Musato Technologies Blog – Page 63 of 74 – Musato Technologies
loader image

We enable business and digital transformation decisions through the delivery of cutting-edge ICT solutions and products...





Musato Technologies

Get inspired…

  
  
  

6 Steps for IT Troubleshooting at Remote Locations

IT problems at a distance can be hard for IT to solve. Here are the steps to take to fix them quicker.IT Troubleshooting
The essential trouble with troubleshooting remote locations is that they’re remote. The term “remote location” can mean a lot of different things. Some may be typical branch offices away from company headquarters, while others may be banks, retail stores, university campuses, doctors’ offices or hospitals.
Whatever the case, these locations are away from the main office or data center, which makes it hard for you in IT to easily diagnose any problem. Between you and any remote location, there are likely multiple networks served by multiple ISPs. The users at those locations may be accessing company resources over the VPN, SaaS applications, and cloud-hosted workloads or files. These layers of technology add a lot of complexity to the IT troubleshooting process. Continue reading

What to look for in web content management system software?

A Content management system can help an organization support the entire content creation process, from production to delivery — but there’s much to consider in WCM systems.Content Management System

Web content management describes a class of software for creating and maintaining content for websites and mobile applications. From an IT perspective, content management tools have a simple business purpose — support line-of-business users and ensure that they can manage all the information they need to produce compelling digital experiences. With web content management software, nontechnical users can effectively manage the volume, velocity, and variety of digitized information to do their jobs.

WCM software explained – Content Management System

Anyone maintaining a website manages content. Once a site is set up and running, nontechnical users need to be able to create, organize, store and distribute content on their own, without depending on day-to-day support from IT specialists. Similarly, anyone supporting web-based or native mobile apps must have the ability to create, source and produce content. In fact, many firms now begin with applications to support mobile content delivery first. Continue reading

Microsoft SSIS (SQL Server Integration Services)

Microsoft SSIS (SQL Server Integration Services) is an enterprise data integration, data transformation and data SQL Server Integration Servicesmigration tool built into Microsoft’s SQL Server database. It can be used for a variety of integration-related tasks, such as analyzing and cleansing data and running extract, transform and load, or ETL, processes to update data warehouses.

SSIS can extract, transform and consolidate data from multiple relational databases, as well as sources such as XML data files and flat files, then load the processed information into an enterprise data warehouse or other target systems. It includes a set of tools for developing and testing integration programs, called SQL Server Data Tools, plus a server component for deploying and running the programs. In addition, Microsoft’s SQL Server Management Studio software is incorporated into SSIS for managing and monitoring integration routines. Continue reading

Ubuntu Linux will never be the same after version 17.10

The latest version of Ubuntu Linux is here with the GNOME desktop as its new interface, as Ubuntu bids adieu to its own takes on the Linux desktop.Ubuntu Linux

Ready for a really new Ubuntu Linux desktop? Then start downloading Ubuntu 17.10 today. Canonical has abandoned its Unity interface in favor of the new GNOME 3.26 desktop and has replaced its homegrown Mir display server with Wayland.

That may sound like a radical change, but if you look closely at the new Ubuntu 17.10, Artful Aardvark, desktop, it will look familiar. That’s because while the underlying technologies have changed, Ubuntu’s developers have customized its default GNOME desktop to look and feel like Unity.

At the same time, there is a fundamental change here. Canonical is no longer working on being a desktop leader. It’s using the shared work of other Linux desktop vendors instead of trying to set its own software course. The company’s developers are focusing far more on the cloud, containers, and the Internet of Things (IoT).

If the new Unity-like GNOME interface is not to your taste, you can also get Ubuntu 17.10 with the KDE desktop, Kubuntu 17.10; MATE with Ubuntu MATE; or Budgie with Ubuntu Budgie desktops. If you’re an experienced Linux user, you already know the first two. Budgie, however, is newer. It’s based on GNOME, but it’s been adapted by Solus Linux developers to be extremely easy to use. Continue reading

Cyber-security is a business necessity

Cyber-security is no longer optional, with 51% of companies have experienced some form of cyber attack, said Wlodzimierz Nowak, chief security, legal and compliance officer at T-Mobile Poland.Cyber-security

Statistics show that 93% of all large enterprises were targeted by cyber attacks in 2016 alone. “But cyber-security has become a complex issue as business has embraced the internet, cloud, and mobile working,” he told the CyberSec European Cyber Security Forum in Krakow.

In developing a cybersecurity strategy, Nowak said organizations need to understand the most common aims of any cyber attack.

These are to stop the flow of data, to disturb the flow of data; modify data; steal data; or discredit the targeted organization, in the public and private sector, including governments.

An important element of cybersecurity, said Nowak, is to ensure that enterprises, governments, and individuals all do their share in terms of keeping cyberspace secure.

“Just like someone who is infected with a virus can pass that on to someone else, any entity not following cybersecurity best practices can create vulnerabilities for others in the cyber community,” he said. Continue reading

The 5G core network: 3GPP standards progress

Some folks are saying that the core network will disappear in 5G  Core network. From a certain perspective, I don’t disagree with them. However, from a broader perspective, it still remains a rich and essential area of wireless innovation.The 5G core network

The core network has always been one of the front lines in the evolution of cellular wireless technologies. Every generation has brought us a dizzying array of new acronyms in this space. In 2G there were Mobile Switching Centers (MSC), Home Location Registers (HLR) and Visitor Location Registers (VLR). 3G introduced the IP Multimedia System (IMS) and 4G brought the Mobility Management Entity (MME) and Packet Data Gateways (PGW). This parade of apparently physically independent functionality hides a trend of increasing softwarization that has been accelerating since 2G.

In 5G core network, this softwarization trend will very likely reach a nexus blurring any remaining lines between hardware and software. Some folks are saying that the core network will disappear into the cloud in 5G. From a certain perspective, I don’t disagree with them. However, from a broader perspective, it still remains a rich and essential area of innovation that will define a continuing key element of the future of wireless. Continue reading

What do Executives need to Know About Cybersecurity?

As a leader in your IT organization, you understand that cybersecurity is an issue that increasingly makes its way up to the C-suite. But how do you answer their most pressing questions? How do you present solutions that strike the balance between security and operations?Cybersecurity
How do you make the most compelling case for more resources to protect your enterprise? With the costs of just one data breach running in the tens of thousands or even hundreds of thousands of dollars, the stakes are high. And as more and more data moves outside of your organization through mobile working and the sharing of information, helping your Board of Directors to understand the risks involved is imperative.
Looking at topics from the need to educate employees on how to manage technology sprawl, our research breaks
through some common myths of building an IT security plan. This data can help you to address some commonly held misconceptions and to focus on the high-value points that will make the best case to your Board of Directors for greater allocation of resources and budget. Continue reading

Big data systems put companies on new business paths

Big data systems, for some companies, aren’t just platforms for new types of data processing and analytics applications — they’re the driving force behind entirely new business strategies.

Organizations hungry for more revenue are using Hadoop and other big data technologies to break their existing business molds and pursue new strategies and product offerings.Big data systems

That’s the case at iPass Inc., which is using a big data environment to fuel a strategic shift from pay-for-use Wi-Fi access to tools for managing and optimizing mobile connectivity for corporate users. Introduced in late 2015, the company’s iPass SmartConnect software includes algorithms that identify Wi-Fi access points and rank them on performance so mobile users can connect to the fastest and most reliable hotspots available. That marks a big change from when iPass gave users a static list of hotspots.

And it wouldn’t be possible without the underlying data management platform built around the Spark processing engine, said Tomasz Magdanski, director of big data and analytics at iPass. “We do need the big data architecture, 100%,” he explained. “There’s no way we could crunch all this data in real time and do all the ranking and measurements without it.” Continue reading

Intel’s 18-core processor peaks above 6.1GHz with liquid nitrogen coolingIntel’s 18-core processor

Intel’s new monster Core i9 processors boasting 18-cores and 16-cores have just gone on sale, and Asus has set some blistering new records overclocking these CPUs with its ROG Rampage VI Apex motherboard.

Using the Core i9-7980XE 18-core processor (with a base clock of 2.6GHz, Turbo to 4.2GHz) cooled with liquid nitrogen to around -100°C, expert ROG overclocker ‘der8auer’ managed to push the chip to 6.104GHz across all 18 cores (at 1.55V).

All without the CPU being reduced to a melted pile of goop, although the system wasn’t stable enough to run benchmarks at this speed. Continue reading

Microsoft SQL Server 2017 for Linux hits GA, IT pros encouraged

Microsoft SQL Server 2017 becomMicrosoft SQL Server 2017es available in October. In addition to a version that runs on Linux, new features include support for Python-based analytics.

After months of teasing… Continue reading