Featured Blog

Uncharted Waters by Matt Heusser

member Blog

From the Cloud to Virtualization, Software As a Service to Web Services, ideas seem to be everywhere all the time. Somewhere, somehow, someone needs to separate the wheat from the chaff. We’ve asked Matt Heusser to provide his insight and commentary on the prevailing issues for IT staff today.


Explaining the Gig Economy

October 27, 2016 - Remember in A Christmas Story, when Ralfie needed some privacy to decode the radio message? The bathroom was his only option; Ralfie shared the second bedroom with his brother, and the family had just one car. Have you noticed that doesn’t happen any more? The typical house size in the United States has increased by a...... READ MORE


  • Explaining the Gig Economy

    member Blog

    Remember in A Christmas Story, when Ralfie needed some privacy to decode the radio message? The bathroom was his only option; Ralfie shared the second bedroom with his brother, and the family had just one car.

    Have you noticed that doesn’t happen any more?

    The typical house size in the United…READ MORE

    Matt Heusser3,340 pointsBadges:
  • Android malware delivery is harder than you might think

    editorial Blog

    There is certainly no shortage of infosec headlines mentioning some new Android malware threat. There are banking Trojans, malware that can root your phone, monitor your communication or steal your data. Given the frequency and bombast of the headlines, you might even think that Android is completel…READ MORE

    Michael Heller3,010 pointsBadges:
  • Bill Belichick does not like tablets

    editorial Blog

    During the New England Patriots’ Oct. 2 loss, cameras caught head coach Bill Belichick throwing a Microsoft Surface Pro 4. Belichick was justifiably upset with his players’ performance, but there may have been more to the story.

    On a conference call this week, the usually tightlipped coach went o…READ MORE

    Eddie Lockhart1,015 pointsBadges:
  • IFS: the business agility dream made real with operational intelligence

    editorial Blog

    IFS has presented a new version of its IFS Enterprise Operational Intelligence (EOI) software with new features including capabilities for adding custom visualisations (presenting abstracted data visuals in more digestible and usable forms) plug-and-play integration with the firm’s core IFS Applica…READ MORE

    Adrian Bridgwater9,565 pointsBadges:
  • Yahoo open sources NSFW neural network porn detector

    editorial Blog

    Embattled former darling of the search wars Yahoo has open sourced its neural network porn detector software.

    The firm has explained that it is in fact tremendously difficult to automatically identifying that an image is not suitable/safe for work (NSFW).

    But says Yahoo, with the evolution of …READ MORE

    Adrian Bridgwater9,565 pointsBadges:
  • Windows Update Alternatives

    editorial Blog

    Microsoft’s handling of updates has changed since the days of Windows 7. In that OS, users were presented with a slate of pending updates. Checkboxes next to each item let them select which ones they wanted, and which ones they didn’t. In Windows 8 and 10 versions that is no longer possible using W…READ MORE

    Ed Tittel7,900 pointsBadges:
  • Is it acceptable to write sloppy, inefficient, bloated code -- or just easy?

    editorial Blog

    Decades ago, legend has it, many programmers got paid based on the number of lines of code they wrote. The more you produced, the better you were perceived to be. The inevitable result, not surprisingly, was mountains of bloated, inefficient code. Are we coming back to it?

    Once organizations wise…READ MORE

    Joel Shore2,030 pointsBadges:
  • Cloudian raises $41 million in a Series D funding round

    editorial Blog

    Cloudian today closed a $41 million in a Series D funding round that it will use to help increase its sales footprint in Europe and Asia in the second half of 2017.

    New Cloudian investors in the round included Lenovo, City National Bank, Epsilon Venture Partners and Delta Venture Labs. Previous …READ MORE

    Sonia Lelii3,710 pointsBadges:
  • Blue Coat Proxy SG Deployment methods – Out of Path Mode

    member Blog

    The Out-of-path deployment mode is commonly used when, one cannot bring down the network. Out-of-path deployment happens to be very difficult to manage as one cannot intercept and redirect the internet traffic at network level (like configuring WCCP, PBR or inline deployment). One needs to explicit…READ MORE

    Yasir Irfan6,975 pointsBadges:
  • Business Continuity and networking resilience

    editorial Blog

    Problematic events happen and organisations need to be able to cope when things go wrong. Business resilience has always required organisations to consider many diverse elements – premises, people, suppliers, equipment and tools. However, IT has become such an important component of almost every bus…READ MORE

    Rob Bamforth355 pointsBadges:
  • IoT, the connected mind state

    editorial Blog

    In my previous post I discussed what we want to keep from the data gathered by all of those smart devices. We talked about raw data, averaging and thinking about possible use-cases for that data in the long run. Today, I would like to take that one step further.

    Today we’re seeing huge growth not…READ MORE

    Mike Resseler25 pointsBadges:
  • Digital health a 'first responder' for behavioral health conditions

    editorial Blog

    One in five adults in the United States suffer from mental illness, and many of them will consult their smartphones before they do a health professional. However, with digital health often acting as first responder, and many apps claiming they can help people who suffer from behavioral health condit…READ MORE

    Tayla Holman455 pointsBadges:
  • IT due diligence in a merger

    editorial Blog

    Mergers and Acquisitions (M&A) involve a tremendous amount of effort to properly evaluate the situation before decisions are made. Leaders must put together a teams to perform a due diligence effort of the organization. This relies on data derived in large part from the IT organization. If that …READ MORE

    Carlos Casanova35 pointsBadges:
  • quantum computing


    Quantum computing is an area of study that focuses on developing computer technology that is based on the principles of quantum theory. Following the laws of quantum physics, a computer would gain enormous processing power through the ability to be in multiple states and to perform tasks using all p…READ MORE

    Margaret Rouse24,715 pointsBadges:
  • The CIO takeaway from Gartner Symposium

    editorial Blog

    This week, SearchCIO was at the Gartner Symposium/ITxpo in Orlando. In Searchlight, Features Writer Jason Sparapani provides a bird’s eye view of some of the predictions from Gartner analysts, the themes that surfaced at the sessions and what CIOs had so say.

    At the Symposium, Gartner analyst Mar…READ MORE

    Mekhala Roy205 pointsBadges:
  • Win 'frenemies,' influence people the Microsoft way

    editorial Blog

    At its annual Symposium/ITxpo in Orlando, Fla., last week, market researcher Gartner touted the idea of businesses partnering with other businesses to build “digital ecosystems,” which can create new products and services, vastly improving fields like agricultural planning, to feed a growing populat…READ MORE

    Jason Sparapani1,205 pointsBadges:
  • When does it make sense to move to the cloud?

    member Blog

    Moving to the cloud isn’t for everyone. When the cloud providers first launched their cloud platforms their approach, and marketing message, was for the most part that everything should be running in the cloud. And they were pushing that message hard.

    Today however we have a much friendlier, cu…READ MORE

    Denny Cherry67,565 pointsBadges:
  • 3rd Party Data Hosting Leads to Fear Among CIOs

    member Blog

    This is concluding post from my discussion with Gary Watson, VP of Technical Engagement and Nexsan Founder. In the first post, we discussed the salient features of his company Nexsan and its unified storage solution with complete availability and security. In the second post, we discussed how ransom…READ MORE

    Jaideep Khanduja12,070 pointsBadges:
  • DNA Data Storage Hopeful

    member Blog

    Scientists and researchers love finding new and interesting ways to store data, especially as the traditional spinning disk and even flash drive technologies are starting to run into the laws of physics. The newest one? DNA data storage.

    Actually, the notion started out as a joke, writes Andy Ext…READ MORE

    Sharon Fisher8,665 pointsBadges:
  • Brisk growth for storage in China; and a who’s who of Chinese data storage companies

    editorial Blog

    It’s interesting to take a look at IDC’s recently-released market tracker figures for external disk storage systems for China.

    Interesting in two senses: To see who the key players are, and that largely they’re a different set of storage vendors to those we’re used to, and; to see how the…READ MORE

    Antony Adshead2,350 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: