Trending Articles

Trending Sources

5 New Tech Inventions


Michael Johnson. This video has five parts, which are overviews of really cool technologies.

3D 67

Watson Crowdsources Cloud Computing

Cloud Musings

Recently I've been doing quite a bit of analysis work using the IBM Watson cognitive business platform. Microsoft was a poor second at 17 %.

Media 72

A Flicker Of Light: A new security stack points the path to safety


Junaid Islam. The last few years have been a difficult time for those who protect data. If anything fails, an alarm is generated!

DevOps and the Mainframe, A perfect match?

Forrester IT

Did someone forget to tell the mainframe it was irrelevant? For many years, the much lauded death of the mainframe has been espoused by many pundits. For instance, the mainframe is leveraged by 92 of the top 100 banks worldwide, 23 of the top 25 US retailers, all 10 of the world's 10 largest insurers, and 23 of the world's 25 largest airlines. [i].

VMware and AWS -- Harder Than It Looks

Chuck's Blog - EMC

My corner of the internet broke for a while as a result. Before spent a few days thinking about it from various angles. vCloud Director.  

More Trending

Just Exactly How Do You Get Started With Big Data?

The Accidental Successful CIO

Big data is powerful, but how does one get started using it? Image Credit: Ron Mader. Right now, “big data” is one such buzz word.

Loose Lips Sink M&A Ships

Forrester IT

Companies look for merger & acquisitions opportunities to boost their growth. But when confidential information gets exposed, it throws a monkeywrench into their confidential assessments, strategies and negotiations. Recent news proves this once again. Once again - while documents drive deals, vanilla email muddies the waters. collaboration.

What Business Users Should Do To Mitigate DDoS Threats


Bob Gourley. Businesses have long known of the threats of DDoS to their operation, and the security community has been watching this threat evolve to the point where we all need to take collective action to prevent attack. Businesses of every size need to know what devices you have and what you have them for. We recommend Verisign's DNS Firewall.

Hackers Take Down Sites From New York to LA in Web-Host Siege

Data Center Knowledge

Hackers hammered servers along the US East Coast with phony traffic until they crashed, then moved westward. Read More. Downtime Hosting Internet of Things Peering Security

Chinese firm admits its hacked products were behind Friday's massive DDOS attack

Network World

A Chinese electronics component manufacturer says its products inadvertently played a role in a massive cyberattack that disrupted major internet sites in the U.S. on Friday. To read this article in full or to leave a comment, please click here

Switching clouds: What Spotify learned when it swapped AWS for Google's cloud

Tech Republic Cloud

Spotify reveals how it fared when replacing Amazon's cloud storage with Google's and shares the gotchas to watch out for

Clueless CIO cloud confusion continues

ComputerWorld IT Management

You have got to be kidding me. At the Gartner Symposium/ITxpo , the research company’s annual enterprise IT conference, Gartner vice president David Mitchell Smith said, "In many ways we’re nowhere nearer understanding what cloud is." Oh, come on! To read this article in full or to leave a comment, please click here

Putting a value on your company information


John Mancini. In this age of digital transformation, it is obvious that the information assets of an organization are increasing, but putting a value on something so seemingly intangible isn’t easy – especially as information is fluid and doesn’t behave like other assets. Data is growing at a mind boggling rate. Re-balancing the scales. Big Data

Oracle’s Cloud, Built by Former AWS, Microsoft Engineers, Comes Online

Data Center Knowledge

Hosted initially in three Phoenix-metro data centers, the bare-metal cloud will serve as foundation for future cloud VM and container services.

Media fails to tell consumers about device flaws in Friday’s internet outage

Network World

Hacked cameras, DVRs and other internet-connected consumer devices were conscripted by perpetrators who installed botnet malware, causing last Friday’s internet outages. The national media reported the event, but it failed to tell consumers what they need to know about buying those types of devices.

IBM says it is 3X more expensive to manage PCs than Macs

ComputerWorld Consumerization IT

With Apple set to announce new Macs next week , enterprise users may want to open their wallets to get hold of the new kit, as there’s a big business case that says they should, according to IBM. Up to $535 saving per Mac. To read this article in full or to leave a comment, please click here

Apple 24

Businesses underprepared for GDPR, study shows

Computer Weekly

Lack of consumer and regulatory understanding, combined with low technical and cultural preparedness, represents a major threat to revenue and brand value, according to a Symantec state of privacy report

DDoS Attacks: What Happened And What We Should Do About It


Bob Gourley. The security community has been watching the DDoS threat grow to incredible levels. DDoS attacks are up 75% over last year. Over 30% of attacks reach sustained peaks of over 10 Gbps, an amount that will swamp most every business user. Dyn provides many advanced services to these providers including managing their DNS.

Here are the Top DCIM Software Vendors, According to Gartner

Data Center Knowledge

Three vendors continue to lead; six dropped from Magic Quadrant for failing to meet criteria Read More. DCIM News Management

IDG Contributor Network: 7 steps to proactive security

Network World

Data breaches are increasingly becoming an expensive problem for more and more companies. According to the most recent Ponemon Institute Data Breach report , insecure data cost companies an average of $221 per compromised record in 2016, an increase of 7 percent from the previous year and an all-time high.

IBM Watson's latest gig: Improving cancer treatment with genomic sequencing

Tech Republic Big Data

A new partnership between IBM Watson Health and Quest Diagnostics will combine Watson's cognitive computing with genetic tumor sequencing for more precise, individualized cancer care

IBM 23
IBM 23

Understanding the Partnership Between OMS and System Center Configuration Manager


Could this be the renaissance of server management with ConfigMgr? The problem was that client agent settings were set at the site level at that time.

Why there's no compelling use case for hybrid cloud

Tech Republic Cloud

Don't confuse hybrid infrastructure with hybrid cloud. With no real reason to integrate public and private cloud solutions, hybrid cloud isn't a worthwhile undertaking

Cloud 22
Cloud 22

Creating a Culture of Information Security

Data Center Knowledge

Organizations need to start thinking about information security as an element that enables businesses, facilitating increased competitive advantage that allows them to manage risk and protect all of the dollars that have been spent on creating a brand. This is the first step in securing a business. Industry Perspectives

IoT botnets used in unprecedented DDoS against Dyn DNS; FBI, DHS investigating

Network World

Infected IoT devices turned into botnets, at least some controlled by Mirai, were used in multiple DDoS attacks against New Hampshire-based internet infrastructure company Dyn. The FBI and the Department of Homeland Security are investigating the attack on Dyn, one provider of DNS services.

Private Cloud Adoption Is Alive And Well

Forrester IT

While public cloud's hypergrowth garners a lot of press, we expect opportunities to continue for private cloud solutions. In our recently published Private Cloud Solutions Forecast, 2016 To 2021 ( Global ) we expect the market to grow at a compound annual growth rate (CAGR) of 11.0% over the 2016-to-2021 period. over the forecast period.

Step-By-Step: Installing MySQL on Nano Server via PowerShell


Recently, Pierre Roman was in town presenting 10 Things I like About Windows Server 2016 to the Toronto ITPRO Usergroup. Download

How enterprise software development is changing

Computer Weekly

During Computer Weekly’s 50th anniversary event, we held a panel discussion at Skills Matter in London to look into how enterprise software is changing

Iron Mountain Entering N. Virginia with Massive Data Center Build

Data Center Knowledge

Starts construction of first of four buildings on future Manassas data center campus Read More. Colocation Iron Mountain Washington DC Area

Murphy’s Law: The security version

Network World

Since the first of the month, I’ve heard colleagues and others report each of the 10 security variants to Murphy’s Law listed below. Murphy is not only alive but has been reincarnated.  It’s worth reminding the gentle reader of various famous last words: 1. All documents will be out of date or simply missing Documents will not be maintained.

5 top takeaways from Dell EMC World 2016

Tech Republic Data Center

At the inaugural conference of the newly-joined tech giants, a host of announcements were made around products and services. Here's what you need to know

How auto giants are using big data: A conversation with Ford

Tech Republic Big Data

Businesses large and small are struggling to understand huge influxes of data. In the auto world, autonomous car data is impacting the development of driverless cars. Here's Ford's approach

Dyn DDoS attack: 5 takeaways on what we know and why it matters

Tech Republic Security

On October 21, a Distributed Denial of Service attack on Dyn took many key web properties such as Twitter and Netflix offline. Here are some more details on the attack and the breadth of its impact


Botched Server Install Results in $2.14 Million HIPAA Breach Fine

Data Center Knowledge

Failure to change a default setting on a new server caused private patient information to be publicly accessible over the Internet for an entire year. Read More. Shared