In the early 1600s, one of my favorite historical figures, Italian astronomer Galileo Galilei, championed the works of one Nicolaus Copernicus and postulated that the universe was heliocentric. The term was named after Helios, the Greek god of the sun, indicating that everything revolved around him.In the IT world, the cloud has become the center of the universe. And since Zeus is the Greek god of the sky, which includes thunder and cloud, it makes sense that CIOs should adopt a Zeus-centric faith.To read this article in full or to leave a comment, please click here
When Scott Crowder joined BMC as its vice president of infrastructure and operations in 2011, he felt like he had stepped back in time. While he knew BMC’s products to be world class, the data center and other technologies running this world-class operation seemed more like they belonged in a museum.+ Also on Network World: Accelerating digital transformation using the Medici Effect +
Thus started a transformational journey that began in earnest with Crowder’s appointment as BMC's CIO in 2014. He had already begun the transformation of the data center in his first role, but upon taking the reins as CIO, he knew he had the opportunity to reshape the IT landscape from the ground up.To read this article in full or to leave a comment, please click here
When Scott Crowder joined BMC as its vice president of infrastructure and operations in 2011, he felt like he had stepped back in time. While he knew BMC’s products to be world class, the data center and other technologies running this world-class operation seemed more like they belonged in a museum.+ Also on Network World: Accelerating digital transformation using the Medici Effect +
Thus started a transformational journey that began in earnest with Crowder’s appointment as BMC's CIO in 2014. He had already begun the transformation of the data center in his first role, but upon taking the reins as CIO, he knew he had the opportunity to reshape the IT landscape from the ground up.To read this article in full or to leave a comment, please click here
For such a seemingly obvious idea, Gartner ignited quite a firestorm with its proposition that, to remain relevant, IT must be broken into two distinct realms: one focused on keeping the lights on, or, in Gartner parlance, Mode 1, and one devoted to the cool stuff that business people want, or Mode 2.To read this article in full or to leave a comment, please click here(Insider Story)
For such a seemingly obvious idea, Gartner ignited quite a firestorm with its proposition that, to remain relevant, IT must be broken into two distinct realms: one focused on keeping the lights on, or, in Gartner parlance, Mode 1, and one devoted to the cool stuff that business people want, or Mode 2.To read this article in full or to leave a comment, please click here(Insider Story)
Software-defined Wide Area Network (SD-WAN) technology promises enterprises true transport independence and flexibility. SD-WAN adopters can turn to any transport protocol -- 3G, 4G LTE, MPLS, Internet or Wi-Fi -- to provide the best cost and performance benefits for specific applications.To read this article in full or to leave a comment, please click here(Insider Story)
Software-defined Wide Area Network (SD-WAN) technology promises enterprises true transport independence and flexibility. SD-WAN adopters can turn to any transport protocol -- 3G, 4G LTE, MPLS, Internet or Wi-Fi -- to provide the best cost and performance benefits for specific applications.To read this article in full or to leave a comment, please click here(Insider Story)
New York’s Montgomery County, located at the foot of the Adirondacks, consists of 10 towns, one city and 50,000 residents. To protect the data that pertains to its citizens and operations, Montgomery County added DatAdvantage from Varonis to its arsenal of security wares. The data security platform is designed to show organizations where sensitive data exists, who is accessing it, and how to keep it safe.To read this article in full or to leave a comment, please click here(Insider Story)
What's to like? Image by Vicki Lyons, Prakash Kota, Julie Ulrich and David LeDouxEvery year we ask IT pros to share their favorite enterprise products, and every year we learn what it takes to win them over — including gear that saves time and money, bolsters security, and streamlines digital transformations. Read on to learn what 31 tech pros like best, in their own words.To read this article in full or to leave a comment, please click here
What's to like? Image by Vicki Lyons, Prakash Kota, Julie Ulrich and David LeDouxEvery year we ask IT pros to share their favorite enterprise products, and every year we learn what it takes to win them over — including gear that saves time and money, bolsters security, and streamlines digital transformations. Read on to learn what 31 tech pros like best, in their own words.To read this article in full or to leave a comment, please click here
New York’s Montgomery County, located at the foot of the Adirondacks, consists of 10 towns, one city and 50,000 residents. To protect the data that pertains to its citizens and operations, Montgomery County added DatAdvantage from Varonis to its arsenal of security wares. The data security platform is designed to show organizations where sensitive data exists, who is accessing it, and how to keep it safe.“This system captures activity from Active Directory and Windows system logs, tracking everything from user sign-on to file manipulation. It then presents this information in an easy-to-use dashboard with advanced reporting options,” says Gregory Oliver, senior network systems administrator for Montgomery County.To read this article in full or to leave a comment, please click here(Insider Story)
What's to like? Image by Vicki Lyons, Prakash Kota, Julie Ulrich and David LeDouxEvery year we ask IT pros to share their favorite enterprise products, and every year we learn what it takes to win them over — including gear that saves time and money, bolsters security, and streamlines digital transformations. Read on to learn what 31 tech pros like best, in their own words.To read this article in full or to leave a comment, please click here
New products of the weekImage by A10Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.To read this article in full or to leave a comment, please click here
New products of the weekImage by A10Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.To read this article in full or to leave a comment, please click here
When it comes to iPhone 8 (or iPhone X) scuttlebutt, there are rumors, and then there are leaks. This has been a big week for leaks...LEAKY IPHONE 8
Renders, schematics or whatever you want to call them were circulating wildly among Apple rumor mongerers and watchers this week. Appropriately enough, one such schematic surfaced on a site called /Leaks, and shows an iPhone with a vertical dual-camera set-up and a home button on the back, and a very comprehensive display on the front.MacRumors cautions that it's very hard to say how legit the schematic is, and that if it is for real, it could well be any of numerous prototypes that Apple engineers have tested.To read this article in full or to leave a comment, please click here
Apple's iPhone design has rough remained unchanged since the company introduced its larger-screened iPhone 6 lineup in 2014. Sure, there have been slight aesthetic changes -- such as the removal of the 3.5mm headphone jack -- but the overall look and feel of the iPhone is arguably outdated.Not to fear, the release of Apple's iPhone 8 is poised to change all that. Based on a number of leaks from reputable sources with solid track records, it's widely believed that the iPhone 8 will feature an edge to edge 5.8-inch OLED display. Of course, this begs the question: what happens to the home button, Touch ID and the iPhone's front facing camera?Well, Apple has reportedly been working on methods for embedding all of the above into the display itself. Far more than conjecture, Apple has filed a number of patents detailing technologies and manufacturing processes to allow for embedding items like a Touch ID sensor into a display. Of course, the road a patented technology must take before it appears in a shipping product is often fraught with hurdles, something Apple is currently dealing with right now.To read this article in full or to leave a Continue reading
Microsoft said it has already patched vulnerabilities revealed in Friday’s high-profile leak of suspected U.S. National Security Agency spying tools, meaning customers should be protected if they’ve kept their software up-to-date.Friday’s leak caused concern in the security community. The spying tools include about 20 exploits designed to hack into old versions of Windows, such as Windows XP and Windows Server 2008.To read this article in full or to leave a comment, please click here
Microsoft said it has already patched vulnerabilities revealed in Friday’s high-profile leak of suspected U.S. National Security Agency spying tools, meaning customers should be protected if they’ve kept their software up-to-date.Friday’s leak caused concern in the security community. The spying tools include about 20 exploits designed to hack into old versions of Windows, such as Windows XP and Windows Server 2008.To read this article in full or to leave a comment, please click here
As discussed in last post ( https://crazyrouters.wordpress.com/2017/02/25/learning-python-kirk-byers-python-course/ ) , i will be sharing the my learning on weekly basis as course continues. This will not only motivate me but also help others who are in phase of learning python 3. Kirk discussed about the string methods in first week ,where he also put some […]
Friday’s release of suspected NSA spying tools is bad news for companies running Windows Server. The cyberweapons, which are now publicly available, can easily hack older versions of the OS. The Shadow Brokers, a mysterious hacking group, leaked the files online, setting off worries that cybercriminals will incorporate them in their own hacks. “This leak basically puts nation-state tools into the hands of anyone who wants them,” said Matthew Hickey, the director of security provider Hacker House.He’s been among the researchers looking over the files and has found they contain about 20 different Windows-based exploits -- four of which appear to leverage previously unknown software vulnerabilities.To read this article in full or to leave a comment, please click here