-
By Tom Fenton
It just became free for commercial use along with earlier permission for personal use, so Tom Fenton shares some of the cool things you can do with this venerable virtualization platform.
-
By Tom Fenton
Tom Fenton discovers a plugin that has CSV support and uses it to quickly create a bar chart.
-
Data resilience specialist Veeam Software updated its Data Cloud Vault with two new pricing tiers and enhanced integration with the Veeam Data Platform.
-
Data security specialist Druva announced extended support in Microsoft environments, specifically Microsoft 365 Dynamics Sales and Customer Service CRM modules.
-
New capabilities include simplified deployment and management of services including Azure Virtual Desktop, Microsoft 365, and Microsoft Intune. An updated pricing model is designed to increase margins for managed service providers.
-
Nutanix announced a new hybrid cloud offering parked on AWS that can help users extend their on-premises Nutanix environments to the cloud, offering perks to other users possibly disgruntled by the ongoing Broadcom/VMware tumult.
-
Straight from the front lines of cyber defense, time-poor, one-person Security Operations Center operator Paul Schnackenburg dives into Microsoft Defender XDR and Sentinel's SOC Optimization feature, highlighting how it helps streamline security coverage while managing costs.
-
Just substitute "election" with "group decision-making process," duh.
-
By Tom Fenton
Tom provides an overview of Grafana and how to use it, including the Grafana plugin that lets you use CSV data sources to create a dashboard.
-
"This year's list shows that cloud computing skills remain in high demand and can be quite lucrative for tech professionals."
-
With those ever-present "destroy humanity" fears, the No. 2 trend is AI governance platforms, naturally.
-
Cloud giants Microsoft and Google are both moving quickly in the trending field of autonomous AI agents as the GenAI space matures from simple query-and-response chatbots and content creators.
-
By Tom Fenton
Although Workstation has a GUI interface that is easy to use and very powerful, sometimes it is more useful to perform an action using the command line or a script than using a GUI.
-
Cloud giants Microsoft and Google, along with many other major industry players, are backing a new identity security standard proposed by Okta and the OpenID Foundation.
-
A bevy of recent cybersecurity reports point to the continuing problem of nation-state-sponsored threat actors, though Microsoft seems more alarmed about the issue, leading the calls for action on the part of industry and government.
-
Research firm Gartner predicts an enterprise trend "to replace their VMware-based deployments and embrace hybrid cloud infrastructure delivery," with Nutanix often chosen as the alternative.
-
Our practicing cybersecurity expert in Australia looks at the different types of MFA and how you can use them in a Microsoft context, dives deep into "in the middle" schemes and relates a successful client breach, though "we dodged a bullet."
-
Prominent chipmakers AMD and Intel are duking it out as they chase NVIDIA for AI hardware supremacy, this week trading announcements about their latest/greatest offerings while holding dueling AI events.
-
Partnership will provide critical user context to accelerate threat detection and response.
-
This movement, similar to "edge computing" in which data is processed closer to its source, sees AI models being deployed and executed on edge devices, allowing for real-time analysis and decision-making without relying on a central server.
-
SD-WAN was one of the hottest parts of IT networking not too long ago, and while it has lost lustre among other industry technologies since its heyday, the market is being reinvigorated by advanced Generative AI and machine learning (ML) developments.
-
AWS expert Brien Posey demonstrates how to automate EC2 instance customization by using PowerShell to simplify post-deployment tasks.
-
Advanced AI can defeat CAPTCHAs designed to prove web actions are being performed by humans instead of machines, so a better security mechanism is needed for the internet, new research indicates.
-
By Tom Fenton
Tom Fenton: "Due to the issues I had when running the command, I only did limited testing with it before giving up."
-
Is there a widespread backlash to cloud computing that sees organizations moving their IT operations back to on-premises datacenters? That longstanding debate was fueled by recent comments from AWS about cloud repatriation among its customer base.