Search Results | Virtualization
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...460 NEXT
Sort by:  Most Relevant  |  Date
Use network tools to improve IoT analytics with data flow

Blog  We all know that IoT is taking place in modern applications for industries. IoT technology is developing quickly, making analytics crucial to ensure security. IoT analytics operates using the cloud and electronic instrumentation, which requires programmers to control and access IoT data. IT pros ap...

Last updated: Oct 21, 2019   6:13 PM GMT  |  Blog: IoT Agenda   |      Internet of Things, iot, IoT analytics
Edge Computing: Are We Back To Square One? #EdgeComputing

Blog  Around four decades ago we didn't have networking. There were standalone personal computers like one each in HR, purchase, finance, and so on. There were no laptops, no mobility. If finance needs some data from the PC in the HR, it had to move with the help of floppy disks. Individual computers, ind...

Last updated: Oct 21, 2019   4:56 PM GMT  |  Blog: Quality Assurance and Project Management   |      Edge computing
Multiple ISO Mount Strategies Prove Helpful

Blog  On Friday, MS went through the unusual step of releasing two versions of the lastest Fast Ring Insider Preview. At first, an initial version 19002.1 proved likely to cause restart issues. Later that day, MS issued 19002.1002 to correct same. Through sheer dint of struggle, I managed to get both of m...

Last updated: Oct 21, 2019   2:41 PM GMT  |  Blog: Windows Enterprise Desktop   |      Troubleshooting, USB drive, USB-C
5G trials to spice up hotpot experience, improve last-mile connectivity

Blog  Singapore telco M1 is planning a 5G trial at the latest outlet of Haidilao, a well-known hotpot restaurant in the city-state, in a bid to demonstrate the use of 5G networks in the food and beverage (F&B) sector. The two companies said they will be equipping the new Haidilao Hot Pot restaurant a...

Last updated: Oct 18, 2019   8:54 AM GMT  |  Blog: Eyes on APAC
What to expect from Tanium CONVERGE 2019

Blog  The Computer Weekly Developer Network team are big fans of robust data management, younger-breed tech mavericks who want to carve a new niche in the crowded information intelligence market, Southern barbeque with lots of hot sauce and, of course, every good Country Music start from Johnny Cash to...

Last updated: Oct 14, 2019   10:40 PM GMT  |  Blog: CW Developer Network
No Windows 10 Sandbox Activation

Blog  I've been fooling around with the built-in Windows 10 Sandbox lately. It is indeed a useful tool for trying out unknown or potentially risky software, trial configurations, and so forth. Just for grins, however, I tried to activate the Windows 10 Enterprise license in my Sandbox. And that's how I le...

Last updated: Oct 11, 2019   4:34 PM GMT  |  Blog: Windows Enterprise Desktop   |      built-in security, Sandboxing, Windows 10
From Russia with OLAP: Percona uses ClickHouse analytics

Blog  In our voyages from software conference to software conference, we technology journalists often find stories that are developing and worth sharing. At Percona Live Europe last week, one such example came up around the open source scene that is developing in Russia and how one of the projects that i...

Last updated: Oct 10, 2019   12:58 AM GMT  |  Blog: Open Source Insider
The Samsung Digital Discovery Centre has been relaunched at the British Museum

Blog  Ten years after it was first introduced, the Samsung Digital Discovery Centre has been relaunched at the British Museum after an update to install new technology and create new digital experiences for visitors. Alongside the updated room, the British Museum and Samsung have launched a new learning ...

Last updated: Oct 9, 2019   5:58 PM GMT  |  Blog: ITWorks   |      digital, Education, history
Emerging IoT attack surfaces present attackers with tempting new targets

Blog  This is the first in a two-part series. The meteoric rise of IoT has created a popular new attack surface for cybercriminals. The "2019 Sonic Wall Cyber Threat Report" indicated that there were 32.7 million cyberattacks targeting IoT devices in 2018, representing a 217.5% increase over attacks 201...

Last updated: Oct 8, 2019   7:40 PM GMT  |  Blog: IoT Agenda   |      Cyber, Cyber security, Cyberattacks
Six Tips to Save Time on Marketing

Blog  As a marketer, you need to stay focused because you are usually faced with many distractions. For example, social media is an effective marketing tool but can also take up all your time. By optimizing your workflow, focusing on tasks that have the most impact and using the right tools, you will be ...

Last updated: Oct 7, 2019   3:43 PM GMT  |  Blog: SAS 70
What developers need to know about an Alexa vulnerability

Blog  A security vulnerability was discovered in July 2019 that showed Amazons cloud servers contained voice recordings of Alexa interactions from customers. Furthermore, improper handling of records retained by Amazon, along with this Alexa vulnerability, could expose users' private data to a potentia...

Last updated: Oct 3, 2019   5:19 PM GMT  |  Blog: Coffee Talk: Java, News, Stories and Opinions
How to Improve and Lower the Cost of Distributed Enterprise Edge Data Management and Security

Blog  The distributed enterprise model continues to grow exponentially driven by both strategic plannings, as well as by default. That is, more and more organizations consist of a centralized headquarters datacenter with in-house IT expertise, together with remote sites, smaller footprint sites where user...

Last updated: Oct 3, 2019   6:02 AM GMT  |  Blog: Quality Assurance and Project Management   |      Distributed applications, Distributed computing, Distributed storage
Forensic analysis helps close gaps in hypervisor vulnerabilities

Blog  In June 2019, the National Institute of Standards and Technology (NIST) published its draft of NISTIR 8221, "A Methodology for Enabling Forensic Analysis Using Hypervisor Vulnerabilities Data." The report provides guidance on how to use forensic analysis to detect, reconstruct and prevent attacks b...

Last updated: Oct 1, 2019   1:22 PM GMT  |  Blog: Coffee Talk: Java, News, Stories and Opinions
Forsa For Developers With Optane by @FormulusBlack @packethost

Blog  Forsa is a memory-based storage and virtualization system that has been created by Formulus Black. The solution is powered by latest in memory that is Intel's Optane DC persistent memory. All this runs on the Packet's cloud platform. That means the three giants in their respective fields Intel, Form...

Last updated: Sep 30, 2019   5:03 PM GMT  |  Blog: Quality Assurance and Project Management   |      DRAM, Intel
How to fix the Eclipse 'No Java virtual machine was found' install error

Blog  <tl;dr> To fix the Eclipse "No Java virtual machine was found" error, simply edit the eclipse-inst.ini file and add the -vm flag, which points it to the java utility in the JDK bin directory: -vm/opt/jdk-13/bin/java </tl;dr> Nothing saps a developer's enthusiasm to learn a new langua...

Last updated: Sep 29, 2019   8:31 PM GMT  |  Blog: Coffee Talk: Java, News, Stories and Opinions
5 Reasons Why You Should Consider SaaS for Your Business

Blog   Nowadays, it is required to have 24/7, secure access to business applications from wherever you are; and thats why more and more businessesare turning to the cloud. Its no wonder that traditional companies that run on-premise systems are struggling to stay on the market. In order to sur...

Last updated: Sep 28, 2019   1:12 AM GMT  |  Blog: SAS 70
Getting cloud under control: A how-to guide for CIOs

Blog  In this guest post, Dave Locke, chief technology advisor for Europe, Middle East and Africa, at IT service provider World Wide Technology, sets out why organisations need a clear, consistent and easy-to-follow strategy to keep their cloud plans in check. In August 2006, Googles then-CEO Eric Sch...

Last updated: Sep 26, 2019   1:44 PM GMT  |  Blog: Ahead in the Clouds
Alexa takes the L

Blog  Amazon has revealed it will soon be introducing an option for users to change its Alexa virtual assistants voice to that of self-appointed Kangol ambassador Samuel L Jackson. The announcement comes hot on the heels of a Channel 4 report that claims parents are now using Alexa to read their childr...

Last updated: Sep 26, 2019   12:00 AM GMT  |  Blog: Downtime
Software-Defined Interconnect Platform Luxon @Stateless_Inc

Blog  Think of a Software-Defined Interconnect Platform that has infinite interconnection service chains. What that means is that the new interconnects are easily created using any of the available combinations of security services, routing, data encryption, and so on. What if it has Increased connectivit...

Last updated: Sep 24, 2019   5:44 PM GMT  |  Blog: Quality Assurance and Project Management   |      Interconnect
With unicorn status, Acronis funding to aid acquisitions, R&D

Blog  There's a new unicorn in town. Cyber protection provider Acronis today closed a $147 million funding round, led by Goldman Sachs, at a valuation of more than $1 billion. Founder and CEO Serguei Beloussov said the Acronis funding will help the company complete acquisitions and enhance its research ...

Last updated: Sep 19, 2019   3:21 AM GMT  |  Blog: Storage Soup
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...460 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: