Are you guilty of having one of your passwords set to “Password123” or something similar? Well you’re not alone. Having these easy to guess passwords is what allowed the Iranian hackers to gain over 13 billion pages of information.
With the ability to quickly analyze massive amounts of data, businesses can increase customer interactions and drive workflow-process efficiencies.
GDPR is right around the corner in May, so let's defrag some of the myths associated with the General Data Protection Regulation (GDPR).
The relatively new approach to IT infrastructure design and data processing complements cloud computing to deliver key information to end users faster.
With so many available languages, knowing which one to choose for automation can be overwhelming. In our interview with Eric Chou from A10 Networks, we learn advantages of using Python Networking to automate tasks as engineers.
Hosts Greg Mooney and Jeff Edwards welcome Adam Bertram into the Defrag This studio talk about cryptocurrency, the Bitcoin bubble, and the blockchain.
New Year, (not so) new security problems. Hosts Greg Mooney and Jeff Edwards discuss some of the biggest tech news of this week.
Most of us have had a few weeks now to let it all sink in and maybe even get a second or third viewing of Star Wars: The Last Jedi.
CCleaner has been used by IT professionals and users alike for cleaning up temporary files and the Windows registry. But is cleaning the Windows registry useful?