There is a growing trend in the data transfer arena. What is extreme file transfer and why is there an increasing need for it?
This article explains how to use PowerShell to monitor REST APIs.
There are some serious difficulties ahead for businesses in the wake of the repeal of the US Internet Privacy Bill. How can US businesses comply with the GDPR?
Fintech is a valuable target for hackers seeking financial reward and we can’t stop all breaches without changing our attitude towards security.
As you begin to depend on your PowerShell scripts for more important tasks, you'll discover that building tests for those scripts become necessary.
The repeal of the FCC rule on ISP data mining has serious implications, not only for individual data privacy, but for businesses as well.
If you find yourself making changes on your Microsoft DNS servers using the DNS MMC snapin you're probably wasting a lot of time.
Assuring data privacy has been a hot issue for years and the basic building blocks of a strong defense against cybercriminal data theft hasn't changed.
As we all try to do more with less with automation, we sometimes get to a point to where we've got a new problem. We're now running so many scripts and processes that, in the end, we're not sure what "done" looks like.
When writing PowerShell code and you need to search for text inside of a single string or an entire text file, where do you turn?
Handle.exe is a 3rd party tool that can help track down a process that is locking down a file you are trying access. Here is how.
Sophie Pellissier | | Security
Sophie Pellissier of Ipswitch looks at 5 facts IT managers should be aware of to protect sensitive data.
Working with lots of files all strewn about in different folders can sometimes prove troublesome. This is where PowerShell can help.
Want to know how healthcare IT organizations can best prove their worth to the business? Optimize the 835 Remit and 837 Claim process so there are fewer rejections, clarifications, missed files and delays.
Lean IT, in its essence, is all about doing well the IT tasks the organization needs to do, while not doing things that don't really need to be done.
For 95 percent of enterprises, one hour of downtime costs $100,000 or more in SLA penalties according to data from ITIC.
Greg Mooney | | Security
If you're like me and have a knack for cyber security trends, you will find yourself having many sleepless nights. Our lives and data is are the internet for the taking and the weakest link in finding compromised data is knowing it's been compromised in the first place.
Some things happen to a healthcare CIO that just don't happen to IT execs outside of the healthcare industry. On some days, you walk down the hospital corridors beaming, thinking of how your work directly improves human health and quality of life. On other days, you'd...
A lot of people throw away a lot of otherwise fully operational electronics due to blown capacitors (caps). I've worked in IT for quite a few years and that doesn't even include my 5 years of time in the audio consumer electronics space. To put is simply, a capacitor is...
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.