Survey polls 500 directors, vice presidents and C-Suite execs involved in IT security for organizations of between 1,001 to 10,000-plus employees.
After earlier demonstrating how to create a new ledger and then populate the database with sample data, Brien Posey shows how to access that data, and how to create some new tables and indexes.
After detailing using 2.5GbE NICs in his home lab on Windows 10, Tom Fenton does the same thing on Linux.
Blockchain has rapidly gained popularity because of its ability to store transactions in an immutable format, and Amazon makes it really easy to create your own Blockchain ledger within the AWS console. Brien Posey shows you how it's done.
With hybrid becoming the norm, cloud expert Paul Schnackenburg looks at the different flavors of hybrid Azure and how they compare, in which scenarios you'd use each one and links to learn more.
- By Paul Schnackenburg
For a slightly higher price, Tom Fenton finds a sharper card that he will be using to create content from now on.
Tom Fenton details setting up and using a 2.5GbE NIC and compares its performance to a 1GbE NIC, finding "The cost is the bugaboo in the equation."
Tom Fenton highlights some different ARM devices and discusses ways that they have made their way into the datacenter.
Despite all the publicity, increased guidance from major cloud platforms and others, along with numerous outreach and education attempts, users are still leaving their organizations open to data breaches, attacks or outages.
A new report published by CloudKnox dives into the "cloud permissions gap crisis" on major cloud platforms, identifying risks caused by improper Identity and Access Management (IAM).
A new effort to "rearchitect the internet" includes major industry players VMware, Dell Technologies and others who will work on a major transformation with a rebuild focused on the edge.
VMware is expanding its Carbon Black Cloud Workload security offering to include containers and Kubernetes, from development through production.
The "State of the Edge 2021" report from umbrella organization LF Edge predicts huge growth for edge computing, driven by open source initiatives -- and, in some cases, COVID-19.
Apparently even the best programmers make mistakes. Microsoft this week attributed an April 1 Azure cloud services crash to a code defect.
The big theme of Windows Server 2022 is security -- primarily bringing the concept of Secure Core from Windows client to the server world with Secure Core Servers.
- By Paul Schnackenburg
Tom Fenton puts "crush-proof" ruggedness claims to the test with a fall, a truck, a snow ski, water and ice.
Subnets are used for many AWS tasks (like creating an EC2 VM), so Brien Posey sheds some light on common errors to end some of the frustration around subnetting.
After discussing the web-based end-user computing monitoring tool SOLVE in part 1 of this series, Tom Fenton turns his attention to Horizon-published applications.
With more interest in cloud-based file servers, Brien Posey details the integral process of migrating existing files to the cloud to get started, here focusing on the final configuration steps.
With more interest in cloud-based file servers, Brien Posey details the integral process of migrating existing files to the cloud to get started.