Wed.Aug 16, 2017

Regulation and impact of cyber attacks driving security spending

Computer Weekly

Awareness of the impact of cyber attacks on business and regulation are expected to be the top drivers of continued and increased spending on cyber security, according to research firm Gartner

Equinix: Private Data Exchange is Outpacing Internet’s Growth

Data Center Knowledge

Businesses’ digital transformation expected to result in skyrocketing private interconnection bandwidth Read More. Colocation Equinix

Trending Sources

Huddle in trouble: Did the journey from startup to scaleup cause the UK cloud firm to lose its way?

Computer Weekly

What does the future hold for cloud collaboration firm Huddle, once a darling of the UK tech startup scene but now seemingly in need of a financial bailout

Equinix Makes Big Bet on Fuel Cell-Powered Data Centers

Data Center Knowledge

Strikes deal with utility to deploy Bloom fuel cells at 12 additional US data centers. Read More. Energy Equinix Featured

More Trending

UK workers interested in cyber security, survey shows

Computer Weekly

Many UK workers are interested in cyber security and would consider a career in the field, a survey has revealed, which could help close the skills gap

6 Ways ERP Makes Manufacturing More Profitable

IT Toolbox

To make it in the digital enterprise, manufacturers must push themselves further in innovation and develop a strategy to stay ahead of the competition. This won’t happen instantly, however. If manufacturers haven’t begun thinking beyond a simple enterprise resource planning (ERP) solution with bare-bones features, they may soon be obsolete. Many people realize that ERP solutions streamline

GDPR drives cloud firm’s Cloudian S3 object storage deployment

Computer Weekly

Interoute deployed Cloudian Hyperstore because it believes customers want object storage to help gain compliance with the forthcoming European GDPR regulations

3 Ways Mobile Apps Change VoIP/UC Choices for Businesses

IT Toolbox

Mobile devices have hugely influenced voice over IP (VoIP) and unified communications (UC) over the past few years. As mobile apps for VoIP and UC mature, in many cases they drive the solution that works best for many businesses. With maturity comes tighter and more seamless integration, better security, ease of use, and the incredible convenience benefits of aligning with fast-moving mobile technology.

London Leads in Private Data Center Interconnection Ahead of Brexit

Data Center Knowledge

Network capacity cements firms to UK Read More. Colocation Europe

4 Reasons Why You Shouldn't Always Customize ERP Software

IT Toolbox

Enterprise resource planning (ERP) vendors talk up the benefits of customized software. They say these programs save you cash and protect your business from external threats. But, the truth is, out-of-the-box ERP software often costs less money and provides you with the same security advantages as bespoke tools. Here are four reasons why customized ERP software doesn't always make financial sense.

RBS to cut 880 IT staff in London

Computer Weekly

Royal Bank of Scotland aims to reduce London-based IT workforce by 40

Insuring Your VoIP Network

IT Toolbox

Save $700 Billion with Incident Management-as-a-Service. The latest Digital Global Overview report from We Are Social and Hootsuite notes that there are over five billion unique mobile numbers and some 2.7 billion mobile social users. Over half the world’s population now uses the Internet, and digital communication and connectivity is changing the way

US Ruling Creates A Privacy Nightmare For US Cloud Providers Overseas

Forrester IT

On August 14th, Judge Richard Seeborg of the U.S. District Court for the Northern District of California upheld a ruling requiring Google to turn over Gmail data stored overseas. The ruling seems to be in conflict with a U.S. Court of Appeals ruling in Microsoft v. United States where the court ruled that Microsoft does […]. privacy security & risk GDRP public cloud Security & Risk

NotPetya attack cost up to $300m, says Maersk

Computer Weekly

Danish shipping line Maersk estimates that the NotPetya cyber attack in June cost the company up to $300m

Madtech Convergence Is Ongoing – With Or Without You

Forrester IT

For marketers, the struggle is real: you want to provide your customers and prospects cohesive cross-channel experiences that demonstrate you actually know them (without freaking them out) — all while reducing the number of vendors in your tech stack. There are positive signs with the marketing technology ecosystem rapidly consolidating — and millions of dollars […].

Hackers hit Holyrood with Westminster-style brute-force attack

Computer Weekly

The Scottish parliament has been hit by a cyber attack similar to the one that struck Westminster in June


Swagger Becomes OAS3

IT Toolbox

The OpenAPI Specification v3 (OAS3) has now become official. As with many things in the industry though, I am sure that people will continue to refer to it as swagger just because we have called it that for so many years now. But this is a much welcome change and update to the specification. APIs have continued to grow in popularity, and with it, the need to document and specify the operations of

Female students less likely than male students to consider tech roles

Computer Weekly

Research by KPMG finds many female students have never considered applying for a graduate tech role, and male students are more confident in their tech skills

Going high tech with IBM Cloud at Atlanta's new Mercedes-Benz stadium

Tech Republic Data Center

The newest professional sports stadium opens next week in Atlanta, and it's filled with new tech to improve the fan experience as a result of the team's partnership with IBM

ClickMechanic uses GitHub to streamline coding to production

Computer Weekly

Digital service that connects car mechanics and garages to customers sees GitHub as a core part of its coding lifecycle


How to prevent phishing attacks in Microsoft Outlook and Office 365: 3 methods

Tech Republic Security

Phishing attacks are a major source of worry for businesses. Here are a few tips on keeping malicious messages out of your users' inboxes and minimizing the risk when they make it there

Fiat joins BMW's autonomous car platform initiative

Computer Weekly

Car makers Fiat and BMW are working in collaboration with Intel and Mobileye to develop a scalable platform for self-driving vehicles

Intel 21

Warning: These 8 Google Chrome extensions have been hijacked by a hacker

Tech Republic Security

Proofpoint research has found that certain Chrome extensions have been taken over in order to spread malicious ads and steal money from users

IBM CEO Says Trump Advisory Forum Could No Longer Serve Purpose

Data Center Knowledge

Rometty’s memo followed executive exodus from corporate panel; ‘IBM will continue to work with all parts of the government’ Read More. Business IBM

Cybersecurity IT pros vs. policy wonks: How to bridge the communication gap

Tech Republic Security

IT pros and policymakers focusing on cybersecurity often don't speak the same language and seem to be at odds with each other. Discover how these cybersecurity experts can find common ground

Choose Your Own Adventure: Data Center World Workshops

Data Center Knowledge

Which workshops would you like to see at the next Data Center World? Cast your vote now. Read More. Data Center World

US Sec. Mattis pushes military AI, experts warn of hijacked 'killer robots'

Tech Republic Security

AI has the potential to revolutionize warfare, but its growth in the private sector far outpaces that of the government, according to a recent Harvard report

PowerShell Basics: Azure AD Management Commands


Now that we’ve covered the basics in my previous post, Step-By-Step: Intro to Managing Azure AD via PowerShell , we’ll take a look at the commands available to further manage you Azure AD deployment.