As "Big Tech" comes under increasing scrutiny by lawmakers, yesterday's AWS outage sparked a backlash about the dangers of cloud computing.
After earlier detailing needed planning, Brien goes to the next step: an in-place upgrade of the Windows Server OS as it relates to AWS EC2.
One of the non-executive IT positions paying off the most in 2022 will be network/cloud architect, indicates a new salary guide that also highly ranks cybersecurity and data privacy positions in the age of ransomware and other attacks.
See what four features piqued Tom's interest in the new Extended Service Branch (ESB) Maintenance Release.
In demonstrating some monitoring software, Tom needed to replicate a slow network that was being used in a VDI environment. Here's how he did it.
Misconfigured and exposed cloud storage buckets are a well-known cybersecurity vulnerability, but new research sheds light on less-publicized exposed service attacks, thanks to a network of honeypots that attracted the threat actors.
Brien demonstrates the process of upgrading AWS EC2 instances running Windows Server 2012 R2 to newer OSes.
Paul details his personal, totally subjective highlights of the recent conference, which he found to be more substantial than some predecessors.
- By Paul Schnackenburg
"Because of the global pandemic, technology leaders surveyed said in 2021 they accelerated adoption of cloud computing (60 percent), AI and machine learning (51 percent), and 5G (46 percent), among others."
After previously installing Linux on VMs in three systems, Tom installs the VMware Horizon native client on them to see how they perform.
As hybrid home/office workplace schemes become the new normal, more organizations are replacing the traditional VPN approach with Zero Trust architectures and remote desktop tech, a new survey indicates.
A ransomware consultant remembers a particular Monday morning: 'And so we actually got to watch our infrastructure start disappearing in front of our very own eyes.'
Tom shows how to install Ubuntu 20.04 on a wide range of systems, install the Horizon native client and use the systems to connect to remote desktops.
While it would be a bad idea to host a mission-critical workload on spot instances, they're great for dev/test environments or for workloads that do not have strict SLAs.
Reaffirming that it's good to be the boss, the 2021 edition of the Dice salary report shows pay for cybersecurity analysts has skyrocketed, but top-level executives still make much more money.
Developer-centric research firm SlashData published a quarterly report that illustrates the increasing importance of cloud computing in the development and deployment of games.
After earlier detailing how to use a .bat file to launch the Horizon client to a Horizon desktop and then adding start-up functionality to the taskbar and Start menu, Tom Fenton turns to Linux.
The foundational technology powering new AI coding assistants and other next-gen offerings based on natural language models is going to become an Azure cloud service.
Expressing amazement that SQL injection is STILL a top data security threat, expert Karen Lopez predicted that the longstanding problem will be overtaken by users planting data on open storage buckets like AWS S3 and Azure Data Blob.
The point of AVNM is to give you a centralized way to manage connectivity and security policy, scoped to subscriptions or management groups for your entire Azure estate.
- By Paul Schnackenburg