BLOG`


Why Technology and Business are meant to be together and data is their shared passion

utilities - Why Technology and Business are meant to be together and data is their shared passion

WHY TECHNOLOGY AND BUSINESS ARE MEANT TO BE TOGETHER AND DATA IS THEIR SHARED PASSION It’s the start of 2019 and Technology and Business need each other like never before. Up until recently, both parties have been a little bit wary of each other, sometimes making them appear slightly standoffish but, in truth, the mutualREAD MORE

Our Prediction for 2019: The Road to AI will be Paved with Gold

mining - Our Prediction for 2019: The Road to AI will be Paved with Gold

OUR PREDICTION FOR 2019: THE ROAD TO AI WILL BE PAVED WITH GOLD It’s the start of a new year and we find ourselves wondering what the next 12 months has in store for us all, at both home and work. We live at a time of rapid and radical change, which is both excitingREAD MORE

Practical Big Data Analytics Use Case: Effect of rooftop Solar PV on Power Networks

solar - Practical Big Data Analytics Use Case: Effect of rooftop Solar PV on Power Networks

Western Power, Perfekt and the Australian National University (ANU) recently conducted a pilot project to demonstrate the effect of rooftop Solar PV on Substation Load at the Waikiki zone substation south of Perth. The project required the blending of large volumes of time series data from disparate sources including: ANU’s ARENA project solar forecasting dataREAD MORE

Your privileged accounts are a hacker’s favourite target – 62% of breaches result from a lack of privileged account management

privileged accounts - Your privileged accounts are a hacker’s favourite target – 62% of breaches result from a lack of privileged account management

Privileged account passwords for domain admin accounts, root accounts, superuser accounts, and more, are the preferred targets for hackers these days. Why? Because they give them the “keys to the kingdom,” allowing them to gain access to your most sensitive and critical information resulting in data loss, identity theft and more. With the daily workloadsREAD MORE

Commvault Licensing Revolution

1 cammvault - Commvault Licensing Revolution

Commvault has iterated and significantly streamlined its licensing model which we know will delight customers with much richer bundled functionality. Called Commvault Complete, existing clients will benefit from a range of built in features that were previously charged separately. For new clients, Commvault becomes more affordable with access to the full feature set at aREAD MORE

The Intel L1TF (ForeShadow) Vulnerability

foreshadow - The Intel L1TF (ForeShadow) Vulnerability

What is it? The L1TF (L1 Terminal Fault) vulnerability has been identified as another Intel based speculative execution side channel vulnerability, similar to the Spectre and Meltdown vulnerabilities which made headlines earlier this year. It is currently only identified as a theoretical vulnerability with no proof of its malicious use in the wild. How isREAD MORE

Spectre and Meltdown Vulnerabilities

meltdown spectre kernel cpu vulnerability - Spectre and Meltdown Vulnerabilities

This information pack is intended to provide an overview of the recent documented exploitation of modern CPU (mis)features. It is not designed to be a comprehensive document on the fine details of the exploits and specific platforms. Where possible, links will be provided to full documentation and disclosure. This document is a description of theREAD MORE

Data Retention ≠ Backup Retention

photo data retention - Data Retention ≠ Backup Retention

If you asked anyone the basic question “How long should I keep my backups (or backup tapes) for?”, the most common answer in Australia would be “7 years”. But they could never tell you why. It is one of those urban myths where, on the face of it, 7 years might sound like a reasonableREAD MORE

Animal Logic use high capacity compute and storage in a prefab data centres

animal logic - Animal Logic use high capacity compute and storage in a prefab data centres

Animal Logic makes the visual effects that go into films like Matrix 1 and 2, The Lego film, and Great Gatsby. In this video case study, their head of IT, Alex Timbs, explains why they selected a prefab data centre from our partners at Schneider Electric. This video will be relevant to you, if youREAD MORE

Password Management Systems

20971563620 79a48c00b6 k - Password Management Systems

I don’t know about you, but when I was working as an infrastructure systems administrator my life was ruled by a list. A list of to-do’s to get the environment to a secure and happy place. There would be weeks where my list got smaller as I got things crossed off it. But mostly, weeksREAD MORE