Category: Featured
Tech Time Warp: The Cray X-MP/48 brings style and substance to supercomputers
This week’s Tech Time Warp takes a closer look at “the world’s most expensive loveseat.” It’s quite the moniker for a pioneering supercomputer, but when you look at the legacy of electrical engineer Seymour Cray, it’s apt. The Cray X-MP/48, which started...
AWS Insights: How profitability scales with services expertise
A survey of 35 Amazon Web Services (AWS) partners reveals that services revenue per dollar of AWS-generated revenue varies widely, depending on the level of expertise and the breadth of services offered across the customer lifecycle. Key findings Conducted by...
Why every MSP needs a personal newsletter, not a corporate one
There’s one marketing channel I believe every MSP should use: and no, it’s not Google Ads or SEO. It’s email. Specifically, a personal email newsletter. Not a “company update.” Not a “tech tips” email. A message from you, with your...
Municipal cyber risk unveiled: How MSPs can stand guard
My hometown of Middletown, Ohio recently made local news after hackers disrupted the city’s water billing system and other services. The episode raised a timely question: how are cities becoming prime targets, and what can managed service providers (MSPs) and...
Frontline security predictions 2026: The battle for reality and control with agentic AI
The power and potential of agentic AI — adaptive, automated and independent — dominated security conversations during 2025. Barracuda asked four colleagues leading cyberthreat and security areas around the world, what they expect from agentic AI in 2026 and what this...
Tech Time Warp: Celebrating 30 years of Pixar magic
For many families, going to the movies is as much of a Thanksgiving tradition as parades and pumpkin pie. This week’s Tech Time Warp goes back to Thanksgiving weekend 30 years ago—Pixar’s big break. Toy Story was released in theaters...
Five trends MSPs can be thankful for in 2025
While Thanksgiving has been a national holiday in the U.S. since 1863, the notion of setting aside a day to give thanks reaches as far back as 1623. Fast forward to 2025, and the tech landscape looks very different, but...
Caught between a rock and a hyperscaler
Remember the good old days when certain activities—hosting email, running data analytics, and delivering reports—were strong revenue drivers? With major players like AWS, Azure, and Google Cloud Platform (GCP) entering the arena, those capabilities quickly became table stakes. Each hyperscaler...
Cybersecurity Threat Advisory: Oracle Identity Manager vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a critical flaw impacting Oracle Identity Manager to its Known Exploited Vulnerabilities (KEV) catalog. Read this Cybersecurity Threat Advisory to learn about the current risk and apply relevant patches now. What...
Cybersecurity Threat Advisory: Fluent Bit vulnerabilities
Five vulnerabilities have been identified in Fluent Bit. Upon a successful exploitation, attackers could bypass authentication, perform path traversal, execute remote code, or cause denial of service. Review this Cybersecurity Threat Advisory now to secure you or your clients’ infrastructure....
