Bad actors can cause an image of a dog to be classified as a golf cart, for a trivial example, though this has real-world implications for authentication systems, malware and obscenity filters and more.
Paul details where this hidden gem fits, where it doesn't, why you should care and coming improvements.
- By Paul Schnackenburg
- 07/06/2022
New report says metaverse in 2040 could be hype, hope, hell or maybe all three combined.
After introducing the new-and-improved WSLg, Tom takes a closer look at the scheme to run Linux graphics programs on Windows 11 systems.
In gauging the benefits and challenges of cloud-native development, OutSystems found most respondents to a survey don't know that much about the approach, even though analysts predict it will pretty much account for all app development in a few years.
Microsoft is no longer primarily relying on ISV partners to innovate and provide security solutions. Here's an overview of enhanced Defender offerings.
- By Paul Schnackenburg
- 04/25/2022
Lots of organizations are talking about sustainability, but not so many are walking the talk, indicates a new report from Google Cloud.
Threat intelligence specialist Mandiant has noticed ransomware actors have been increasingly attacking virtualization platforms in their efforts to extort organizations for money.
Cloud computing surveys usually reveal that security concerns and lack of in-house skills are top impediments to successful implementations, but a recent poll adds a new top challenge: cost control.
After earlier explaining the basics, Brien shows how to create a really simple subscription and how to publish a message.
Tom points out a key factor that can make VDI a success and talks about one of the reasons it failed in the early days.
The Cost Anomaly Detection tool goes beyond budget alerts to lower costs.
Tom takes a look at Desktop-as-a-Service (DaaS) and hybrid infrastructure.
Amazon's message delivery service can be used to send SMS text messages and email messages, among many other things.
Tom explains how HCI works with VDI.
Now tackling one of the most heated debates in the IT industry -- certifications -- is Paul Schnackenburg, who has a bunch of them along with the requisite hands-on experience.
- By Paul Schnackenburg
- 03/31/2022
Tom looks at ways to offload UC processes from datacenter CPUs to VDI clients, monitoring remote assets and the benefits of using SD-WAN.
In choosing a cybersecurity incident response service, organizations should look for vendors with a long-tail approach to helping the victim in "rebuilding trust" by restoring brand and reputation, says a new research report.
With the basics out of the way, Tom looks at some VDI techniques to increase performance and decrease costs.
Survey after survey in the IT industry point to one common pain point: finding cloud computing, cybersecurity and other tech talent to fulfill enterprise initiatives. It was bad before the wave of pandemic-spurred job-quitting and apparently has only gotten worse. And that's during a time of increasing ransomware and other cybersecurity attacks.