News

MIT’s Project NANDA released a July 2025 report, The GenAI Divide: State of AI in Business 2025, finding that despite $30–40 ...
VMware's annual conference, less than a month away, Tom Fenton thought he would go back and look at five previous VMworld/Explores that have reshaped the IT world.
The Ultimate Process Automation Guide for Licensing and Permitting. Non-standardized, manual, paper-based processes can slow operations and create data errors, leading to security ...
CrowdStrike’s 2025 Threat Hunting Report reveals AI tools are being weaponized and directly targeted, while cloud intrusions surge 136% in early 2025.
Forrester's Q3 2025 'Forrester Wave: Multicloud Container Platforms' report assesses vendors in a market reshaped by the need for consistent management across public, private, and edge environments.
Paul Schnackenburg, working in the IT trenches every day as a 1-person SoC, looks at how the cybersecurity kill chain is evolving in the SaaS era, where identity is the new perimeter and attackers ...
After previously providing an overview of Zabbix, a scalable, open-source monitoring solution used to track the performance and availability of IT infrastructure, including servers, networks, ...
Cloud Security Threats Expand Beyond Misconfigured Storage Buckets: Report By David Ramel 05/05/2025 It used to be that you could almost count on weekly news of another cybersecurity exploit enabled ...
In-Depth Disaster Recovery Best Practices for the Real World By David Ramel 04/30/2025 No organization is immune to disaster, whether it's ransomware, cloud outages or unexpected system failures. That ...
In-Depth AI's Heavy Hitters: Best Models for Every Task By David Ramel 04/29/2025 In today's crowded AI landscape, organizations looking to leverage AI models are faced with an overwhelming number of ...
How-To Upgrading a Windows 10 Laptop to ChromeOS Flex By Tom Fenton 04/14/2025 I recently came across ChromeOS Flex and wondered if I could use it as a replacement OS for a laptop running Windows 10, ...
In-Depth The Missing Piece in the Zero Trust Puzzle By Paul Schnackenburg 02/26/2025 The core principles of Zero Trust, Assume Breach, Least Privilege and Verify Explicitly, are slowly trickling ...