<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Recent Posts

Posted on 12.14.16 by Mark Underwood

How Secure Is Google Drive?

Exfiltration is a decidedly unpleasant word, and it's rarely connected with Google's benign application suite used freely by millions all over the world — Google Apps. Specifically, how secure is Google Drive? Google Drive, a potentially massive repository of...

Posted on 11.10.16 by Mark Underwood

Attacking the Mother Lode, Can They Hack LastPass?

Put all your eggs in one basket.

Posted on 09.27.16 by Mark Underwood

Hack an Election: Cybersecurity and the Cornerstone of Democracy

Somewhere out on the dark web, many expect to find a thinly disguised how-to page, complete with FAQs. On the public internet, it would be called "How to Hack an Election."

Posted on 09.06.16 by Mark Underwood

SSD vs. HDD: SSDs for Supercomputers and Everyman Servers?

By now, most IT professionals have dipped their toes in the solid-state drive (SSD) vs. hard disk drive (HDD) waters, but may not have had time to sort out the different types of SSDs used in their machines.

Posted on 08.13.16 by Mark Underwood

How Deep Learning Will Impact Your Future Employability

Today, deep learning is just a cool technology, but it could mean that you won't qualify for tomorrow's best-paying jobs, even if you work in IT.

Posted on 07.28.16 by Mark Underwood

Strategies for Monitoring Microsoft Applications

Love them, like them or loathe them, Microsoft applications and technologies are part of the IT landscape, and except for mobile, things aren't changing anytime soon. Managing the Microsoft cross-section of your organization's digital ecosystem is key to maintaining your...

Posted on 07.05.16 by Mark Underwood

Artificial Intelligence for Sysadmins

Artificial intelligence (AI) is on a roll. There's more AI technology and innovation coming into our everyday lives than ever before. It's happening through developments spurred on by 800 pound tech gorillas like Amazon and IBM, and big brands in transportation like Uber...

Posted on 06.07.16 by Mark Underwood

Application Development Teamwork: 7 Reasons to Develop App Footprints

Picture this: Someone in your office decided to buy a new app. Maybe they told you about it ahead of time, maybe not. While you may rightfully assume this is a responsibility of an application development team, app monitoring often falls to sysadmins or network admins....

Posted on 04.05.16 by Mark Underwood

Archiving Is Dead and the Data Center Will Never Be the Same

The plotline for a data center's Big Data story is still being written, and already there is no lack of twists and turns. The Internet of Things (IoT) is just the latest in a multi-episode drama that'll spawn as many shark-jumping forecasts as processes.

Posted on 03.18.16 by Mark Underwood

Five Offensive Cyber War Events and What Might Follow

"We interrupt this broadcast to bring you breaking news: Yesterday, we reported on a privacy leak at Northrop Grumman affecting some of its employees. That much was true, but today a spokesman for USCYBERCOM said the 'leak' was part of a much larger, concerted cyber war...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.