What does the modern chief information security officer (Ciso) look like? The role used to be little more than acting as a glorified sysadmin but things have changed.
In the heart of London, researchers are splitting apart the building blocks of life and working towards a cure for cancer. The Biomedical Research Centre, run by King’s College Hospital and Guy's and St Thomas’ NHS Foundation Trust, has a genomic sequencing unit that genotypes tissue from patients with cancer and other diseases.
Implementing virtual desktops across a whole enterprise is rarely as easy as it sounds in vendor white papers. Rich Raether, IT manager, and Dan Putnam, published systems architect at large US law firm Quarles & Brady faced a unique set of challenges when they decided to roll out virtual desktops as a means of improving the firm's business continuity stance.
Vancouver's technology startup scene needs what investors refer to as a "big exit"; a ground-shaking initial public offering that leaves the founders super rich, and gives the rest of the startup community hope.
In Vancouver, everyone is waiting for the big earthquake. “It could happen at any time,” says Boris Mann, co-founder of Bootup Labs, a technology incubator and seed fund. But the quake he is referring to is economic, not seismological.
Does anyone really care what “five nines” means anymore? For the record, it means 99.999 per cent availability, which means your business managers can founder in digital limbo for just over an eighth of a second each day.
When applications go wrong, they can either stop working or slow to a crawl. The problem for IT managers is keeping track of when this happens and why, and preferably preventing it altogether. How can they do this?
Virtualisation can be a powerful tool for your IT department, making your infrastructure far more efficient. But without proper planning it is easy to trip yourself up by not scaling the system properly.
How do the different types of intrusion prevention system (IPS) work? Inline systems sit on the network like layer-two bridges, passing traffic along as they receive it. Host-based systems sit on the server, watching the traffic that it sends and receives.
It is surprising that thieves don’t target data centres more often. All that expensive kit and copper is worth a pretty penny, not to mention all the data that’s on it. Several BT exchanges have been hit, along with facilities owned by C&W. But of course, thieves don’t always need to get in to wreak havoc: data centres can be hacked.