TechTarget News - Week of Jan 14, 2018

Enterprise storage arrays: 2017 Products of the Year finalists

All-flash and hybrid products comprise the bulk of the 14 storage arrays chosen as finalists in the 2017 Products of the Year contest. Only two arrays rely predominantly on disk.

Backup hardware devices: 2017 Products of the Year finalists

Backup and disaster recovery hardware products that made the initial cut extend into the cloud and have more support for software-defined storage, data analytics and even tape.

Education still needed around ISDN switch off

A lot of energy is going into GDPR but once that deadline has passed another big one for the channel and customers to think about is the ISDN switch off

Atomist extends CI/CD to automate the entire DevOps toolchain

The Atomist DevOps automation platform extends beyond CI/CD to fully cover DevOps processes end to end, enabling developers to avoid mundane tasks and focus on productivity.

Oracle chosen as provider of shared ERP system for colleges

Private, nonprofit colleges are discovering they can reduce back-office IT costs by working together. Novel approaches are emerging to reduce the financial drain of ERP systems.

News briefs: Mobile recruiting interfaces still painful

The pace of HR's mobile app implementation is very slow. Upgrading HR's tech is not the biggest priority in the business. An alternative may be a recruiting site with ATS features.

Beware fake Meltdown and Spectre patches

Security experts have warned that cyber attackers will be quick to use the Meltdown and Spectre exploits, but the first attempt to capitalise on them has come in the form of fake updates

Cisco extending channel reach

The vendor has been leaning on its distribution partners to engage more closely with a broader range of resellers

AWS commits to expansion of UK datacentre region

Amazon Web Services (AWS) has added a third availability zone to its London region, as demand for locally hosted cloud services continues to grow in the UK

Abu Dhabi continues fintech agenda in 2018

Abu Dhabi is open to developing its fintech ecosystem, with the next 12 months expected to see more focus on the sector

Cybersecurity skills shortage continues to worsen

This week, bloggers explore the cybersecurity skills shortage, the challenges of deploying edge computing and how best to mitigate Meltdown in a software-centric environment.

SAP defends S/4HANA HCM upgrade amid questions

SAP, which has some 14,000 on-premises HCM customers, is extending on-premises support five years to 2030. But HCM users will have to migrate to its HANA in-memory platform for support.

CIA attributes NotPetya attacks to Russian spy agency

The CIA reportedly concluded that Russia's foreign intelligence agency created and was responsible for the NotPetya attacks against Ukraine in June.

Veeam acquisition of N2WS enhances cloud protection

Veeam will integrate N2WS technology into the Availability Platform. The companies' research and development teams will work together following Veeam's acquisition of N2WS.

Davos: Disintegration of the internet could create economic turmoil

Politicians and business leaders will discuss the risks posed by fake news, cyber attacks, and artificial intelligence to jobs, political stability and global security, at the World Economic Forum in Davos

CIO interview: Tom Read, CDIO, Ministry of Justice

The MoJ’s chief digital and information officer, Tom Read, is keen on doing his bit to tear down the Whitehall silos, creating collaborative, simple and effective digital services for staff and the public

Rehearsals over, Violin Systems raises curtain on comeback

Violin flash customers can consume FSP hardware as a service with three-year subscription at guaranteed cost of 1 cent per GB per month, based on 140 TB and data deduplication.

ExtremeLocation latest addition to Extreme wireless portfolio

Extreme Networks is targeting retailers with a new set of services, called ExtremeLocation. The latest technology adds location-based customer-tracking services to the Extreme wireless portfolio.

Skygofree Android spyware is a powerful surveillance tool

A new Android spyware tool called Skygofree was described as one of the most powerful surveillance tools and can even capture encrypted messages from WhatsApp.

Next-gen Mirai botnet targets cryptocurrency mining operations

A variant of the Satori botnet, a successor of the IoT device hijacking Mirai botnet, is designed to hijack cryptocurrency mining operations, syphoning off newly created digital coins

Police ICT Company hires Ian Bell as CEO

Current Bedfordshire, Cambridgeshire and Hertfordshire police CIO Ian Bell will take on the role as CEO of the Police ICT Company in February’s focus on women in tech

Travel comparison website has partnered with two universities to offer grants to women looking to go into tech careers

Cyber attackers upped their game in 2017, warns report

Cyber attackers ranging from criminals to nation states have upped their game in the past year, “moving the needle” in terms of tactics, techniques and procedures, a report by a cyber security firm warns

CIO interview: Julian Burnett, CIO, House of Fraser

House of Fraser CIO Julian Burnett talks about his role in the business, key achievements and his plans for long-term and lasting digital transformation

Jenkins pipeline as code example demonstrates DevOps coordination

Ellucian, which makes software for colleges and universities, offers a pipeline as code example that unifies the release process for multiple generations of apps and brings IT security into the DevOps fold.

Create security culture to boost cyber defences, says Troy Hunt

Security suffers when there is tension between software developers and security professionals, but it is common in many organisations, says world-renowned security blogger and trainer

UK and France to collaborate on digital tech

The UK and French governments have joined forces to increase technology and innovation cooperation between the two nations

AWS Auto Scaling simplifies management across services

Amazon's Auto Scaling service can reduce duplicate efforts by users. It's also the latest example of Amazon's effort to streamline and automate its large list of services.

Trisis ICS malware was publicly available after attack

The Trisis ICS malware used in a cyberattack on an oil and gas company in Saudi Arabia in December has been publicly available for weeks after being copied by unknown actors.

ThousandEyes-Juniper pact focuses on hybrid WANs

ThousandEyes and Juniper boost visibility for hybrid WANs; IDC records sharp rise in cloud spending; and a vendor group issues specifications for optical 100 Gbps interoperability.

Contact Us Contact Sales
Conversion Pixel