were able to get their fix at the IoT Village area of the RSA Sandbox, a busy ancillary location of the RSA Conference 2018 in San Francisco. There, they learned that the UART interfaces ubiquitously found in IoT equipment have some defau…READ MORE

    Robert Richardson800 pointsBadges:
  • CrowdStrike unveils Meltdown exploit in unusual fashion

    editorial Blog

    SAN FRANCISCO – CrowdStrike displayed a flare for the dramatic — as well as a touch of ego — at RSA Conference Wednesday when it snubbed various threat actor groups for the company’s “adversary Oscars” and gave the top prize to itself.

    The cybersecurity vendor unveiled a new Meltdown exploit,…READ MORE

    Rob Wright2,075 pointsBadges:
  • Code reviews and Iron Scripter

    member Blog

    Many organisations use code reviews to help ensure a quality outcome. At the recent PowerShell Summit we ran a scripting competition – Iron Scripter. I’ve had a thought on how code reviews and Iron Scripter have something in common. Something that could lead to a better code review.

    Iron Scri…READ MORE

    Richard Siddaway8,205 pointsBadges:
  • Applying AI: Accenture exec cites customer opportunities

    editorial Blog

    The task of applying AI, digital thread and augmented reality to here-and-now business challenges is much on the mind of Mike Sutcliff, group chief executive at Accenture Digital. Sutcliff discussed those technologies with SearchITChannel in a recent email interview. Here are some excerpts from that…READ MORE

    John Moore3,000 pointsBadges:
  • Facebook's Private Setting No Shield in Forman Case

    member Blog

    If you’ve been revealing secrets on Facebook and thinking that you’re okay because your messages and postings are private, not public, think again: a recent court case ruled that attorneys could rule to more easily discover private as well as public Facebook material.

    The case is Forman vs. H…READ MORE

    Sharon Fisher9,210 pointsBadges:
  • Veeam and Pure Storage team up on data protection, production

    editorial Blog

    Four months after the release of Veeam’s Universal Storage API, Veeam and Pure Storage have teamed up to streamline data protection and storage, and speed recovery.

    The integration — initiated through the API — between the Veeam Availability Platform and the Pure Storage FlashArray allows joint…READ MORE

    Paul Crocetti955 pointsBadges:
  • When it comes to mobile spectrum, it's time for Three to get over itself

    editorial Blog

    I was hugely pleased today to see that despite the possibility of another legal roadblock in the Court of Appeal, telecoms regulator Ofcom is going to move ahead and lay the groundwork for the long-delayed auction of two massive slices of radio spectrum, one to support enhanced 4G mobile networks, a…READ MORE

    Alex Scroxton21,455 pointsBadges:
  • Robert Morgan, RIP

    editorial Blog

    The sad news that outsourcing pioneer Robert Morgan recently died is a great loss to a great many people.I was with Robert a couple of weeks ago so it was a huge shock to hear of his sudden death.Robert is best known as co-founder of sourcing advisory Morgan Chambers, which cornered its market. It …READ MORE

    KarlFl4029,745 pointsBadges:
  • Using cloud to help public transport operators put passengers first

    editorial Blog

    In this guest post, Craig Stewart, vice president of product management at cloud integration provider SnapLogic, spells out why the more traditional transport operators need to take a leaf out of their cloud-native competitors’ books to stay relevant and in-touch with changing customer demands. 

    READ MORE

    Caroline Donnelly5,310 pointsBadges:
  • Bridging the CIO-CMO gap

    editorial Blog

     
    This is a guest post by Peter Duffy, CTO, Sumerian
    British consumers are increasingly bombarded with a constant stream of companies attempting to bring their latest deals and products to their customers’ fingertips.
    This has fantastic implications for both parties involved, however in orde…READ MORE

    Clare McDonald5,360 pointsBadges:
  • GDS needs to prove it can still transform government after loss of data policy to DCMS

    editorial Blog

    I met Mike Bracken, the first leader of the Government Digital Service (GDS), in 2011, not long after he had started the job, for an off-the-record briefing about his ambitious plans to overhaul IT in Whitehall.

    He asked me which online service I would highlight as an example of best practice and…READ MORE

    Bryan Glick5,795 pointsBadges:
  • Blended security threats require a unified response

    editorial Blog

    The new mantra today is that it is not if your organisation will suffer a security breach, but when. In a recent survey released during Infosec Europe 2013, 93% of large organisations reported that they had been breached in the past year, as did 87% of small organisations. And the report also shows …READ MORE

    fhowarth185 pointsBadges:
  • Did I miss anything?

    editorial Blog

    Don’t be alarmed, I am still alive! After a long absence I’m back after an unofficial hiatus. Past six months have been particular busy and it’s been awhile, but that’s always the risk of writing a blog when you have a full time job, a life and a family. So, I’m back and better than ever, well at le…READ MORE

    dhart170 pointsBadges:
  • Goodnight, and good luck

    editorial Blog

    I’m sad to say that this will be my last post here on Computer Weekly’s Social Enterprise, so I’m afraid I must bid you farewell. I don’t know what’s going to happen here, whether someone else will take over or whether the archives will be preserved in aspic. But I do know that I’m sad to see the …READ MORE

    scharman690 pointsBadges:
  • Phishing for beer

    editorial Blog

    Security researchers have identified several commonly used phishing attack vectors to lure unsuspecting users into a false sense of security, where they inadvertently give away personal information to complete strangers.

    “Vishing” is the use of voicemail to solicit a return call in which a user i…READ MORE

    Cliff Saran9,330 pointsBadges:
  • Are small businesses coming round to the cloud?

    editorial Blog

    The uptake of the cloud among small businesses hasn’t been as strong as some experts originally expected. According to the research from managed services provider Claranet, more medium-sized companies are using cloud services (60%) than smaller businesses (44%).But Matthew Thornington at solar elect…READ MORE

    khall2830 pointsBadges:
  • Borderless blockchain collaboration to change how software is developed

    editorial Blog

    The gaming industry has, despite its roots in technology, so far failed to adopt a collaborative model. But that may be about to change.

    Gamers are known as among the most passionate of the world’s digital communities and more games are being released than ever before. This wealth of releases b…READ MORE

    DeanAnderson10 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: