dcsimg

Five Best Practices for Network Configuration and Change Management

When your business is growing so is your network. Even when business isn’t booming (thanks economy) your business’ infrastructure can be evolving too. What you need is a software tool that’s able to manage these network changes for you. … [Read more...]

How to Enable and Configure SNMP for Network Monitoring

It doesn’t take a ninja to know that Simple Network Management Protocol allows administrators to monitor network-attached devices. That said, you might actually need to be a ninja to enable and configure SNMP on Windows, Linux/Unix, Cisco, and ESXi. … [Read more...]

The Top Six Alternatives to GitHub

Earlier this month, Microsoft announced it's impending $7.5 billion acquisition of GitHub, and developers everywhere have responded with an uproar.   Software professionals  and open-source developers everywhere are ripping the cat stickers off their laptops and seeking alternatives to GitHub.  … [Read more...]

Breaking Down the GDPR’s Data Protection Principles, Part 3: Accuracy and Storage Limitation

May was an interesting month. Google and Facebook were hit with 8.8 billion dollar lawsuits, Kanye West announced his support for Donald Trump, and we were all hit with a glut of “We’ve Updated Our Privacy Statement” emails flooding our inboxes. What does it all mean? Where do all these signs point? It means, of course, that GDPR compliance is upon us. Except that Kanye bit, there’s no … [Read more...]

Breaking Down the GDPR’s Data Protection Principles, Part 2: Purpose Limitation and Data Minimization

As you’ve probably surmised from the glut of “We’ve Updated Our Privacy Statement” emails flooding your inbox, GDPR compliance is upon us. … [Read more...]

Understanding Managed File Transfer SLAs (Or, Why Your SLA is More Important Than Hot Pizza)

Rather than dive into the Managed File Transfer (MFT) VS. Enterprise File Sync and Share (EFSS) debate, I want to talk about a critical distinguishing characteristic of any file transport solution, be it of either strain. This characteristic is the Service Level Agreement (SLA) offered by your service vendor. But first, let’s talk about Domino’s Pizza. … [Read more...]

The Meltdown Never Ended: Microsoft and Google Find New Meltdown/Spectre Vuln

Well, the time has come, the latest installment in of our favorite saga is finally upon us, and we can't wait to see where the story is going next. No, I'm not talking about the Solo: A Star Wars Story, I'm talking about the saga that is the Meltdown/Spectre chip flaws, of course. … [Read more...]

Breaking Down the GDPR’s Data Protection Principles, Part 1

With the EU’s General Data Protection Regulation (GDPR) enforcement deadline just two weeks away, GDPR preparedness should be top of mind for businesses around the world—not just a concern for businesses and organizations based in the European Union (EU). … [Read more...]

A Year Later, Equifax Finally Reveals Full extent of Breach

A year has passed since the worst data breach of 2017, and Equifax has finally revealed the full extent of the personal data and information stolen by hackers who accessed its databases in May 2017.  … [Read more...]

Video Demo: Using REST APIs with MOVEit 2018

One of our main goals with MOVEit 2018 was to enhance interoperability with other services and applications. That means more powerful workflows, and minimizing manual efforts and development time. … [Read more...]