Tek-Tips | Guest Bloggers RSS feed for this section
There is a needle in the haystack, Ground Control.

There is a needle in the haystack, Ground Control.

All of us are engaged daily in the process of looking for information on the Internet, or “searching”. Sometimes, we search for clarification, facts, confirmation, projects, solutions, while other times our searches help us broaden our views, come to terms with a concept, make a plan, find a definition, or cross check a fact. Watch yourself […]

Read full story Comments { 0 }
Is there a new kid in town?

Is there a new kid in town?

In today’s international learning landscape the role of e-Learning/on-line learning is providing more and more opportunities for International Schools to leverage a greater capacity to provide a differentiated venue for learning to support their respective learning communities. The growth of this learning medium in education and industry is significant, the number reflect this “5.6 million […]

Read full story Comments { 0 }
IT and Storage Economics 101, Supply and Demand

IT and Storage Economics 101, Supply and Demand

In my 2012 (and 2013) industry trends and perspectives predictions I mentioned that some storage systems vendors who managed their costs could benefit from the current Hard Disk Drive (HDD) shortage. Most in the industry would say that is saying what they have said, however I have an alternate scenario. My scenario is that for […]

Read full story Comments { 2 }

Electronic Arts Embraces Social Networking to Create Better Games on Tight Timelines

This is a Microsoft SharePoint Server case study. "We know that employee collaboration saves money by reducing duplicated effort and increasing information sharing.  Our SharePoint portal definitely enhances that team collaboration by leveraging "social networking" for our own internal purposes." Director of Product Development, Electronic Arts Electronic Arts(EA), one of the world’s top interactive game […]

Read full story Comments { 0 }

Beyond Simple Data Backups – Real Business Continuity

We all know how important it is to develop a Disaster Recovery/Business Conntinuity Plan.  If you still don’t have one, consider this : relying on backup data that you have never tested and have no idea how long it would take to restore … is not a plan. In the old days of IT, backing up […]

Read full story Comments { 0 }

System Imaging – Cloning, Not Just For Sheep

Remember the last time you had to rebuild your computer ? Worried about how long it would take to rebuild your server if something happened ? How do large corporate enterprises save time on these issues ? You know the answer to all of these questions.  System imaging is like cloning, it makes an exact […]

Read full story Comments { 0 }

Data Classification Policies – Forgotten Purpose

Data Classification.  I’m not sure I have ever seen an implementation of a Data Classification policy that I would say, is very successful. It’s a scary thought given that Data Classification is a key foundation policy for Information Security. For those who have implemented a Data Classification policy, ask yourself these questions. (For those that […]

Read full story Comments { 0 }

Overcomplicating Information Security and Risk Management

If I had to highlight a key problem area for organizations when it comes to how they approach Information Security and Risk Management overall, it would be the over-complication of their implementation(s), or lack thereof. (Sounds strange for the latter but it’s that “complication” that also results in the “lack thereof”). Technology has done little […]

Read full story Comments { 3 }

Sentilla: Measuring Power Consumption At A Data Center

If I take a look at power consumption beyond data centers, my current thinking is that the market will follow this sequence: Mitigation with power consumption Mitigation with energy consumption Carbon footprint awareness Renewable energy Smart grid Among the above, I think the mental transition from #1 to #2 is one of the biggest changes. […]

Read full story Comments { 0 }

Eve’s Advisory: Cloud Computing Authentication – It’s All About Changing Behaviors

Editor’s Note: In her second video blog post for Tek-Tips, Eve Maler takes a look at the recent Twitter break in with some insights about behavior and user authentication. Have your behaviors changed? Can you remove login and password authentication for your users? Eve thinks you can. [kaltura-widget wid=”tmx0xjg19g” width=”400″ height=”365″ addpermission=”” editpermission=”” /] – […]

Read full story Comments { 0 }