Hosting applications in Azure involves careful consideration of the costs generated by three main components: computing, storage and network. IT administrators need to understand the resources associated with each category and their associated charges.
Once confined to just a handful of primitive PCs, today the internet has become so deeply integrated into all facets of our lives — from sensors in public trash cans to app-controlled Batmobiles — that the line between physical and virtual has begun to disappear.
businesses increasingly embrace digital transformation, it has become critical
for CEOs to ensure their infrastructure investment supports the initiative.
According to Gartner*, 47 percent of CEOs say they are being “challenged” by
their board of directors to show progress in shifting toward a digital business
You think it will never happen to you. You assume your hard
drive, server, network or perhaps your entire data centre is safe from
unexpected outages. But when IT disaster strikes, it comes without warning, and
can be in some bizarre forms.
A topical Q&A with a leading light within the enterprise IT community, discover more about what Chris's day to day consists of, why he chose IT as a career, how to be successful, and his predictions for the future...
Back in 2015 on International Women’s Day,
Former UN Director General Ban Ki Moon published a statement. “The world will
never realise 100% of its goals if 50% of its people cannot realise their full
potential,” he said. “When we unleash the power of women, we can secure a
future for all.”
Oftentimes, it is said, we fight the last war. It happens
when strategists fail to account for changes in the security environment, like
the birth of the machine gun, the tank, or the improvised explosive device –
technological innovations that altered how conflicts unfold.
A topical Q&A with a leading light within the enterprise IT community, discover more about what Matthew's day to day consists of, why he chose IT as a career, how to be successful, and his predictions for the future...
technology has been in existence for more than a decade, providing consolidated
security reports from correlated event logs, often in order to achieve
compliance with security standards. But SIEM can do better, by leveraging
correlated security events to trigger alerts and appropriate reaction from SOC
(Security Operations Center) teams.
It is often thought that a computer’s central processing unit (CPU)
handles everything within a computer. To some extent, this is true; however,
CPUs have delegates per se. These delegates are referred to as chipsets and
they have dedicated and specific tasks to carry out.
A topical Q&A with a leading light within the enterprise IT community, discover more about what Sue's day to day consists of, why she chose IT as a career, how to be successful, and her predictions for the future...
At the start of a new year, it’s popular to opine on what the new year
might bring in terms of technology advances. My predictions for the WAN in 2018
have been covered in several publications here, here and here. In this blog,
I’m going to expand on one of my predictions.
A topical Q&A with a leading light within the enterprise IT community, discover more about what Aidan's day to day consists of, why he chose IT as a career, how to be successful, and his predictions for the future...
For the last couple of years, Western Digital and 451
Research have taken a snapshot of the industry’s data challenges, by collecting
the experience and opinions of real IT practitioners. This year they once again
reached out to survey IT professionals to learn about current unstructured data
A topical Q&A with a leading light within the Cyber Security community, discover more about what Marc's day to day consists of, why he chose Cyber as a career, how to be successful, and his predictions for the future...
Recent research has predicted that women will represent more than 20 percent of the global cybersecurity workforce by the end of this year. While this is certainly an improvement from their representation in 2013 at 11 percent, it’s suffice to say that there’s still a lack of women in the industry.
No sooner have we accepted IoT than innovations
are transforming how this hyperconnected world will be implemented. Among the
emerging technologies is fog computing, which moves computing closer to the
end-user to decrease latency and bandwidth overload while improving access.
A topical Q&A with a leading light within the IT community, discover more about what Nicola's day to day consists of, why she chose IT as a career, how to be successful in IT, and her predictions for the future...
The way we consume services has changed significantly over
the last decade but when it comes to the Wide Area Network (WAN), the
architecture we use to deliver services to our branch users is often stuck back
in the 90s.
The Internet of Things (IoT) is placing huge challenges on network
managers across all industries. With booming endpoint numbers and generated
traffic, device management and network efficiency become of paramount
Jamie Graves from ZoneFox gives an insight into how we can
use AI more effectively. It was standing room only when Jamie Graves of ZoneFox
took to the stage at AI-Analytics X to discuss the strengths and weaknesses of AI.
The New Yorker calls Christopher Wylie “a pink-haired, nose-ringed
oracle sent from the future." But he’s probably best known for his role in setting up – and then
taking down – the cyber-warfare firm Cambridge Analytica!
In Graham Cluley's absolute belter of a session, we delve into the extraordinary,
like the companies who pretend to be hacked when they haven’t, or the attackers
who went to exceptional lengths to steal millions from their employers.
Anyone that’s been paying attention knows that fileless
malware has been on the rise for the past few years. But, did you know that
we’re likely to see this infamous threat transform in new and menacing ways
this year? Enter the Vaporworm.
growing pressure on IT to provide faster and more agile platforms for business,
Red Hat’s James Allen discussed why those adopting open source tooling and
practices are succeeding at the expense of those who don’t.
By 2020 over 90% of companies will be utilising cloud
services offered by multiple providers, using various orchestration tools. To
ensure they retain full mobility and flexibility, businesses need to be wary of
components which could potentially cause cloud lock-in.
Samantha Humphries, Senior Manager of Global Markets &
Compliance at Rapid7 discusses SIEM myths, how to arm your Jedi (first
responders), analytics and more. Discover the tools and techniques hackers use
to defeat the expensive security safeguards used in many corporate environments
The events of annus horribilis 2008 changed the
world forever. The change was dubbed the "New Normal" and in turn
gave rise to shifts in economic and political power which would have been
considered the stuff of fantasy fiction as 2008 came to a close.
counting technology is regarded as one of the most effective ways to understand
how a building functions throughout the working week. This kind of intelligence
is invaluable for many businesses but none more so than support service
providers looking to gain a more accurate way to deploy resource and make increasingly
thin margins more profitable.
While everyone seems to be treating
‘artificial intelligence’ as the latest in-vogue topic, it’s important to
remember it is far from a new development. It is not my intention to dilute the
excitement of AI’s minefield of potential but, like anything that has the power
to change the world, it requires an element of respect and a lot more know-how.
Ed Broking is a wholesale insurance and reinsurance broker, sourcing policies and coverage across a broad range of industries. Based in London, Ed Broking operates a number of international offices to support their global operations. Faced with replacing an ageing hosted server system, Ed Broking took the decision to move to fully hosted Microsoft Azure platform. This is their story.
The cloud is driving change in the media industry at an incredible rate, thanks to benefits achieved by its scalability and affordability. In an exclusive roundtable interview, industry experts debate the unique needs of the sector and outline strategies for success in the years ahead.
Security experts at Imperva reported an attack against Drupal Web servers running on Linux-based systems. Hackers exploited the Drupalgeddon2 flaw (CVE-2018-7600) along with other issues. The Drupalgeddon2 could be exploited to take over a website, it affects Drupal versions 6, 7 and 8.
BYOD is a thing of the past - or is it? Gary Cox, Technology Director for Infoblox in Western Europe, explores the troubling rise of Shadow IoT and how to detect it. With the Internet of Things (IoT) continuing to grow, and with employees connecting an increasing number of consumer devices to enterprise networks, IT teams find themselves faced with greater complexity and more security issues than ever before.
Blockchain is more - much more - than Bitcoin. Jonathan Wilkins, Marketing Director at EU Automation explains how blockchain can automate a range of business processes. Blockchain was invented in 2008 by Satoshi Nakamato. He is thought to be a man living in Japan, born in 1975, but there remains speculation about the inventor's true identity.
The survey, which was conducted at IP EXPO 2018, found that over a quarter (26 percent) of the IT professionals questioned selected “Give 110 percent” as their most frustrating office jargon of the year, followed by "Blue sky thinking" (19 percent), and "Low hanging fruit" (17 percent).
Today, the user experience of digital services has the greatest impact on the perception of an organisation’s ability to operate competently and successfully in a digital world. It is the key competitive differentiator, and is essential for avoiding the risk of customer churn.
Whether or not you literally “own” the infrastructure, application or networks that deliver your apps and services, as an IT leader or technology professional you own the outcome. Here are five factors that you should consider to deliver an optimal user experience while using AWS.
The term cloud computing became popular somewhere halfway the first decade of this century, short before the launch of Amazon S3 and EC2. In the little over 10 years since, we have come a long way. However, I believe we still have to uncover the full potential of cloud computing. Although not part of the formal characteristics of cloud computing, there have been are two simmering expectation of cloud computing that we have failed to meet up to now.
The Challenge: Modern data centre's are changing rapidly. Thanks to virtualisation, more and more organisations are shifting to resilient, on-demand, private cloud environments, delivering applications faster and more cheaply than ever before. Software defined data centre's (SDDCs) are the new norm.
The warnings have been out there: Mobile and social accelerating customer interactions. Big data providing deep lakes of potential knowledge. Billions of connected gadgets bringing forth a global Internet of Things (IoT).
We think of Enterprise organisations as closed societies, working in isolation in pursuit of the advantage over their competitors. It might come as a surprise then to think about how much Open Source software is used within even the largest and most secretive companies around the world.
There is no need for data scientists to be outright software experts thanks to emerging tools for using data delivered through the cloud. Making use of the cloud as a shared platform ensures the delivery of the right data to the right people at the right time, without the inefficiency of workflows passing through many hands through hand-overs.
Serverless is an emerging “new normal” for web-based applications and services where the unit of deployment and billing is a single function a few lines of code in length. Serverless enables radical transparency in billing and radical ease of use for developers; when combined with with marketplace (“app store”) offerings from cloud vendors like AWS.
Smart homes and smart cities will likely be top of mind in conversations around the Internet of Things (IoT), but the application of IoT is becoming far more widespread than these two areas as a growing number of industries adopt IoT devices.
With the soaring number of mobile and IoT devices, and the onslaught of new apps that businesses are faced with on their wireless network, it is time for innovation that can help IT scale and meet these new requirements.
Our recent research uncovered that just over a third of Brits (35%) would not trust an organisation using blockchain technology to keep their information secure. But with so many uses beyond recording cryptocurrency transactions, we think people need to wake up to the real potential for blockchain. Here are five of the most interesting use cases for blockchain from the last year.
AI and robotics are going to create almost 60 million more jobs globally, that’s according to a new report from the World Economic Forum. The Swiss think tank released its Future of Jobs report to put facts behind the much-debated topic of AI and job displacement.
Today the world faces one of its most daunting, but also exciting tasks - how organisations will transition into the future with Artificial Intelligence entering the workplace. However we look at it, AI directly threatens a large portion of the global workforce whose jobs will be competing with digitisation, automation, and continuously improving AI.
With the explosion of cryptocurrency over the past of years, many have been debating the longevity and legitimacy of cryptocurrencies in our global economy. However, those with a keener eye were fascinated with something far more useful and widely applicable: Blockchain — the technology that made cryptocurrency possible in the first place.
Cybercriminals have never been so notorious. As technology innovation seems to outpace security defenses, organizations are turning to ethical-hackers to assess risk and see where they are most vulnerable.
Dr Greg Benson, Professor of Computer Science at the University of San Francisco and Chief Scientist at SnapLogic, shares his tips for hiring the best AI talent and a what it means to work across both industry and academia for AI development.
On any given day AI is both the saviour and the doom of human kind. Opinion on the technology can change as quickly as the wind. But behind the curtain of doubt AI programs are already making incredible benefits to our lives, often without us even realising.
Troublesome political climate has put the NHS, like many other Public-Sector organisations, under immense pressure to cut costs and drive operational efficiencies whilst simultaneously embracing new digital methods, in a bid to improve services. As a result, proper and necessary data security controls have not yet been totally embraced…