General

Last Updated on 13 April 2015, Total: 160 Blog Posts

  1. Phishing scam aimed at Facebook users

    A fake social media application aimed at Facebook users enticed users to enter their login credentials to gain access to the fake security app which promotes the security of their Facebook accounts and prevent them from being hacked. Users are reminded to never provide personal information such as, login credentials to unknown and unverified pop-up pages/screens, third-party apps, email requests,... Read More

  2. Predicting Long-Term Human Mobility

    Where are you going to be 285 days from now at 2PM?... Read More

  3. Procurement & Management of Cloud Services

    The European Network and Information Security Agency (ENISA), which was set up by the EU to carry out very specific technical and scientific tasks in the field of Information Security has published a practical guide about the procurement and governance of cloud services. Although, the guide focuses on the public sector, the content covered such as, service availability and continuity... Read More

  4. Productivity Future Prediction by Microsoft

    A very reasonably view of the future technology is presented by Microsoft's Office Labs where the overall concept integrates information flow, gadgets and everyday surrounding objects seamlessly together. Glass walls turn into huge displays and tables into tablets! Plausible sci-fi as some of the technology shown in these videos already exists; some has reached the level of prototypes while, some... Read More

  5. Q&A with Unitrends CEO

    Unitrends CEO Uses Army Intelligence to Win the Backup War - In this brief Q&A, we will see how Mike Coney, Unitrends’ CEO used his vast experience with the U.S. Army Intelligence Agency and the industry to turn Unitrends from a lackluster vendor of backup and recovery solutions to one of the fastest growing companies in the market... Read More

  6. Q&A with Unitrends CEO Kevin Weiss

    Kevin Weiss is Unitrends new president and chief executive officer (CEO). Weiss talks about his skills and his vision on how to turn Unitrends into a market leader for data protection solutions... Read More

  7. Read-Only Domain Controllers

    The RODC (Read-Only Domain Controller) in AD DS environments is designed specifically for the branch office scenario. RODC receives authentication requests from branch office users and forwards them to a domain controller in the hub site for authentication. There are two types of configuration scenarios, one option is to allow caching of branch office users login credentials and the other... Read More

  8. Reducing PST eDiscovery Times

    Organizations need to reduce the amount of data they need to pull across the network from PST files in order to meet business and legislative requirements in a timely manner... Read More

  9. Register for free training - Windows Server 2012: First Look

    Learn how to cloud optimize your IT with Windows Server 2012 and how to take advantage of the skills and investment you have already made in building a familiar and consistent platform. With Windows Server 2012, you gain all the Microsoft experience behind building and operating private and public clouds, delivered as a dynamic, available, and cost-effective server platform. This... Read More

  10. Research IT as a Service

    I would like to share with you a couple of points taken from Ian Foster's presentation about the future of research computing and the current trend of moving the administrative load to the cloud. While, the big science projects are the ones that most often get the required funds and resources, the small to medium projects on the other hand... Read More

Featured Links