Month: April 2018
Malvertising morphs into cryptotising
In the early days, malvertising was simply about slipping some code into an ad to induce more clicks to drive up a higher ad payout from an unsuspecting advertiser. It almost seemed like a childish prank (unless you were the...
IBM introduces skinny mainframe for cloud age
The mainframe has been a mainstay of enterprise computing for decades, and IBM has dominated the category, but what place does it have in the age of the cloud? Surprisingly, the oldest bit of computing technology continues to live a...
Physical Imaging Standard to Cloud for Intronis Backup
In today’s fast-paced business environment, organizations want to maximize uptime, and as a result MSPs are looking for image-based solutions that help them offer customers fast business recovery capabilities. That’s why we’re excited about Physical Imaging Standard to Cloud for...
Standing at the crossroads of managed BI cloud services
Business intelligence (BI) applications have been moving steadily to the cloud for some time now. A new “2018 Cloud Computing and Business Intelligence Market Study” published by Dresner Advisory Services finds the number of organizations planning to increase spending on...
Tech Time Warp: Even UNIVAC was susceptible to viruses
It’s easy to think about viruses as a product of the PC era. But, one of the first viruses ever created affected UNIVAC computers. Although ANIMAL was ultimately a benign creation—a game spread by a separate program called PERVADE—its creator...
Cloud 5: Google tries to go green, Pentagon’s controversial cloud bid saga
Welcome to The Cloud 5, our weekly feature where we scour the web searching for the five most intriguing and poignant cloud links we can find. Before we jump into this week’s links, please have a look at one of...
Threat Watch: Cryptojacking
If one of your customers calls or texts you to tell you their system is slow or overheating or gobbling up a lot of power, you need to add a new possible diagnosis to your checklist — cryptojacking. Cryptojacking is...
Enterprise cloud spending continues to rise
You don’t need to be a financial genius to see the direction of the cloud market. It’s been big and it’s probably only going to get bigger as more companies shut down their data centers and move wholesale to the...
IT service providers are now focus of cybersecurity attacks
Most IT service providers are used to being the defenders of the cybersecurity realm. But, a new report published today by Trustwave, a managed security services provider (MSSP), suggests services providers themselves are increasingly becoming the targets of cybersecurity attacks....
SDNs need to extend to legacy networking equipment
Software-defined networks (SDNs) represent a huge opportunity for managed service providers to more efficiently manage networks. Instead of needing a technician to manually program each network device one at a time using a command line interface (CLI), an SDN enables...