Advanced Search

Open Menu Open Menu
  • Home
  • Papers
  • Webcasts
  • Newsletters
  • Advertise
  • Summits
  • More
    • News
    • How-To
    • Dan's Take
    • VMworld 2013
    • Virtual Insider
    • Everyday Virt
    • Paul on Hyper-V
    • How To Guy
    • Cloud Report
    • Admin
    • Apps
    • Backup
    • Desktop
    • Server
    • Storage
    • White Papers
    • Webcasts
    • Advertise
    • Contact Us
    • Site Map

  • Topics

  • vSphere
  • Hyper-V
  • SDN/SD-WAN
  • Server
  • Cloud
  • Containers
  • Desktop
  • Admin
  • Storage
  • Backup
  • How-To

  • Dark City IMage

    Using a Raspberry Pi as a $21 Edge Environment Monitoring Solution

    By Tom Fenton

    In his continuing Pi adventures, Tom creates another edge device -- this one using a DHT22 sensor to monitor the humidity and temperature in a remote location.

  • What's Microsoft Defender for Identity and Why Should I Use It?

    By Paul Schnackenburg

    After looking at MDI in an overview of the Microsoft 365 Defender family, Paul Schnackenburg takes a deep dive and shares why he thinks it's an excellent addition to the protection of your on-premises Active Directory network.

  • Using a Raspberry Pi as a $50 Edge Time-Lapse Camera

    By Tom Fenton

    It might not be practical for large organizations to assemble these for corporate use, but smaller business units might be attracted to its price and customizability.

  • No. 1 Cloud Computing Cost Saver: Resource Reservations

    By David Ramel

    "The most important cost savings that you can do in the cloud is resource reservation," says Joey D'Antoni, principal consultant at Denny Cherry and Associates Consulting.

  • Hands-On Review of SANNCE Webcam

    By Tom Fenton

    It actually prompted one meeting participant to comment on the lack of glare on Tom's visage.

  • Take Five: Dynatrace Perform 2022

    By Tom Fenton

    Tom Fenton gives his five takeaways from the recent Perform user conference held by Dynatrace, an application performance monitoring and autonomous cloud management specialist.

  • Data Protection Report: Most Orgs Suffered Ransomware Outage

    By David Ramel

    A new data protection report from Veaam shows the tremendous impact of ransomware and other cybersecurity attacks currently plaguing the IT industry.

  • Installing Raspberry Pi OS on a Zero 2 W

    By Tom Fenton

    After introducing the the Raspberry Pi (RPi) Zero 2 W, Tom installs the OS and plays Tetris but fails to browse.

  • Azure Spring Cloud Enterprise Preview Now Open to All

    By David Ramel

    The joint VMware/Microsoft Java enterprise offering, Azure Spring Cloud Enterprise, is now open to all in a public preview after a five-month private preview.

  • Raspberry Pi Zero 2 W: A $15 Edge Computer/Device?

    By Tom Fenton

    Tom Fenton puts the tiny device through its paces to see just how much of a bargain it is.

  • Threat Actors Organize: Welcome to Ransomware Inc.

    By David Ramel

    "Many people still think of a ransomware actor as the proverbial 400-pound hacker in his mom's basement -- nothing could be further from the truth," says in-the-trenches security expert Allan Liska.

  • CNCF: Kubernetes Has 'Crossed the Chasm' to Become Mainstream

    By David Ramel

    The Cloud Native Computing Foundation (CNCF) has published its sixth annual cloud native survey, finding that Kubernetes has finally gone mainstream.

  • VMware Details Malware Threats in Linux Multi-Cloud Implementations

    By David Ramel

    While Windows is generally seen as the most malware-vulnerable OS, cloud computing is mostly done on Linux, so VMware has published a threat report about malware in Linux-based multi-cloud environments.

  • App Security Report: Open Source Code Still 'Blessing and a Curse'

    By David Ramel

    A new Veracode report on application security finds that while things are generally getting better, some persistent problems remain, including the use of flawed open source and third-party code libraries.

  • Microsoft: Need for MFA 'Cannot Be Overstated'

    By David Ramel

    Even though identity and MFA are top-of-mind cybersecurity concerns these days, Microsoft data indicates most organizations are still unprotected against identity attacks.

  • Hit by Cyberattack? Don't Be Afraid to Ask for Help

    By David Ramel

    When you've been hit, insurance companies won't be eager to help. ISPs usually are, though.

  • After Vendor Hype, Forrester Publishes Its Own Definition of 'Zero Trust'

    By David Ramel

    Decrying "hype" and a "highly subjective, self-serving perspective" shaping of the term Zero Trust by security vendors, the analyst firm that first coined the term, Forrester Research, has published its own definition.

  • City Lights Illustration

    Gathering Information on Your Wi-Fi NIC and Connection on Linux

    By Tom Fenton

    Tom Fenton shares his tools for monitoring built-in device Wi-Fi among the wide variety of Linux versions and GUI interfaces.

  • Party Lights Graphic

    Microsoft Poll: 95% See Hybrid/Multi-Cloud Already 'Critical to Success'

    By David Ramel

    Microsoft sponsored a survey of IT pros and decision-makers to reaffirm the industry consensus about the importance of multi-cloud and hybrid cloud enterprise implementations.

  • Google Cloud Compares Blockchain to Open Source/Internet, Forms New Team

    By David Ramel

    Google Cloud announced the formation of a new Digital Assets Team for blockchain technology, whose rise it compared to that of open source and the internet.

  • Epic DDoS Fail: Azure Cloud Fends Off 'Largest Attack Ever Reported in History'

    By David Ramel

    "In November, Microsoft mitigated a DDoS attack with a throughput of 3.47 Tbps and a packet rate of 340 million packets per second (pps), targeting an Azure customer in Asia. We believe this to be the largest attack ever reported in history," Microsoft reported last week.

  • Automatically Rotating Amazon Key Management Service Keys

    By Brien Posey

    Brien Posey explains a couple limitations that you need to be aware of.

  • Despite 'Perceived Risk,' Edge Deployments Mature: AT&T Report

    By David Ramel

    AT&T published a report on Securing the Edge, finding that despite perceived risks, enterprise edge deployments have momentum and are at a surprisingly high level of maturity.

  • Finding an Object's Amazon Resource Name

    By Brien Posey

    The thing that makes using an ARN so tricky is that even though every AWS object has an ARN, Amazon may not tell you what that ARN is.

  • Feds Publish Zero Trust Plan

    By David Ramel

    The U.S. Office of Management and Budget (OMB) published a strategy to move the government to a Zero Trust cybersecurity model.

  • « previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • next »
Most   Popular
  • Most Popular Articles
  • Most Emailed Articles

Don't Get Fired: How to Sell Max Cybersecurity to the C-Suite

The Metaverse Developer Pay Problem

Industry Heavyweights Form Metaverse Standards Forum

Deeper Dive into Windows Subsystem for Linux GUI (WSLg)

Fad or the Future? What Developers Think of Web3

Virtualization Review
Sign up for our newsletter.
Email Address*Country*
I agree to this site's Privacy Policy
Please type the letters/numbers you see above.

Free White Papers

  • Digital Dialogue - Shift-Left: Top 5 Tips for Implementing DevSecOps in Your Enterprise
  • 7 Critical Reasons for Office 365 Backup
  • The Ultimate Ransomware Battle Kit
  • Remote Work Environments Optimization Checklist

More Tech Library

  • Most Popular Articles
  • Most Emailed Articles

Don't Get Fired: How to Sell Max Cybersecurity to the C-Suite

The Metaverse Developer Pay Problem

Industry Heavyweights Form Metaverse Standards Forum

Deeper Dive into Windows Subsystem for Linux GUI (WSLg)

Fad or the Future? What Developers Think of Web3

Sponsored Webcasts

  • Securing Azure AD and Active Directory Summit
  • AWS Security Insights Summit
  • AWS Cloud Security: Top Dos and Don'ts
  • AWS Cloud Security Best Practices

More Webcasts

  • Contact Us
  • Advertise
  • Archives
  • Events
  • Print Issues Online
  • Free Newsletters
  • Reprints
  • List Rental

  • Application Development Trends
  • AWSInsider.net
  • Enterprise Systems
  • FutureTech360
  • Live! 360
  • MCPmag.com
  • MedCloudInsider
  • Prophyts
  • Pure AI
  • Redmond
  • Redmond Channel Partner
  • TechMentor Events
  • Virtualization & Cloud Review
  • Visual Studio Magazine
  • Visual Studio Live!

© 1105 Media Inc. See our Privacy Policy, Cookie Policy and Terms of Use. CA: Do Not Sell My Personal Info

Problems? Questions? Feedback? E-mail us.