Month: April 2018

malvertising
Malvertising morphs into cryptotising

Malvertising morphs into cryptotising

In the early days, malvertising was simply about slipping some code into an ad to induce more clicks to drive up a higher ad payout from an unsuspecting advertiser. It almost seemed like a childish prank (unless you were the...

/ April 11, 2018
IBM introduces skinny mainframe for cloud age

IBM introduces skinny mainframe for cloud age

The mainframe has been a mainstay of enterprise computing for decades, and IBM has dominated the category, but what place does it have in the age of the cloud? Surprisingly, the oldest bit of computing technology continues to live a...

/ April 11, 2018
Physical Imaging Standard to Cloud for Intronis Backup

Physical Imaging Standard to Cloud for Intronis Backup

In today’s fast-paced business environment, organizations want to maximize uptime, and as a result MSPs are looking for image-based solutions that help them offer customers fast business recovery capabilities. That’s why we’re excited about Physical Imaging Standard to Cloud for...

/ April 11, 2018
BI applications
Standing at the crossroads of managed BI cloud services

Standing at the crossroads of managed BI cloud services

Business intelligence (BI) applications have been moving steadily to the cloud for some time now. A new “2018 Cloud Computing and Business Intelligence Market Study” published by Dresner Advisory Services finds the number of organizations planning to increase spending on...

/ April 10, 2018
Trojan horse
Tech Time Warp: Even UNIVAC was susceptible to viruses

Tech Time Warp: Even UNIVAC was susceptible to viruses

It’s easy to think about viruses as a product of the PC era. But, one of the first viruses ever created affected UNIVAC computers. Although ANIMAL was ultimately a benign creation—a game spread by a separate program called PERVADE—its creator...

/ April 6, 2018
Cloud 5: Google tries to go green, Pentagon’s controversial cloud bid saga

Cloud 5: Google tries to go green, Pentagon’s controversial cloud bid saga

Welcome to The Cloud 5, our weekly feature where we scour the web searching for the five most intriguing and poignant cloud links we can find. Before we jump into this week’s links, please have a look at one of...

/ April 6, 2018
cryptojacking
Threat Watch: Cryptojacking

Threat Watch: Cryptojacking

If one of your customers calls or texts you to tell you their system is slow or overheating or gobbling up a lot of power, you need to add a new possible diagnosis to your checklist — cryptojacking. Cryptojacking is...

/ April 5, 2018
Enterprise cloud spending continues to rise

Enterprise cloud spending continues to rise

You don’t need to be a financial genius to see the direction of the cloud market. It’s been big and it’s probably only going to get bigger as more companies shut down their data centers and move wholesale to the...

/ April 5, 2018
cybersecurity attacks
IT service providers are now focus of cybersecurity attacks

IT service providers are now focus of cybersecurity attacks

Most IT service providers are used to being the defenders of the cybersecurity realm. But, a new report published today by Trustwave, a managed security services provider (MSSP), suggests services providers themselves are increasingly becoming the targets of cybersecurity attacks....

/ April 5, 2018
Software defined network
SDNs need to extend to legacy networking equipment

SDNs need to extend to legacy networking equipment

Software-defined networks (SDNs) represent a huge opportunity for managed service providers to more efficiently manage networks. Instead of needing a technician to manually program each network device one at a time using a command line interface (CLI), an SDN enables...

/ April 4, 2018