UltraRAM is a new NVRAM being developed by Lancaster University. It offers much lower voltage read and writes, which can increase durability compared to flash, while still capable of DRAM like speed.
VMware announced an update to its per-CPU licensing, limiting licenses to 32-cores. While not an exciting move, the rollout has been much smoother than previous attempts, like the vRAM Tax. Scott Lowe recently looked into the logic behind the move.
IBM recently announced that CEO Ginni Rometty would be stepping down in April, to be replaced by Arvind Krishna. On the surface, replacing an IBMer that’s been with the company since 1981 with an IBMer that’s been with the company since 1990 isn’t the most… inspired move. In fact, it seems like business as usual for Big Blue. But this move may signal that IBM is ready to finally turn the corporate battleship after years of declining revenue.
How secure is your smart device? Is IoT capable of being secured completely? Ray Lucchesi has some great thoughts on how to secure IoT and some of the pitfalls of using low power devices to create secure infrastructure in this post.
Greg Ferro writes his “Fifteen Networking Truths” with knowledge gained over the last 15 years or so. His list of rules examines truths (and their corollaries) for network engineers and technology professionals.
With the rise of integrating digital technology into all areas of business, organizations need to be aware of how easy it is for security breaches to occur. It only takes one corrupt file, or one weak password, to open the door for hackers or ransomware to take down an entire network.
We all know what an intent-based networking solution is supposed to look like, right? And anything that doesn’t look like that can’t be IBN. Phil Gervasi takes a look at Cisco SD-Access and tries to determine if it’s really IBN or not.
Open source is increasingly dominated by permissive licenses with the biggest projects dominated by the biggest tech companies. Does this mean that the soul of open-source is lost? Keith D. Gregory wrote a great breakdown of the issue, something we recently went into detail about on the Gestalt IT Rundown.
How would you segment your guest wireless traffic? Ever wonder how Apple does it with their Airport Extreme? Wonder no longer! Joel Crane has you covered with some PCAP analysis in this great post.
Ransomware attacks are on the upswing and if you work for a smaller firm, your company could be an easy target. IT Consultant, Joey D’Antoni, provides a few solid tips to help protect your company’s valuable data.