- Glass all gone after one-day sale, Google says
- Akamai admits its OpenSSL patch was faulty, reissues keys
- How to fix the two-factor authentication log-in error in Gmail on Android
- Tutorial: How to fix app store errors in Windows 8
The autonomous underwater robot that began searching for the missing Malaysian airliner Monday ran into trouble on its initial mission but is expected to try again today.
By Computerworld Staff | 16 April, 2014 03:56
New technologies are giving small companies enterprise-like DR capabilities
By Cindy LaChapelle, Principal Consultant, Technology Vertical, Information Services Group (ISG) | 05 February, 2014 22:12
Linux is an excellent tool for creating the flexible IT environment you want, but find a technology provider to help keep your business up in the event of a disaster.
By Eric Hennessey, Business Continuity Solutions Evangelist, Symantec | 30 January, 2014 16:20
By leveraging resources in an elastic cloud in conjunction with the latest platform and workload transformation technologies, data centers get rapid operational recovery, near-infinite capacity, seamless management and easy migration back on-premise ⎯ at a price that everyone can afford.
By Lynn LeBlanc, CEO and founder of HotLink | 20 December, 2013 22:54
Even most of those hit hardest by Hurricane Sandy are hardening their facilities instead of moving them entirely. In the storm-prone South, however, it's a different story.
By Arielle Emmett | 15 July, 2013 10:15
If the question about tornadoes comes up at his Oklahoma City data center, as it sometimes does, Todd Currie, vice president of operations and general manager at Perimeter Technology, has answers. He even has cutout sample of his roof to show how it is built.
By Patrick Thibodeau | 31 May, 2013 10:08
If you are making a list of tech predictions for next year, as this story does, it may be a good idea to put the solar maximum on this list. The next one is expected in 2013, says NASA.
By Patrick Thibodeau | 20 December, 2012 11:05
Data recovery experts have been kept busy in the wake of Hurricane Sandy, which left a slew of data centers underwater, damaging equipment and threatening a significant loss of business-critical data.
By Patrick Thibodeau | 19 November, 2012 11:09
Lessons from 9/11 have helped ensure the financial services sector in New York and New Jersey is prepared for disasters, and even shorted the time to recover when regional events happen.
By Lucas Mearian | 27 October, 2012 10:14
Whitepapers about disaster recovery
This whitepaper discusses best practice in data protection monitoring, with a focus on recoverability and visibility as significant drivers for success. Whether backing up a private cloud or several smaller environments, learn how a unified view is necessary for proactively reporting protection, compliance to auditors, and understanding overall data protection health, performance, and reliability.
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
- FTMicrosoft Business Intelligence DeveloperNSW
- FTContent StrategistNSW
- FTOBIEE BI/DW ConsultantNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTIT Support EngineerNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTDeliverability SpecialistNSW
This paper serves security professionals interested in better techniques for finding vulnerabilities, who have a solid understanding of networking principles and familiarity with the concepts related to hacking, vulnerabilities, and exploits. Read on for an in-depth view of the use of expert systems to achieve accurate and detailed vulnerability results.
- IT security is national security -- but you're not alone
- Exclusive: Google's Project Loon tests move to LTE band in Nevada
- Enterprise who? Google says little about Apps, business cloud services in Q1 report
- Where's my gigabit Internet, anyway?
- Samsung teams with GlobalFoundries on 3D chips
- World Tech Update: Google buys drone maker Titan Aerospace and NHK shows off 8K television
- Music labels sue Pandora over pre-1972 recordings
- AMD's profitability streak ends at two quarters
- Netcraft tool flags websites affected by Heartbleed
- Israeli start-up, working with GE, out to detect Stuxnet-like attacks
- Facebook wants to help you meet friends offline
- Tor anonymity network to shrink as a result of Heartbleed flaw
- For Red Hat, it's RHEL and then...?
- Report: Oracle pushes back against Oregon officials over troubled health care site
- Google Glass to get a workout from Dutch firefighters