The desktop PC has been a workplace mainstay for 35 years, and desk telephones even longer. For most organizations, though, their remaining time is limited. Traditionally, PCs ran applications that were installed and often connected to servers and databases in a client-server architecture. These applications are still around, but they now run more securely with […]
Archives for April 2018
AI Challenge: Achieving Artificial Empathy
As AI is woven deeper into different types of software and business processes, the success of it, particularly from customer experience and personalization standpoints, depends on its ability to recognize emotion and act accordingly. Will machines be able to achieve artificial empathy? Have they already? Following are some of the challenges and opportunities.
Google’s G Suite redesign draws on AI to kill email clutter
News 25 Apr, 2018 Joe Curtis Confidential mode also aims to protect personal data and reduce risk of user error
How to Market IT Modernization to Your Business
While the rationale for modernizing IT is often apparent, sometimes the messaging and positioning on the part of the IT group is just as important.
Sundar Pichai: Google Cloud is landing “more strategic deals”
News 25 Apr, 2018 Clare Hopping GCP's security and machine learning features are attracting more enterprises to the platform, says CEO
Is DaaS Really Taking Off? Liquidware Introduces New Object-based Storage for User Profiles and Data – Podcast Episode 303
In episode 303, Douglas Brown interviews Jason E. Smith, VP of Products for Liquidware, to speak about the state of DaaS and we discuss many of these questions. Liquidware is also announcing new features in their User Environment Management Solution, ProfileUnity, that can get your users data and user profiles to Object-based storage automatically! Listen […]
How Cloud Computing Is Impacting Disaster Recovery Planning
IT executives know that the cloud is changing everything, but they might forget that they have to update their disaster recovery plan accordingly.
Mingis on Tech: The lowdown on Android security
Google’s Android OS sometimes gets unfairly maligned as being weak on security. Computerworld blogger JR Raphael explains why that’s a misconception and how users can keep their devices safe.
Internet exchange points team up to bring better MANRS to the internet
Spreading bad routing information to your neighbors on the internet isn’t just bad manners, it could be bad for business. That, at least, is the message that the Internet Society (ISOC) wants to spread, as it calls on internet exchange points (IXPs) to help eliminate the most common threats to the internet’s routing system. [ […]
VMware Delete an orphaned PKS cluster
You may run into a situation where your PKS cluster is orphaned or you’re unable to delete it with the pks delete-cluster command. I’m going to show how to manually clean up the PKS cluster in the database. In the background I’ve reproduced this issue by deleting the BOSH deployment that backs the PKS cluster. […]