Your source for the latest news, opinion and trends regarding disaster recovery and best practices.
Disaster Recovery News
How Load Balancing Is Playing a Bigger Role in Tech Transitions
Load balancing isn't just for websites that expect surges in traffic any more. Companies of all sizes, and in all verticals, find load balancing...
Stratfor hacker Jeremy Hammond given 10 year sentence
AntiSec activist to serve 10 years in federal prison for his attack on geopolitical intelligence firm Strategic Forecasting Inc.
USENIX: Flame graph shows system performance in a new light
The person who became known on the Internet for yelling at servers is now becoming famous for another, somewhat related, feat, creating a new type of...
Apple issues update for Mail in Mavericks
The complaints of Gmail users using Mail 7.0 in OS X Mavericks have been well documented, and it looks like Apple has finally come out with a fix....
How to use cloud-based disaster recovery tools to prepare for the worst
Four simple steps to help you use cloud-based disaster recovery options to ensure natural disasters result in only temporary set backs.
ERP Comes to the Cloud and (Finally) Smaller Businesses
Trek Global claims that its cloud-based ERP service can help midmarket and small businesses leverage ERP to create efficiencies.
New Relic to mine performance data for business insights
Software provider New Relic is extending its system administrator tools for monitoring the performance of applications to help business managers as...
Hadoop, Web 2.0 get a path to tape for cheap long-term storage
An appliance designed for Web 2.0 companies may take them back to the future with tape storage.
SDN: The security pros and cons of using it in your organization
SDN benefits include automating and easing network administration duties and improving application performance. But it also introduces a number of...
Essential free software you can't afford to miss
Free doesn't have to mean cheesy, especially when it comes to freeware. A developer's passion project can become something you can't...
Splunk dives deeper into business analytics
Splunk continues to enhance its flagship machine data search engine so it can be used by business analysts and managers, in addition to its typical...
Security industry in 'rut,' struggling to keep up with cybercriminals
Experts agree hackers are winning but some are hesitant to blame it on a lack of new technology, however
Security industry in 'rut,' struggling to keep up with cybercriminals
Experts agree hackers are winning but some are hesitant to blame it on a lack of new technology, however
Spear phishing poses threat to industrial control systems
Hackers don't need Stuxnet or Flame to turn off a city's lights, say security experts
Is mobile anti-virus even necessary?
Experts disagree over whether or not there are any immediate threats to mobile devices that can be addressed with anti-virus software. Should you...
Google gets kudos for tossing older Chrome plug-in API
Netscape Plug-in Application Programming Interface is showing its age through security headaches and browser instability
Internet Explorer zero-day attackers linked to Bit9 hackers
Infrastructure and tools used by hackers originate from network infrastructure in China, security firm Symantec says
Mac Trojan linked to Syrian Electronic Army shuttered
Apple's popular image of being immune from malware has fired up hacker interest in the platform in recent times
How to Overcome Small Business Data Recovery Challenges
Data recovery has mattered ever since businesses started relying on PCs in the workplace. Today's common storage options for small businesses all...
New Java feature aims to manage multiple version problems
Admins now can link apps to a specific version of programming language