Archives


Azure Spreads its Wings at Build 2021

Paul Schnackenburg takes an IT view of the developer conference, focusing on two main themes and several releases.

Migrating On-Premises Applications to AWS, Part 1: Overview

Brien Posey outlines the five-step process involved in migrating an application.

Ransomware: What To Do If You Don't Have a Plan

Nothing vaults ransomware into the IT discussion like a $4.4 million payout accompanied by a crippling gas shortage and $7-per-gallon price gouging.

Keeping Track of Your AWS EC2 Instances

Having received surprise bills for forgotten instances, Brien Posey creates a PowerShell Script to display them all, regardless of which region they are in.

Microsoft Azure Blockchain Is Ending Sept. 10

Microsoft is ending its Azure Blockchain Service in September, advising users to migrate to other offerings.

What's the Future of Network Security? Zero Trust, SASE & Automation

Survey polls 500 directors, vice presidents and C-Suite execs involved in IT security for organizations of between 1,001 to 10,000-plus employees.

Getting Started with Blockchain on AWS, Part 2: Access Data, Create Tables/Indexes

After earlier demonstrating how to create a new ledger and then populate the database with sample data, Brien Posey shows how to access that data, and how to create some new tables and indexes.

2.5GbE Networking on Linux

After detailing using 2.5GbE NICs in his home lab on Windows 10, Tom Fenton does the same thing on Linux.

Getting Started with Blockchain on AWS, Part 1: Creating and Configuring a Ledger

Blockchain has rapidly gained popularity because of its ability to store transactions in an immutable format, and Amazon makes it really easy to create your own Blockchain ledger within the AWS console. Brien Posey shows you how it's done.

Azure in a Hybrid World

With hybrid becoming the norm, cloud expert Paul Schnackenburg looks at the different flavors of hybrid Azure and how they compare, in which scenarios you'd use each one and links to learn more.

Capturing HDMI Video Output, Part 3: Sharper Capture Card

For a slightly higher price, Tom Fenton finds a sharper card that he will be using to create content from now on.

2.5GbE Networking: Setup and 1GbE Performance Comparison

Tom Fenton details setting up and using a 2.5GbE NIC and compares its performance to a 1GbE NIC, finding "The cost is the bugaboo in the equation."

ARM in the Datacenter

Tom Fenton highlights some different ARM devices and discusses ways that they have made their way into the datacenter.

Misconfigurations Continue to Plague Cloud Security, New Reports Say

Despite all the publicity, increased guidance from major cloud platforms and others, along with numerous outreach and education attempts, users are still leaving their organizations open to data breaches, attacks or outages.

Study IDs Permissions Risks in Major Cloud Platforms

A new report published by CloudKnox dives into the "cloud permissions gap crisis" on major cloud platforms, identifying risks caused by improper Identity and Access Management (IAM).

VMware Part of New Effort to 'Rearchitect the Internet'

A new effort to "rearchitect the internet" includes major industry players VMware, Dell Technologies and others who will work on a major transformation with a rebuild focused on the edge.

VMware Points Carbon Black Security to Containers, Kubernetes

VMware is expanding its Carbon Black Cloud Workload security offering to include containers and Kubernetes, from development through production.

'State of the Edge 2021' Report Predicts Big Growth Driven by Open Source

The "State of the Edge 2021" report from umbrella organization LF Edge predicts huge growth for edge computing, driven by open source initiatives -- and, in some cases, COVID-19.

Code Defect Crashed Azure Cloud Services

Apparently even the best programmers make mistakes. Microsoft this week attributed an April 1 Azure cloud services crash to a code defect.

Windows Server 2022 Is Coming!

The big theme of Windows Server 2022 is security -- primarily bringing the concept of Secure Core from Windows client to the server world with Secure Core Servers.