The internet of things is shaping up to be a more significant threat to the Domain Name System through larger IoT botnets, unintentional adverse effects of IoT-software updates and the continuing development of bot-herding software. The Internet Corporation for Assigned Names and Numbers (ICANN) an..
Apple calls CarPlay “the ultimate co-pilot.” BMW calls it the “smart and fast way to conveniently use your iPhone features while in your car. ... You can control your iPhone and use apps with the touchscreen display, the iDrive Controller or voice commands.” However you describe it, though, Apple’s ..
Most companies like to keep their specialty software to themselves, but IBM is making a move to expand its Spectrum Discover metadata management software to support competitive storage products. Spectrum Discover is modern metadata management software that provides data insight for petabyte-scale un..
Waste heat is the scurge of computing. In fact, much of the cost of powering a computer is from creating unwanted heat. That’s because the inefficiencies in electronic circuits, caused by resistance in the materials, generates that heat. The processors, without computing anything, are essentially co..
When it comes to connecting internet of things (IoT) devices, there is a wide variety of networks to choose from, each with its own set of capabilities, advantages and disadvantages, and ideal use cases. Good ol’ Wi-Fi is often seen as a default networking choice, available in many places, but of li..
In part 1 of this 3-part series on how to conduct a wide-area network assessment and prepare for WAN updates, we looked at foundational issues such as current challenges and objectives. In this installment, we’ll examine considerations around applications and bandwidth. As with part 1, my source for..
One of the hardest things for employers to do is keep up with the needs of an increasingly mobile workforce. More than ever, teams are using multiple devices to do their work on the go — and for workforces that are dispersed, it can be difficult to get on the same page for key objectives and initiat..
Linux built-ins are commands that are built into the shell, much like shelves that are built into a wall. You won’t find them as stand-alone files the way standard Linux commands are stored in /usr/bin and you probably use quite a few of them without ever questioning how they’re different from comma..
BrandPost: Digital Transformation: Can SD-WAN Help Strengthen Application Security in a Cloud-First World?
The majority of enterprise CIOs are of in the midst of a digital transformation journey, migrating more of their business applications and infrastructure from their own data centers to the cloud. These applications include real-time voice calling, video conferencing, email, storage, CRM, and many ot..
Earlier this year, AT&T finalized a deal to divest itself of its 31 data centers for $1.1 billion. Now that it has dumped its data center business, the company partnering with two of the largest providers of them: Microsoft and IBM. IBM and AT&T this week announced a multi-year strategic alliance wh..