IT

Technology, Big Brother and Charlie Hebdo

Technology, Big Brother and Charlie Hebdo
January 13, 2015 No Comments »

In the wake of the Charlie Hebdo massacre, politicians from Europe and elsewhere—in the same breath that they blab about freedom—have called for more restrictions, including even on certain kinds of encryption. In this bloody intersection of technology, journalism and ... Read More »

Identifying the Top Security Risks Associated With Wearables

Identifying the Top Security Risks Associated With Wearables
January 12, 2015 No Comments »

Just as the 1990s were embodied in floppy disks, compact cassettes and rotary dials, today’s symbolic attribute is wearables. Owing to tremendous advances in the Internet of Things market, more and more people are interested in tracking their daily activities. Chasing life ... Read More »

Internet of Things (IoT): Overdue or Overboard?

Internet of Things (IoT): Overdue or Overboard?
January 8, 2015 No Comments »

Numerous reports about the goings on at the 2015 International CES have focused on the Internet of Things (IoT), including the usual smattering of absurd gadgets that probably won’t go anywhere. But one of the themes is networked computing everywhere, ... Read More »

Protecting Data Center Workloads in the Cloud

Protecting Data Center Workloads in the Cloud
January 7, 2015 No Comments »

The emergence of cloud infrastructure, both public and private, has dramatically altered the way the data center operates today. It has increased agility, scalability and reliability in the data center, while simultaneously lowering costs. But there is one area where ... Read More »

Falling Oil Price to Mean Carbon Tax?

Falling Oil Price to Mean Carbon Tax?
January 6, 2015 No Comments »

When the Data Center Journal considered in mid-December how the price of oil might affect data center operators, the cost of a barrel of WTI crude was around $55. Since then it has broken below $49, a drop of almost ... Read More »

Open-Source Software and Secure Shell Keys: Lessons From the Heartbleed Vulnerability

Open-Source Software and Secure Shell Keys: Lessons From the Heartbleed Vulnerability
January 5, 2015 No Comments »

Back in the early days of the Internet, it became clear that criminal minds were eagerly turning their attention to exploiting the opportunities available to them in cyberspace. At that point, it became evident that data security measures would be ... Read More »

The Problem With Diversity in Technology

The Problem With Diversity in Technology
December 30, 2014 No Comments »

The problem with diversity in technology is not that different kinds of people want (or don’t want) a career in a particular field; it’s that the conversation is rigged. A fair discussion of, say, whether major technology firms hire enough ... Read More »

Data Erasure in Virtualized Environments

Data Erasure in Virtualized Environments
December 29, 2014 No Comments »

By 2016, experts predict that virtualization will encompass 86% of all server workloads, meaning virtual machines (VMs) are more commonplace than physical servers. Given this trend, data centers must develop best practices that ensure the same level of data security ... Read More »

Seven Christmas Wishes for IT

Seven Christmas Wishes for IT
December 23, 2014 No Comments »

End-of-year predictions are fun, but they’re nigh on pointless. The safe predictions are boring (e.g., data centers will consume more energy this coming year compared with the last), and ones that go out on a limb usually pick limbs that ... Read More »

Peeling Back the Growing Data Center Demand in Jacksonville

Peeling Back the Growing Data Center Demand in Jacksonville
December 22, 2014 No Comments »

Jacksonville, Florida has long been a logistics and distribution hub—a deep-water port perfectly situated to connect North America with the Caribbean and South America. Now, the city of 850,000 has earned notoriety on the global Internet map, too. Centrally located ... Read More »