Has virtualization killed tape?
But tape still has some serious advantages to disk storage systems. For one, the cost per Terabyte is relatively low, and it is very portable. Linear write and read streams also perform quite well for current tape systems. But, my preference is for disk systems. I have horror stories from tape; in fact, I have five stories that are all quite entertaining as to why I hate tape. Find me in a pub sometime, I’ll tell you the stories; they’re worth the listen.
PayPal to let Australians use their digital wallets in real-world cafes
"We realised about a year ago with that digital wallet, for it to truly be essential to consumers lives, we need to give them access to it in their everyday life," he said. "When you're getting your morning coffee or buying your groceries or getting a sandwich for lunch, PayPal was not relevant in consumers' lives a year ago. "And now we're starting to innovate at the retail point of sale."
Surviving the coming datacenter apocalypse
So what kind of IT professions are the most valuable in a Cloud-centric world? Any job that deals with architecting, implementing and managing cloud stacks and the virtual infrastructure that sits beneath it, whether they are on-prem, hybrid or totally off-prem. Cloud security and cloud storage experts. SaaS transition/software migration types of folks who understand how to move a legacy system with complex multi-tier apps to a hybrid or off-prem model.
3 Toxic Employees You Need to Fire Now
"You can have someone who is a very good technical performer but that makes other people in the office go home crying," Benoit says. "If you have people who are interfering with the performance of others, you need to consider letting them go." It's a good idea to consult legal counsel before you terminate someone for their behavior to ensure you've protected yourself. But, in her experience, Benoit says these three types of employees usually just have to go.
Sencha Space HTML5 App Management Platform Launches
"This is an interesting development and a sign of the coming together of various mobile software and services markets," Al Hilwa, an analyst with IDC, told eWEEK. "As organizations embrace mobile applications, they are increasingly looking at simplifying their vendor portfolios and will consider offerings from their existing technology providers in adjacent markets. Sencha's reputation in HTML5 tools and frameworks will give this offering good visibility with existing Sencha customers."
Java 7 vulnerability opens door to 10-year-old attack
According to Gowdiak, the vulnerability is located in the Reflection API (application programming interface), a feature that was introduced in Java 7 and which has been the source of many critical Java vulnerabilities so far. Security Explorations confirmed that its PoC exploit code works against Java SE 7 Update 25 and earlier versions, he said.
Smart mobile strategies curb wasteful IT spending
"Oddly enough, I've seen more companies not spending money on mobile efforts because they don't know where to start," Jack Gold added. "However, once they start, it's really easy to lose budgets to disposable spending because there was no plan in place." Further, the shift to mobile computing gives IT departments the chance to become a strategic partner with the business side of the company after years of having the not-so-fun task of keeping the lights on.
DDoS attacks getting bigger, stronger and longer
"This quarter we logged increases for all major DDoS attack metrics, and some have been significant. DDoS attacks are getting bigger, stronger and longer," said Stuart Scholly, president at Prolexic. "We believe this growth is being fuelled by the increasing prevalence of compromised Joomla and WordPress web servers in increasingly large botnets."
CIOs Must Lead Outside of IT
Most CIOs find it relatively easy to convince an executive team to invest in a technology that increases near-term revenue. They find it considerably harder to ask their colleagues to invest in a major infrastructure upgrade that will take 12 months or more before delivering direct business benefit. But all CIOs need to find a way to convince their peers that without these infrastructure investments, they will be mortgaging their company's future.
What Happens When we Die: Estate Planning of Digital Assets
When administering digital assets for a decedent‘s estate, there are eight steps that experts recommend fiduciaries take. In addition to these eight steps, a fiduciary should also take care to adhere to common practices required by law when dealing with digital assets. By following such steps, a fiduciary can begin to decrease the amount of hardship and stress associated with digital estate planning.
Quote for the day:
"The true sign of intelligence is not knowledge but imagination." -- Albert Einstein,
But tape still has some serious advantages to disk storage systems. For one, the cost per Terabyte is relatively low, and it is very portable. Linear write and read streams also perform quite well for current tape systems. But, my preference is for disk systems. I have horror stories from tape; in fact, I have five stories that are all quite entertaining as to why I hate tape. Find me in a pub sometime, I’ll tell you the stories; they’re worth the listen.
PayPal to let Australians use their digital wallets in real-world cafes
"We realised about a year ago with that digital wallet, for it to truly be essential to consumers lives, we need to give them access to it in their everyday life," he said. "When you're getting your morning coffee or buying your groceries or getting a sandwich for lunch, PayPal was not relevant in consumers' lives a year ago. "And now we're starting to innovate at the retail point of sale."
Surviving the coming datacenter apocalypse
So what kind of IT professions are the most valuable in a Cloud-centric world? Any job that deals with architecting, implementing and managing cloud stacks and the virtual infrastructure that sits beneath it, whether they are on-prem, hybrid or totally off-prem. Cloud security and cloud storage experts. SaaS transition/software migration types of folks who understand how to move a legacy system with complex multi-tier apps to a hybrid or off-prem model.
3 Toxic Employees You Need to Fire Now
"You can have someone who is a very good technical performer but that makes other people in the office go home crying," Benoit says. "If you have people who are interfering with the performance of others, you need to consider letting them go." It's a good idea to consult legal counsel before you terminate someone for their behavior to ensure you've protected yourself. But, in her experience, Benoit says these three types of employees usually just have to go.
Sencha Space HTML5 App Management Platform Launches
"This is an interesting development and a sign of the coming together of various mobile software and services markets," Al Hilwa, an analyst with IDC, told eWEEK. "As organizations embrace mobile applications, they are increasingly looking at simplifying their vendor portfolios and will consider offerings from their existing technology providers in adjacent markets. Sencha's reputation in HTML5 tools and frameworks will give this offering good visibility with existing Sencha customers."
Java 7 vulnerability opens door to 10-year-old attack
According to Gowdiak, the vulnerability is located in the Reflection API (application programming interface), a feature that was introduced in Java 7 and which has been the source of many critical Java vulnerabilities so far. Security Explorations confirmed that its PoC exploit code works against Java SE 7 Update 25 and earlier versions, he said.
Smart mobile strategies curb wasteful IT spending
"Oddly enough, I've seen more companies not spending money on mobile efforts because they don't know where to start," Jack Gold added. "However, once they start, it's really easy to lose budgets to disposable spending because there was no plan in place." Further, the shift to mobile computing gives IT departments the chance to become a strategic partner with the business side of the company after years of having the not-so-fun task of keeping the lights on.
DDoS attacks getting bigger, stronger and longer
"This quarter we logged increases for all major DDoS attack metrics, and some have been significant. DDoS attacks are getting bigger, stronger and longer," said Stuart Scholly, president at Prolexic. "We believe this growth is being fuelled by the increasing prevalence of compromised Joomla and WordPress web servers in increasingly large botnets."
CIOs Must Lead Outside of IT
Most CIOs find it relatively easy to convince an executive team to invest in a technology that increases near-term revenue. They find it considerably harder to ask their colleagues to invest in a major infrastructure upgrade that will take 12 months or more before delivering direct business benefit. But all CIOs need to find a way to convince their peers that without these infrastructure investments, they will be mortgaging their company's future.
What Happens When we Die: Estate Planning of Digital Assets
When administering digital assets for a decedent‘s estate, there are eight steps that experts recommend fiduciaries take. In addition to these eight steps, a fiduciary should also take care to adhere to common practices required by law when dealing with digital assets. By following such steps, a fiduciary can begin to decrease the amount of hardship and stress associated with digital estate planning.
Quote for the day:
"The true sign of intelligence is not knowledge but imagination." -- Albert Einstein,
No comments:
Post a Comment