All recent articles

How to know when AI is the right solution

How to know when AI is the right solution

AI adoption is on the rise. According to a recent McKinsey survey, 55% of companies use artificial intelligence in at least one function, and 27%…

Space is the final frontier for data centers

Space is the final frontier for data centers

Last year marked the first time humanity deployed a conventional data center in space. The HPE Spaceborne Computer-2 – a set of HPE Edgeline Converged…

Log4Shell Vulnerability Highlights Software Supply Chain Issues

Log4Shell Vulnerability Highlights Software Supply Chain Issues

Open source software has eaten the world, but last month’s Log4Shell vulnerability chaos highlights the potential dangers when enterprises don’t treat it with the respect it deserves.…

Top 5 elements needed for a successful data warehouse

Top 5 elements needed for a successful data warehouse

As companies strive for a unified view of their customers and other key corporate data, many turn to data warehouses as a place to keep…

6 AIOps hurdles to overcome

6 AIOps hurdles to overcome

IT operations teams have a lot to juggle. They manage servers, networks, cloud infrastructure, user experience, application performance, and cybersecurity, often working independently of one…

The benefits of embedded analytics

The benefits of embedded analytics

Traditional business intelligence platforms are designed to be used by expert users, data scientists or statisticians. These valuable employees wind up spending too much time…

Supply chain woes forcing more workloads to the cloud

Supply chain woes forcing more workloads to the cloud

Messaging services vendor Interop Technologies runs three data centers to provide services to customers and to run its own back-office systems. Interop also provides turnkey…

Looking Forward to 2022: What To Expect in Cybersecurity

Looking Forward to 2022: What To Expect in Cybersecurity

Winston Churchill said, “Generals are always prepared to fight the last war.” He said this like it was a mistake. But in cybersecurity, we must…

Enterprises See Exponential Growth in log4jshell Attacks

Enterprises See Exponential Growth in log4jshell Attacks

  The Apache Log4j library is a Java-based logging tool that is ubiquitous in enterprise applications. The vulnerability known as Log4Shell, first reported on Dec.…

7 top predictive analytics use cases: Enterprise examples

7 top predictive analytics use cases: Enterprise examples

Predictive modeling helps companies optimize their internal operations, improve customer satisfaction, manage budgets, identify new markets and anticipate the impact of external events, among other…

Trust no one: New technology platforms expand the attack surface

Trust no one: New technology platforms expand the attack surface

Next year, AT&T, Verizon and T-Mobile all plan to shut down their 3G networks, even as 5G rollouts continue around the country and around the…

Cisco CCIE certification explained

Cisco CCIE certification explained

Cisco Certified Internetwork Expert is Cisco’s most prestigious and most difficult certification to achieve, typically requiring years of industry experience and a deep understanding of…

On-prem-as-a-service comes into its own during pandemic

On-prem-as-a-service comes into its own during pandemic

Many companies accelerated their move to the cloud during the pandemic – including cloud-based computing, and, with SASE, cloud-based networking and security as well. But…

SolarWinds Hackers Step Up Attacks Against IT Services Firms

SolarWinds Hackers Step Up Attacks Against IT Services Firms

Late last year, we learned that Russian state actors compromised SolarWinds Orion, a widely used network monitoring tool, and were able to access the systems of…

Post-Pandemic, Data Centers Adapt to “New Normal”

Post-Pandemic, Data Centers Adapt to “New Normal”

For data center managers, the pandemic has changed everything. And we are not going back, at least, not anytime soon. And when we can go…

Cloud Identity Is “New Normal” Replacement for On-Prem Tools

Cloud Identity Is “New Normal” Replacement for On-Prem Tools

Today’s data center has very little in common with that of a few years ago. The old model of on-prem servers surrounded by a tough,…

API Attacks, Breaches Piling Up

API Attacks, Breaches Piling Up

In August, dozens of organizations using Microsoft Power Apps inadvertently exposed 38 million records — COVID-19 contact tracing, job applicants’ Social Security numbers, and even…

Data warehouses and holistic business intelligence

Data warehouses and holistic business intelligence

Business intelligence is the process of analyzing company data to better understand that data, spot anomalies or trends and make predictions. It’s possible to do…

Making the most of sentiment analysis

Making the most of sentiment analysis

Sentiment analysis is beginning to prove its mettle in the enterprise. This analytic technique, which enables companies to  determine the emotional value of communications, is…

Five Functions That Benefit From Cybersecurity Automation

Five Functions That Benefit From Cybersecurity Automation

Data center cybersecurity managers have had it tough this pandemic. During the first half of 2021, bad actors launched 5.4 million DDoS attacks, setting a…

What is a chatbot? Simulating human conversation for service

What is a chatbot? Simulating human conversation for service

Chatbot definition A chatbot is a software application designed to simulate human conversation with users via text or speech. Also referred to as virtual agents,…

SASE Model Proving Value Beyond Remote Work Scenarios

SASE Model Proving Value Beyond Remote Work Scenarios

Gartner only coined the term  SASE  — secure access service edge — two years ago to describe a cloud-based service that combines  SD-WAN networking  with…

Paying Hackers’ Ransom Demands Is Getting Harder

Paying Hackers’ Ransom Demands Is Getting Harder

If your data center’s ransomware recovery plan is to pay off the hackers with cryptocurrency, it’s time to rethink your strategy as regulators crack down.…

OMIGOD Vulnerability Exposes Virtual Machines Running Inside Azure

OMIGOD Vulnerability Exposes Virtual Machines Running Inside Azure

Late last month, researchers from cloud security firm Wiz found a  new vulnerability  that allows Azure users to access cloud databases of other users, breaking…

What to expect from SASE certifications

What to expect from SASE certifications

Secure access service edge (SASE) is a network architecture that rolls SD-WAN and security into a single, centrally managed cloud service that promises simplified WAN…

Cisco adds specializations to its CCNP cert

Cisco adds specializations to its CCNP cert

Cisco’s network certification lineup underwent a  major overhaul  last year, and one of the big changes is that specialization options appear at the professional level…

What is sentiment analysis? Using NLP and ML to extract meaning

What is sentiment analysis? Using NLP and ML to extract meaning

Sentiment analysis defined Sentiment analysis is analytical technique that uses statistics,  natural language processing, and machine learning to determine the emotional meaning of communications. Companies…

Zero-Trust Model Gains Luster Following Azure Security Flaw

Zero-Trust Model Gains Luster Following Azure Security Flaw

Cloud use is at an all-time high, despite security worries. Last week’s  ChaosDB vulnerability  shows that enterprises need to adapt their security strategies and move…

What is AIOps? Injecting intelligence into IT operations

What is AIOps? Injecting intelligence into IT operations

Cloud platforms, managed service providers and organizations undertaking digital transformations are beginning to reap the benefits of an emerging IT trend: the use of AI-powered…

Microsoft Azure Vulnerability ‘Breaks Secure Multitenancy’

Microsoft Azure Vulnerability ‘Breaks Secure Multitenancy’

Last week, researchers from cloud security firm Wiz reported a new vulnerability in Microsoft Azure’s managed database service, Cosmos DB, that they called the worst they’ve…