Trending Articles

Trending Sources

Local Administrators Automated Reporting Tool

Mick's IT Blog

Back in November 2016, I posted the blog entry on reporting local administrators on machines. That script is deployed to machines via an SCCM package that reports the local administrators back to SCCM to be able to be queried into a report.

Tools 105

How Cybersecurity Benefits from Hackers


Carol M. Evenson. With the number of cyber crimes climbing every day, and the costs of each cyberattack higher than the last, the word “hacker” has come to carry a very negative connotation. Business owners who are afraid of litigation cringe when they hear the word.

Blockchain Business Innovation

Cloud Musings

Is there more than bitcoin to blockchain ? Absolutely, because today’s blockchain is opening up a path towards the delivery of trusted online services. To understand this statement, you need to see blockchain as more that it’s more famous bitcoin use case.

DevOps Has Reached “Escape Velocity”, CIO’s Need To Get Onboard!

Forrester IT

In an era where velocity and agility are driving technology management organizations over simple cost reduction, every business must constantly evolve to drive business differentiation.

More Trending

LinkedIn’s Data Center Standard Aims to Do What OCP Hasn’t Done

Data Center Knowledge

Open19 aims to make new breed of data center hardware easy to source for smaller IT shops Read More. Cloud Design Featured Hardware LinkedIn

IBM to retire Emptoris and work with SAP Ariba on next generation digital procurement

Forrester IT

SAP Ariba & IBM today announced a partnership that had been a rumour for a few days now. Part of the deal includes IBM gradually retiring Emptoris and encouraging its customers to migrate to SAP Ariba. link]. It's an ambitious move by SAP Ariba. IBM Emptoris's leadership had an exciting vision of next gen digital procurement but decided they couldn't deliver it without a cost prohibitive replatforming of its various products.

SAP 30

EternalRocks network worm uses 7 NSA hacking tools

Network World

While you won’t be forgetting the WannaCry ransomware attack, it is likely you will be hearing a lot more about the alleged NSA-linked EternalBlue exploit and DoublePulsar backdoor as it seems a wide range of bad guys have them in their toyboxes. At least one person is leveraging seven leaked NSA hacking tools for a new EternalRocks network worm.

SMB 27

Docker ready for the big time

IT Toolbox

Recently at DockerCon17, IBM announced that it will deploy Docker Enterprise Edition across all its Linux-based systems, including Linux on IBM z Systems, LinuxONE, as well as Power Systems. This will enable IBM to deliver on its goal of moving the app to the data rather than the data to the app

IBM 24

10 Tips to Keep Hackers Out of Your Smart Home


Jeremy Sutter. As technology continues to make life more convenient for users, it is making the lives of thieves easier as well. Owners of smart homes are under constant threat of electronic theft and violation. The even scarier part is that sometimes you can't even tell when you have been hacked. A smart door can be remotely unlocked and show no sign of forced entry into your home. Months could go by before you notice that your expensive jewelry is missing.

DCK Investor Edge: CyrusOne — Catch Me If You Can

Data Center Knowledge

Low cost and short delivery time give the REIT an edge over competition when closing cloud giants Read More. Business Colocation CyrusOne Design Featured Investing Power and Cooling

Cloud 32

Prepare for Increasing Frequency of “Nation-State” Cyberattacks with Strategy, not Technology

Forrester IT

Let me pose a question: "Is it a bad thing to give the average person a hand grenade with the pin pulled?" I think most of us would respond to that question with an emphatic "YES!" No one in their right mind would think it's a good idea in any possible reality to allow anyone without extensive military or professional training to access an explosive--especially not one that is live and has no safety device in use.

Sixth-grader weaponizes smart teddy bear, hacks security audience's Bluetooth

Network World

If yet another cybersecurity expert wanted to warn the general public about the risks associated with the Internet of Things (IoT), it is likely the warning would go in one ear and out the other. But when a sixth-grader hacks an audience of security experts and “weaponizes” his smart teddy bear, it might just snag the attention of parents who have disregarded warnings about the dangers and bought internet-connected toys for their kids anyway.

IDG Contributor Network: Amazon successfully fights off pricebots

ComputerWorld IT Management

One big downside of the plethora of e-commerce shopping bots out there today is that they create the impression of a difference when there may not be one. If I may give my two cents’ worth, is a two-cent difference meaningful, especially when shipping prices are far more than that? Significant difference or not, shoppers love them. And even more importantly, they act on them. When a bot lists a product and shows 20 different sites, the ranking by lowest price is almost always selected.

Latest CTOvision Assessments on Cloud Computing, Artificial Intelligence, Mobility, Big Data, Robotics, Internet of Things and Cybersecurity


Bob Gourley. One of the enjoyable things about estimating the future is there is always a new consideration. It is a dynamic task that is never done. This is especially true in analyzing the future of enterprise technology, where things are always moving fast. We try to find balance in tracking the future of technology by focusing on the metatrends, those very powerful forces that sweep over us all (whether we want them to or not).

Report: AI Tells AWS How Many Servers to Buy and When

Data Center Knowledge

Amazon’s cloud CEO Jassy says company uses Machine Learning for data center capacity planning Read More. Amazon Cloud Featured Machine Learning Manage

Product Development Must Evolve for the Internet of Things

Forrester IT

Traditional physical products and machinery are steadily being replaced by connected products and assets that shift business models and augment customer relationships with digital experiences and data. But creation of these products is a major challenge for traditional product companies.

Agile 29

Outsourcing security: Would you turn over the keys to a third party?

Network World

Years ago it would have been unthinkable to give up control to securing your most valuable assets. But for some companies the risk of handing the security keys to a third party is less than the idea of facing the daily barrage of attacks. When asked why a company would cede control, many vendors said it depends on the level of staffing that company has. If the expertise is lacking, why take the chance.

McAfee researchers test WannaCry recovery method

Computer Weekly

Although there is evidence that some victims of the WannaCry ransomware attack on 12 May have paid the attackers, there is no evidence that they are getting their data back

Pending Reboot Reporting with Orchestrator

Mick's IT Blog

As we are implementing the ADR in SCCM for servers, we want to know if systems are pending a reboot without having to log into every server. Thankfully, Kent Agerlund , formulated and posted this awesome solution for tracking pending reboots using a compliance rule and baseline in SCCM.

Microsoft: Government Should Regulate IoT Security

Data Center Knowledge

Azure IoT engineering head says bar is low in IoT security, and government should get involved Read More. Business Cloud Featured Internet of Things Microsoft Regulation Security

Enterprise Security and Functionality Benefits of the new Software Defined Perimeter (SDP) Approach


Bob Gourley. The dynamic nature of today’s IT Operations has eroded the network perimeter in ways we have all been watching and even cheering on! This is a new world of mobility, cloud computing and rapid partnering for success. But the erosion of the network perimeter is making traditional security a roadblock to efficiency. No one wants to allow holes to be poked in the security system but no one wants to shut down connectivity to partners either.

IDG Contributor Network: Are VMs more secure than containers?

Network World

We often say, “HTTPS is secure,” or “HTTP is not secure.” But what we mean is that “HTTPS is hard to snoop and makes man-in-the-middle attacks difficult” or “my grandmother has no trouble snooping HTTP.” Nevertheless, HTTPS has been hacked, and under some circumstances, HTTP is secure enough. Furthermore, if I discover an exploitable defect in a common implementation supporting HTTPS (think OpenSSL and Heartbleed ), HTTPS can become a hacking gateway until the implementation is corrected.

5 Must Have PC Peripherals That Will Improve the Quality of Your Life

IT Toolbox

If you were wondering which upgrade or add-on to get for your PC, you are at the right place. Here are 5 must have PC peripherals that will completely change how you perceive and use your computer


Good news: CIOs have stopped fighting the cloud

David Linthicum

I call them the “folded-arm gang”: those CIOs who invite the “cloud guy” into a meeting and then push back on everything you say and do so for no good technical reason. It’s frustrating. But things are changing. CIOs who once pushed back on cloud computing have either changed their minds or have been fired. Either reason is fine with me. [ The cloud storage security gap—and how to close it. | The InfoWorld Deep Dive: How to make document sharing really work in Office 365. ].

Study 23

Facebook’s Data Center Powerhouse Spawns another Startup

Data Center Knowledge

RStor believes “network is storage.” Read More. Business Facebook Featured Startups

Agile unlocked: Pivotal uses paired programming and PaaS to bolster cloud app development

Computer Weekly

Digital transformation consultancy Pivotal explains how paired programming, an empathetic work culture and open source PaaS help enterprises achieve their agile software development goals

Cisco: Secure IoT networks, not the devices

Network World

With networking pros unable to trust the security of Internet of Things devices, Cisco says they should focus on implementing network-based security protections that limit the blast radius of IoT security breaches. This week Cisco unveiled a new package named IoT Threat Defense at the company’s IoT World Forum in London.

Top 5 Best Google Chrome Extensions Every User Should Know

IT Toolbox

Which is the web browser are you using? There are several popular browsers that we recommend using, such as Google Chrome, Mozilla Firefox, Microsoft Edge, or Opera