374 Results for:MVP

  • Sort by: 

MS Foils Coin Mining Compelling Telemetry Case

By Ed Tittel 09 Mar 2018

Through clever and effective use of telemetry data, AI and machine learning, MS foils coin mining in a big way in Russia, Turkey and Ukraine. Read More

AdDuplex-based Win10 Uptake Projections Mostly Bogus

By Ed Tittel 01 Jun 2018

When I first saw the news, I was stunned. But on further analysis, AdDuplex-based Win10 uptake projections mostly bogus, reflecting an incomplete and off-kilter subset of the user base. Read More

Application architecture changes force IT to adjust focus

By Carol Sliwa 17 Aug 2020

IT teams should focus on developer needs to control security and cost management and prevent vendor lock-in as businesses demand faster application turnaround, a consultant advises. Read More

Tim Mangan

TMurgent Technologies, LLP

Tim Mangan is the founder of TMurgent Technologies.Read More

Storage Spaces Direct requirements you need to know about

By Brien Posey 20 Jul 2018

Microsoft's architecture uses commodity hardware to create highly available, software-defined storage. But success depends on following the vendor's rules and recommendations. Read More

4 Windows Server 2019 storage features to ease management

By Kristen Gloss 16 Apr 2019

Microsoft includes storage features in Windows Server 2019 to ease migration and create highly available and scalable software-defined storage in data centers. Read More

Women in coding series: Billie Simmons

By Adrian Bridgwater 26 Apr 2019

The Computer Weekly Developer Network and Open Source Insider team want to talk code and coding.  But more than that, we want to talk coding across the diversity spectrum… so let’s get the tough ... Read More

Adam Bertram

Adam Bertram is a 20-year veteran of IT and an experienced online business professional.Read More

Rick Heiges

DB Best Technologies

Read More

The Security Interviews: How the BSI protects the IoT from itself

By Alex Scroxton 04 Jun 2020

David Mudd of the BSI reveals how a pragmatic and realistic approach to security vulnerabilities underpins its internet of things kitemark, helping give users the confidence to buy smart devices safely Read More