BLOG`


Practical Big Data Analytics Use Case: Effect of rooftop Solar PV on Power Networks

Western Power, Perfekt and the Australian National University (ANU) recently conducted a pilot project to demonstrate the effect of rooftop Solar PV on Substation Load at the Waikiki zone substation south of Perth. The project required the blending of large volumes of time series data from disparate sources including: ANU’s ARENA project solar forecasting dataREAD MORE

Your privileged accounts are a hacker’s favourite target – 62% of breaches result from a lack of privileged account management

Privileged account passwords for domain admin accounts, root accounts, superuser accounts, and more, are the preferred targets for hackers these days. Why? Because they give them the “keys to the kingdom,” allowing them to gain access to your most sensitive and critical information resulting in data loss, identity theft and more. With the daily workloadsREAD MORE

Commvault Licensing Revolution

Commvault has iterated and significantly streamlined its licensing model which we know will delight customers with much richer bundled functionality. Called Commvault Complete, existing clients will benefit from a range of built in features that were previously charged separately. For new clients, Commvault becomes more affordable with access to the full feature set at aREAD MORE

The Intel L1TF (ForeShadow) Vulnerability

What is it? The L1TF (L1 Terminal Fault) vulnerability has been identified as another Intel based speculative execution side channel vulnerability, similar to the Spectre and Meltdown vulnerabilities which made headlines earlier this year. It is currently only identified as a theoretical vulnerability with no proof of its malicious use in the wild. How isREAD MORE

Spectre and Meltdown Vulnerabilities

This information pack is intended to provide an overview of the recent documented exploitation of modern CPU (mis)features. It is not designed to be a comprehensive document on the fine details of the exploits and specific platforms. Where possible, links will be provided to full documentation and disclosure. This document is a description of theREAD MORE

Data Retention ≠ Backup Retention

If you asked anyone the basic question “How long should I keep my backups (or backup tapes) for?”, the most common answer in Australia would be “7 years”. But they could never tell you why. It is one of those urban myths where, on the face of it, 7 years might sound like a reasonableREAD MORE

Animal Logic use high capacity compute and storage in a prefab data centres

Animal Logic makes the visual effects that go into films like Matrix 1 and 2, The Lego film, and Great Gatsby. In this video case study, their head of IT, Alex Timbs, explains why they selected a prefab data centre from our partners at Schneider Electric. This video will be relevant to you, if youREAD MORE

Password Management Systems

I don’t know about you, but when I was working as an infrastructure systems administrator my life was ruled by a list. A list of to-do’s to get the environment to a secure and happy place. There would be weeks where my list got smaller as I got things crossed off it. But mostly, weeksREAD MORE

About Dedupe Appliances

Many years ago, before most backup products had backup-to-disk options, vendors launched Disk-based appliances, known as Virtual Tape Libraries, as a backup target. These enhanced the backup and restore experiences over tape. Over time these appliances were enhanced to provide deduplication in the box.  This supplemented the lack of such features in some backup solutions.READ MORE

VMware vSphere 6.0 – What’s New

With VMware’s newest release of vSphere come some great new features but also some big changes in its architecture. This might make the upgrade process for your environment require some careful planning.   Scalability: Cluster size up to 64 hosts (32 previously). Each host can run up to 1024 VMs, have 480 logical CPU’s andREAD MORE